GigaSMART
GigaSMART | Drive your traffic with intelligence

GigaSMART

Drive your traffic with intelligence

GigaSMART

  • Overview
  • Features & Benefits
  • Resources

GigaSMART® technology extends the intelligence and value of the Gigamon Visibility Fabric™ architecture by enhancing your monitoring infrastructure and improving tool performance. A range of applications are available to enable the modification, manipulation, transformation, and transport of traffic from your network to the tools you rely upon for management, monitoring, and security.

Network monitoring tools perform more efficiently by eliminating unwanted content with the de-duplication and packet slicing features. SSL Decryption provides visibility into encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking allows network security teams to hide confidential information like passwords, financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI compliance regulations. Organizations can improve accuracy by adding source or timing information at the point of collection with the source port labeling and time stamping capabilities. Enhanced packet distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers.

The advanced processing capabilities of the GigaSMART card can also be leveraged to summarize and generate NetFlow statistics from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Gigamon Visibility Fabric eliminates the risk of expending expensive production network resources in generating these analytics. Enhanced flow-level visibility across remote locations and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning and enforcing security policies.

Quick Specs

  • High-performance compute engine
  • Available on GigaVUE H Series and GigaVUE-2404
  • Packet transformation, packet modification and stateful correlation
  • Advanced traffic intelligence applications
  • Service chaining capability

 

Features & Benefits

  • Grid View
  •  
  •  

Adaptive Packet Filtering

Adaptive Packet Filtering
Adaptive Packet Filtering
Adaptive Packet Filtering
  • Enhanced visibility into encapsulated application flows
  • Intelligent protocol-aware filtering across advanced encapsulation headers including VXLAN, VN-Tag, GTP, MPLS, etc., and inner (encapsulated) Layer3/Layer4 packet contents
  • Advanced visibility in to the application layer using pattern matching and regular expressions-based filters
 

De-duplication

De-duplication
De-duplication
De-duplication
  • Relieve tool processing resources when packets are gathered from multiple collection points along a path by only forwarding a packet once
  • Remove packet duplication caused by inter-VLAN communication or incorrect switch configuration
 

ERSPAN Termination

ERSPAN Termination
ERSPAN Termination
ERSPAN Termination
  • Provides tunnel termination of ERSPAN sessions enabling consolidation, filtering, and forwarding of relevant ERSPAN traffic
  • Enable analysis tools to receive filtered traffic from remote networks
 

FlowVUE™

FlowVUE™
FlowVUE™
FlowVUE™
  • Flow-aware sampling of active subscriber devices to selectively reduce traffic
  • Preserve or increase CEM based on real-time reduced data analytic throughput
  • Leveraging Big Data to tailor marketing campaigns, pricing strategies, etc., based on subscriber usage patterns
 

GTP Correlation

GTP Correlation
GTP Correlation
GTP Correlation
  • Optimize tool infrastructure by accurate filtering, replicating, and forwarding monitored subscriber sessions
  • Correlate subscriber sessions (control and data) to offload tools, increasing throughput
  • Facilitate drilldowns into roaming users across peer networks
 

Header Stripping

Header Stripping
Header Stripping
Header Stripping
  • Eliminate the need for monitoring tools to decipher protocols
  • Allow easy filtering, aggregation, and load balancing of packets with headers removed
  • Support for ISL header/trailer removal and VXLAN, VNTAG, VLAN, MPLS, and GTP-U tunnel stripping
 

Load Balancing

Load Balancing
Load Balancing
Load Balancing
  • Distribute traffic among multiple ports based on a variety of options: hashing, bandwidth, cumulative traffic, packet rate, connections, and round robin
  • Apply weighting to the traffic distribution, supporting different tool capacities
  • Hashing options include: IP, IP-and-Port, five-tuple, and GTP-u tunnel ID
  • Load balancing is included with all GigaVUE H Series GigaSMART licenses except NetFlow
 

Masking

Masking
Masking
Masking
  • Conceal private data including financial and medical information
  • Empower network monitoring tools to perform their task and maintain PCI and HIPAA compliance
 

NetFlow Generation

NetFlow Generation
NetFlow Generation
NetFlow Generation
  • Increase infrastructure efficiencies and broaden visibility by offloading NetFlow Generation to the Visibility Fabric
  • Generate NetFlow records without sampling to facilitate true response and root cause capability
  • Simultaneously provide flow statistics and raw packets to a variety of monitoring, analysis, and security tools in an integrated traffic visibility solution
  • Export records to up to six (6) collectors supporting NetFlow v5/v9 and IPFIX
 

Packet Slicing

Packet Slicing
Packet Slicing
Packet Slicing
  • Reduce packet size to increase processing and monitoring throughput
  • Optimize the deployment of forensic recorder tools
  • Enable more data storage in a recorder application
 

Source Port Labeling

Source Port Labeling
Source Port Labeling
Source Port Labeling
  • Add labels to the packets indicating the ingress port
  • Easily identify where a packet is coming from
  • Enhance the efficiency of your network monitoring tools by eliminating the potential of duplicate data streams
 

SSL Decryption

SSL Decryption
SSL Decryption
SSL Decryption
  • Provide visibility into encrypted sessions
  • Send decrypted packets to multiple out-of-band tools: IDS, DLP, APM, CEM, etc.
  • Private server keys are encrypted and protected by role-based access controls
 

Time Stamping

Time Stamping
Time Stamping
Time Stamping
  • Add Packet time stamps at line rate for subsequent analysis
  • Troubleshoot and measure application response times jitter and latency
 

Tunneling

Tunneling
Tunneling
Tunneling
  • Encapsulate and forward packets to monitoring tools between networks on separate routed paths
  • Enable routing of data from lights-out data centers to central monitoring facilities
 

Resources

SHARE