What are you looking for?
PacketStack
Intelligent packet filtering, manipulation and transport

See How We Stack Up!
Keysight offers an extensive set of visibility intelligence feature stacks so you can get the most out of your visibility and security platform — our capabilities allow filtering based on L2 through L7. Moreover, we provide industry-specific, specialized capabilities. Each stack of features is executed with a purpose-built design to ensure you get the best performance whether in a physical data-center or a private, hybrid or public cloud.
Find Your Platform
PacketStack Features

Deduplication
Don’t overload your tools – remove repeat data to deliver a unique stream to your tools so they can operate at their peak.
- Use with other packet processing features at full line-rate without dropping packets!
- Flexible configuration parameters – can apply this at ingress, dynamic or egress filters
- Can disregard specific headers as required
- Control deduplication window based on memory and time


Header (Protocol) Stripping
Detect and remove headers so data can be easily analyzed by security and monitoring (IPS, IDS, NGFW, etc.) tools that do not support such protocols
- Protocols and headers removed: Cisco Fabric path, VLAN or QinQ, VNTag, GTP, VXLAN, L2GRE/NVGRE, MPLS – L2VPN/VPLS with or without Control Word, L3VPN


Packet Trimming
Send only what security and monitoring tools need by cutting out the unnecessary information and reducing packet size
- Improve security by protecting sensitive user data – remove personally identifiable information (PII) for PCI compliance
- Increase tool efficiency, by reducing average frame length by 75%
- Trim packets from 64–16342 bytes and using many offset templates (MAC, VLAN, MPLS, etc)
- Original packet length can be retained as part of the trailer


Timestamping
Network operators require high-accuracy timestamps on packets to correlate events with other device logs in low-latency financial data centers and to correlate traffic events across a WAN. With this feature, you can insert a high-accuracy timestamp into every packet at ingress.
- Timestamp sources include local, PTP and NTP
- Highly accurate – nanoseconds
- Support timestamping at all speeds (1/10/40/100G)
- Support for Wireshark, Riverbed, Corvil, and other popular analysis tools

Additional Features

Data Masking
Hide or overwrite sensitive or personally identifiable information (PII) before providing the data to analysis tools. Achieve regulatory compliance for HIPAA, PCI-DSS financial transactions and more
- Hide information you want to protect
- Keep your customers and other info secure
- Overwrite packet with any number of bytes at user configurable offset
- Predefined offset templates for easy header skipping (start of L2, end of L2, end of L3)
- For pre-defined credit card and other templates, check out Data Masking Plus, a part of AppStack


Header Stripping
Detect and remove headers so data can be easily analyzed by security and monitoring (IPS, IDS, NGFW, etc.) tools that do not support such protocols
- Protocols and headers removed: VLAN or QinQ, FabricPath, ETag, VNTag, GTP, MPLS (L2VPN/VPLS with or without control word, L3VPN), VxLAN, GENEVE, ESP, L2GRE, ERSPAN; and L3GRE, JMirror, PBB-TE, LISP, VSL, OTV, PPPoE using Generic Header Stripping


Burst Protection (Deep Packet Buffering)
Burst protection or deep packet buffering allows monitoring tools to see everything without dropped packets when traffic exceeds tool bandwidth. The burst protection feature creates a “buffer” between the ingress ports where taps are connected and the egress port where tools are connected. Traffic is retained and moderated out to tools, to ensure tools get all relevant data.
- Meet peak traffic needs more efficiently with less tools
- Manage micro bursts more effectively to prevent unnecessary drops

Have It All
Stack On:
Packet filtering capabilities that can be used ALL AT ONCE without packet loss! Go ahead and manipulate your traffic anyway you want – deduplicate, stamp, trim away – it will still all be there because with Keysight, you can use the features simultaneously. Your tools will get relevant traffic and in a format that is easy for them to process. Plus, we offer burst protection, to further prevent your tools from dropping packets also. All of this, still through a point and click configuration.
Keysight ensures all of its technology is purpose-built for performance, so that you can use all the features you want without concerns. All your packets will get to your tools because we use a dedicated hardware accelerator in our network packet brokers.


Featured Resources
Related Products
Want help or have questions?