How Flow Mapping Technology Enables Network Monitoring at 40Gbps and 100Gbps

Creating data center intelligence means deploying flow mapping technology which enable network monitoring at 40Gbps and 100Gbps.

Bill Kleyman

April 30, 2014

2 Min Read
How Flow Mapping Technology Enables Network Monitoring at 40Gbps and 100Gbps

As networks evolve from 1Gbps to 10Gbps, moving toward 40Gbps and 100Gbps. Traditionally, network monitoring and analysis were integrated after an infrastructure was deployed. Now on modern network pipes – monitoring and analysis have become absolutely critical.

In this whitepaper from Gigamon, we find out the critical nature of network monitoring and analysis. Furthermore, we learn how the the Gigamon Traffic Visibility Fabric scales from just a few connections, up to thousands, allowing traffic to be monitored Enabling Network Monitoring at 40Gbps and 100Gbps with Flow Mapping Technology and secured from a centralized network tool farm. Consider this - traffic aggregation is only one half of the solution behind the Traffic Visibility Fabric. The other half is an advanced filtering architecture called Flow Mapping.

Here’s the bottom line: Failure to analyze, monitor and secure will result in network downtime, which can quickly cost organizations millions of dollars in lost revenue. To maintain network security, advanced persistent threats, cyber-attacks, and data leaks must be combated and averted. At the same time, efficient network performance must be upheld to prevent bottlenecks and outages by monitoring bandwidth usage and application response time.

Download this white paper today to learn how Flow Mapping starts with network ports and ends with tool ports, and is used to include or exclude traffic on connections. The paper outlines several direct benefits around using Flow Mapping Technology for your network infrastructure. This includes Flow Mapping which features:

  • Sending only the packets on even source ports to local tool ports

  • Sending only packets matching a user-defined pattern match for a particular MPLS label to local tool port

  • Discarding all traffic from a particular IP address

  • Sending only non-specific traffic to a local tool port using the Collector rule

  • Redirecting all traffic to IDS monitors regardless of any filters applied to network ports

  • Creating filter maps in advance for instant troubleshooting of specific scenarios.

  • Temporarily troubleshooting situations where you want to see all traffic on a port without disturbing any other filter, crossbox filter, Flow Map, or cross-box maps already in place for the port

The amount of traffic, workloads and users hitting your network will only continue to increase. As cloud and IT consumerization continue to impact the modern organization, IT shops will have to find ways to monitor, analyze, and optimize their network delivery methodology. Flow Mapping technology from Gigamon is a great way to allow efficient network monitoring for your future network needs and speeds.

About the Author(s)

Bill Kleyman

Bill Kleyman has more than 15 years of experience in enterprise technology. He also enjoys writing, blogging, and educating colleagues about tech. His published and referenced work can be found on Data Center Knowledge, AFCOM, ITPro Today, InformationWeek, NetworkComputing, TechTarget, DarkReading, Forbes, CBS Interactive, Slashdot, and more.

Subscribe to the Data Center Knowledge Newsletter
Get analysis and expert insight on the latest in data center business and technology delivered to your inbox daily.

You May Also Like