Extend monitoring to remote sites and the cloud

The Tunneling feature is a licensable addition to the GigaSMART® engine that helps alleviate blindness of business-critical traffic at remote sites, virtualized data centers, or hosted in a public cloud. Tunneling is used in conjunction with Flow Mapping® technology to select traffic at remote sites that should be subject to additional inspection. That traffic subset can then be forwarded via IP/UDP or L2GRE encapsulation to centralized monitoring and security resources. Tunneling also works with GigaVUE-VM for VMware, GigaVUE-VM for OpenStack, and GigaVUE Cloud Suite for AWS to select and tunnel traffic from within virtual environments to the Gigamon® Visibility Platform via L2GRE tunnels. With Tunneling, physical networks can utilize cloud-based tools and load balance across multiple instances.

Benefits of the Tunneling feature

  • Provides security teams with access to suspicious traffic anywhere within the organization, local or remote, physical or virtual.
  • Eliminates the cost of deploying and managing tools at branch offices and remote sites.
  • Preserves the processing power of hypervisors to handle workload, instead of management and monitoring.
  • Immediately extends monitoring and security to new acquisitions or temporary installations until other arrangements can be made.
  • Enables load balancing across multiple IP-addressable virtual and cloud-based tools.
  • Allows operators to take advantage of existing Cisco NEXUS features by forwarding traffic via ERSPAN tunnels to the Gigamon Visibility and Analytics Fabric.

GigaSMART Features

GigaSMART® offers a number of other essential traffic intelligence services required for active visibility into infrastructure blind spots, including:

NetFlow Generation

Delivering basic Layer 2–4 network traffic data to analysis tools. 

Advanced Flow Slicing

Eliminates these issues by slicing payloads and packets from long data flow.

Source Port Labeling

Provides context to packets and allows tools to properly assess network behavior and threats based on where they are.

Adaptive Packet Filtering

Identifies patterns across any part of the network packet, including the packet payload.

SSL/TLS Decryption

Creates a secure channel between the server and the end user's computer or other devices as they exchange information.

Packet Slicing

Truncates packets while preserving the portion of the packet (the protocol headers) required for network analysis.

Advanced Load Balancing

Divides and distributes traffic among multiple tools, so network and security visibility can scale.


Targets, identifies and eliminates duplicate packets, blocking unnecessary duplication and sending optimized flows.


Provides customizable data protection by overwriting specific packet fields with a set pattern. 


Alleviates blindness of business-critical traffic at remote sites, virtualized data centers, or hosted in a public cloud.

Application Visualization

Provides a complete view of the applications running on your network automatically.

Application Filtering Intelligence

Extends Layer 7 visibility to thousands of common and proprietary applications.

Application Metadata Intelligence

Empowers your security information and event management and network performance monitoring tools.

GTP Correlation

Enables mobile service providers to monitor subscriber data in GPRS Tunneling Protocol tunnels.

5G Correlation

Intelligently forward subscriber sessions to specific tools by filtering on subscriber, user device, RAN or network slice IDs.

FlowVUE Flow Sampling

Provides subscriber IP-based flow sampling.

SIP/RTP Correlation

Enables enterprises and service providers to monitor VoIP traffic.

Have Questions?

We're here to help you find the right application visibility solution for your business.

By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.

Related Pages




Optimize traffic sent to your tools.



Flow Mapping

Granular filtering and forwarding.




SSL/TLS Decryption

Decrypt and expose malware hiding in encrypted sessions.




Single pane-of-glass orchestration and management.