Identify Each Packet's Entry Point

The Source Port Labeling feature of the GigaSMART® engine provides context to packets and allows tools to properly assess network behavior and threats based on where they are happening in the network. When a packet arrives into the Gigamon Deep Observability Pipeline, it could have come from one of dozens or hundreds of network access points.

Before forwarding the packet to a monitoring or security tool, Source Port Labeling adds a trailer to the packet that identifies on which port the packet arrived. The tool can query the deep observability pipeline using the Rest API and look up the Cisco Discovery Protocol (CDP) or Link Layer Discovery Protocol (LLDP) information associated with the packet’s source port to know exactly where in the network problems or threats reside.

Benefits of the Source Port Labeling Feature

  • Accurately analyze traffic aggregated from multiple collection points.
  • Correlate traffic with CDP/LLDP information on the network.
  • Identify incorrect cabling of taps and SPAN ports and verify accuracy of flow maps.

Gigamon Community

Get the latest technical content and participate in discussions in the Gigamon VÜE Community.

GigaSMART Features

GigaSMART® offers several essential traffic intelligence services required for deep observability into infrastructure blind spots.

NetFlow Generation

Delivers basic Layer 2–4 network traffic data to analysis tools.

Source Port Labeling

Provides context to packets and identifies behaviors and threats based on network location.

Adaptive Packet Filtering

Identifies patterns across any part of the network packet, including the packet payload.

De-duplication

Targets, identifies, and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.

Packet Slicing

Truncates packets while preserving the protocol headers required for network analysis.

Advanced Load Balancing

Divides and distributes traffic among multiple tools based on a variety of data points.

Advanced Flow Slicing

Reduces bandwidth usage by slicing payloads and packets from long data flows.

Masking

Provides customizable data protection by overwriting specific packet fields with a set pattern. 

Tunneling

Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or in the public or private cloud.

Application Visualization

Provides a complete view of the applications running on your network.

Application Filtering Intelligence

Extends Layer 7 visibility to thousands of common and proprietary applications.

Application Metadata Intelligence

Provides application visibility to identify performance and quality issues, and potential security risks.

GTP Correlation

Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.

FlowVUE Flow Sampling

Provides subscriber IP-based flow sampling.

5G Correlation

Forwards subscriber sessions to specific tools by filtering on subscriber, user device, RAN, or network slice IDs.

SSL/TLS Decryption

Creates a secure channel between the server and the end user's computer or other devices as they exchange information.

colored-bar

Take a Gigamon Tour

See the tech. Touch the tech.

Have Questions?

We're here to help you find the right solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages