Highlights

  • Dedicated hardware acceleration provides a Zero packet loss architecture
  • Filtering of traffic so that each monitoring or inline security tool receives exactly the right data
  • SSL decryption to quickly detect emerging threats encrypting exploits within application traffic
  • Dynamic filter compiler handles all filter rule complexities automatically – no overlapping filter rule headaches
  • Aggregation of traffic from multiple TAPs or SPAN ports
  • Load-balancing of traffic to multiple analysis tools
  • L7 application awareness efficiently allows for packet processing based on unique applications

Keysight visibility solutions provide real-time, end-to-end visibility, insight and security into physical, virtual, SDN and NFV based networks, delivering the control, coverage and performance in a seamless fashion to protect and improve crucial networking, data center and cloud business assets.

Industry leading Keysight Network Packet Brokers (NPB) deliver intelligent, sophisticated and programmable network flow optimization providing visibility and security coverage to business assets and help IT teams quickly resolve application performance bottlenecks, trouble shoot problems, improve data center automation, better utilize expensive network analysis and security tools and help better business execution because of the improved understanding of the network and data center.

Keysight's best-in-class Vision portfolio of network packet brokers are easy-to-use, perform under pressure and offer true application intelligence.

Keysight's Network Packet Brokers

Scalable, lossless visibility solutions for all your network needs.

  Vision E40 Vision E100 Vision E10S Vision E1S Vision ONE Vision X Vision 7300
 
VISIBILITY INTELLIGENCE
Netstack X X X X X X X
PacketStack
    X X X X X
SecureStack         X X X
AppStack       X X X X
MobileStack         X    
CHASSIS AND PORTS
Rack Units 1 1 1 1 1 3 7
1G Support X   X X X
  X
10G Support X X X X X X X
40G Support X X     X X X
100G Support   X       X X
MODE OF OPERATION
Inline Capable X X X   X X  
Out-of-Band Capable X X X X X X X
Simultaneous Inline and Out-of-Band X X X   X X  

Awarded Frost & Sullivans Global Network Packet Broker Market Leadership Award

Visibility Management

Keysight offers an easy-to-use, intuitive click-and-drop NPB interface to allow operators to make connections from taps or SPAN ports to their connected tools. The configuration of filters is streamlined and easy, with overall setup requiring minimal time and effort, even for large shops and complicated networks. No professional services or expensive training is required to learn and implement the Keysight visibility solutions. This eliminates the need to use time-consuming command line interface (CLI) or web user interface (WebUI) dialogs, or invest hours or days designing complex logic.

Keysight Fabric Controller (IFC) is a SDN controller for visibility that allows multiple network packet brokers to work collectively within a single pane of glass. IFC extends a full set of API controls and integrates with Cisco ACI, as well as other SDN architectures.

Network Visibility – Ease of Use Matters

Visibility Inline vs Out-Of-Band

There are two different ways to deploy network packet brokers: Inline Security and Out-of-Band Monitoring

Inspect live traffic before it hits your data center network. Tools are grouped serially before traffic enters your production data center enabling real-time traffic inspection and active threat prevention.

Common inline security tools include:
  • Intrusion prevention systems (IPS)
  • Firewalls and next-generation firewalls (NGFWs)
  • Data loss prevention (DLP) systems
  • Unified threat management (UTM) systems
  • SSL decryption appliances

Provides passive traffic inspection, detection, and recording for routine analysis. This model is used extensively in detailed threat analysis, but does not enable any active prevention safeguards or countermeasures.

Common out-of-band security tools include:
  • Intrusion detection systems (IDS)
  • Forensic tools
  • Data recording
  • Malware analysis tools
  • Log management systems
  • Packet capture (PCAP) tools

Want help or have questions?