GigaSMART
GigaSMART | Drive your traffic with intelligence

GigaSMART

Drive your traffic with intelligence

GigaSMART

  • Overview
  • Features & Benefits
  • Resources

GigaSMART® technology extends the intelligence and value of the Gigamon Unified Visibility Fabric™ by enhancing your monitoring infrastructure and improving tool performance. A range of applications are available to optimize the traffic sent from your network to the tools you rely upon to monitor, manager, and secure that network. GigaSMART’s advanced processing engine can be accessed anywhere within the Visibility Fabric without port- or card-based restrictions. GigaSMART engines can be combined to process higher traffic loads and optimized for specific applications. Operations can be combined or “service chained” so traffic benefits from multiple functions at once, such as generating NetFlow after duplicates have been removed or stripping headers before load balancing to tools.

Network monitoring tools perform more efficiently by eliminating unwanted content with the de-duplication and packet slicing features. SSL Decryption provides visibility into encrypted sessions, sending decrypted packets to out-of-band monitoring tools. Masking allows network security teams to hide confidential information such as passwords, financial accounts, or medical data, allowing companies to meet SOX, HIPAA and PCI compliance regulations. Organizations can improve accuracy with the source port labeling and time stamping capabilities, which allow the addition of source or timing information at the point of collection. Enhanced packet distribution features available with Adaptive Packet Filtering or load balancing enable enhanced visibility into packet contents and, when combined with header stripping, allow tools to operate more effectively by removing unwanted protocol headers.

The advanced processing capabilities of the GigaSMART engine can also be leveraged to summarize and generate NetFlow statistics from incoming traffic streams. Offloading NetFlow Generation to the out-of-band Gigamon Visibility Fabric eliminates the risk of expending expensive production network resources in generating these analytics. Enhanced flow-level visibility across remote locations and Big Data environments can be used to derive usage patterns, top talkers, top applications, and more, for effective capacity planning and enforcing security policies.

Quick Specs

  • High-performance compute engine
  • Available on GigaVUE H Series and GigaVUE-2404
  • Packet transformation, packet modification, and stateful session correlation
  • Service chaining capability to combine multiple GigaSMART operations
  • Advanced traffic intelligence available across the entire cluster without any port-level or card-level restrictions

 

Features & Benefits

  • Grid View
  •  
  •  

Adaptive Packet Filtering

Adaptive Packet Filtering
Adaptive Packet Filtering
Adaptive Packet Filtering
  • Intelligent protocol-aware filtering across advanced encapsulation headers including VXLAN, VN-Tag, GTP, MPLS, etc., and inner (encapsulated) Layer3/Layer4 packet contents
  • Advanced visibility into the application layer using pattern matching and regular expressions-based filters
  • Mask private and sensitive data in the packet before it gets stored, maintaining SOX, PCI, and HIPAA compliance
 

De-duplication

De-duplication
De-duplication
De-duplication
  • Relieve tool processing resources when packets are gathered from multiple collection points along a path by only forwarding a packet once
  • Remove packet duplication caused by inter-VLAN communication or incorrect switch configuration
 

ERSPAN Termination

ERSPAN Termination
ERSPAN Termination
ERSPAN Termination
  • Provides tunnel termination of ERSPAN sessions enabling consolidation, filtering, and forwarding of relevant ERSPAN traffic
  • Enable analysis tools to receive filtered traffic from remote networks
 

FlowVUE™

FlowVUE™
FlowVUE™
FlowVUE™
  • Flow-aware sampling of active subscriber devices to selectively reduce traffic
  • Preserve or increase CEM based on real-time reduced data analytic throughput
  • Leveraging Big Data to tailor marketing campaigns, pricing strategies, etc., based on subscriber usage patterns
 

GTP Correlation

GTP Correlation
GTP Correlation
GTP Correlation
  • Optimize tool infrastructure by accurate filtering, replicating, and forwarding monitored subscriber sessions
  • Correlate subscriber sessions (control and data) to offload tools, increasing throughput
  • Facilitate drilldowns into roaming users across peer networks
 

Header Stripping

Header Stripping
Header Stripping
Header Stripping
  • Eliminate the need for monitoring tools to decipher protocols
  • Allow easy filtering, aggregation, and load balancing of packets with headers removed
  • Support for ISL header/trailer removal and VXLAN, VNTAG, VLAN, MPLS, and GTP-U tunnel stripping
 

Load Balancing

Load Balancing
Load Balancing
Load Balancing
  • Distribute traffic among multiple ports based on a variety of options: hashing, bandwidth, cumulative traffic, packet rate, connections, and round robin
  • Apply weighting to the traffic distribution, supporting different tool capacities
  • Hashing options include: IP, IP-and-Port, five-tuple, and GTP-u tunnel ID
  • Load balancing is included with all GigaVUE H Series GigaSMART licenses except NetFlow
 

Masking

Masking
Masking
Masking
  • Overwrite packet data between a 64-9000 byte offset
  • Conceal private data including financial and medical information
 

NetFlow Generation

NetFlow Generation
NetFlow Generation
NetFlow Generation
  • Increase infrastructure efficiencies and broaden visibility by offloading NetFlow Generation to the Visibility Fabric
  • Generate NetFlow records without sampling to facilitate true response and root cause capability
  • Simultaneously provide flow statistics and raw packets to a variety of monitoring, analysis, and security tools in an integrated traffic visibility solution
  • Export records to up to six (6) collectors supporting NetFlow v5/v9 and IPFIX
 

Packet Slicing

Packet Slicing
Packet Slicing
Packet Slicing
  • Reduce packet size to increase processing and monitoring throughput
  • Optimize the deployment of forensic recorder tools
  • Enable more data storage in a recorder application
 

Source Port Labeling

Source Port Labeling
Source Port Labeling
Source Port Labeling
  • Add labels to the packets indicating the ingress port
  • Easily identify where a packet is coming from
  • Enhance the efficiency of your network monitoring tools by eliminating the potential of duplicate data streams
 

SSL Decryption

SSL Decryption
SSL Decryption
SSL Decryption
  • Provide visibility into encrypted sessions
  • Send decrypted packets to multiple out-of-band tools: IDS, DLP, APM, CEM, etc.
  • Private server keys are encrypted and protected by role-based access controls
 

Time Stamping

Time Stamping
Time Stamping
Time Stamping
  • Add Packet time stamps at line rate for subsequent analysis
  • Troubleshoot and measure application response times jitter and latency
  • Applicable for GigaVUE-2404
 

Tunneling

Tunneling
Tunneling
Tunneling
  • Encapsulate and forward packets to monitoring tools between networks on separate routed paths
  • Enable routing of data from lights-out data centers to central monitoring facilities
 

Resources

SHARE