How to Capture Traffic
  • 21 Mar 2022
  • 3 Minutes to read
  • Contributors
  • Dark
    Light
  • PDF

How to Capture Traffic

  • Dark
    Light
  • PDF

Article Summary

SkyLIGHT capture: sensor can rely on two mechanisms to capture network traffic: port mirroring (commonly called SPAN) and terminal access point (TAP).

Port mirroring

Port mirroring, also known as SPAN or roving analysis, is a method of monitoring network traffic which forwards a copy of each incoming and/or outgoing packet from one (or several) port(s) (or VLAN) of a switch to another port where the analysis device is connected. Port mirroring can be managed locally or remotely. To configure the port mirroring, an administrator selects one or several ports from which all packets will be copied (source ports) and another port or ports to which the copy of the packets will be sent (destination port). The administrator can include either all packets in the port mirroring or only the transmitted/received packets. If both transmitted and received packets are included, a packet going from one monitored port to another will be copied twice to the destination port. This will have an impact on the measures and performance provided by the analysis device (e.g., retransmission rates, response times, etc.). SkyLIGHT capture: sensor captures and evaluates the data without any impact to the original traffic.

The port mirroring is the most commonly used solution to capture traffic because it is inexpensive, flexible in terms of how much traffic can be captured at once, and remotely configurable.

Please note that a port mirroring may have some drawbacks, such as:

  • It can consume significant CPU resources while active
  • There is a risk of not receiving some packets (due to media errors)
  • In the case of traffic congestion at the switch level, the port mirroring is likely to drop some traffic (because the SPAN process does not have priority).

In some cases, a better solution for long-term monitoring may be a passive TAP or an Ethernet repeater (”hub”).

Advantages

  • Low cost (this feature is embedded in most switches)
  • Can be configured remotely through IP or Console port
  • The only way to capture intra-switch traffic
  • A good way to capture traffic on several ports at once

Drawbacks

  • Not adequate for fully utilized full-duplex links (packets may be dropped)
  • Filters out physical errors
  • Impact on the switch’s CPU
  • Can alter the timing of the frame (with an impact on response time analysis)
  • SPAN has a lesser priority than port to port data transfer

Network TAP

A network TAP (Terminal Access Point) is a hardware device which can passively capture traffic on a network. It is commonly used to monitor the network traffic between two points in the network. If the network between these two points consists of a physical cable, a network TAP may be the best way to capture traffic. The network TAP has at least three ports: a port A, a port B, and a monitor port. To place a tap between points A and B, the network cable between point A and point B is replaced with a pair of cables, one going to the TAP’s A port, one going to the TAP’s B port. The TAP passes all traffic between the two network points, so they are still connected to each other. The TAP also copies the traffic to its monitor port, enabling an analysis device to listen. Network TAPs are commonly used by monitoring and collection devices. They can also be used in security applications because they are non-obtrusive, are not detectable on the network, can deal with full-duplex and non-shared networks, and will usually pass through traffic even if the tap stops working or loses power.

Advantages

  • No risk of dropped packets
  • Monitoring of all packets (including hardware errors - MAC and media)
  • Provides full visibility including congestion situations.

Drawbacks

  • The device may require two listening interfaces on the analysis device
  • Costly
  • No visibility on intra-switch traffic
  • Not appropriate for the observation of a narrow traffic range.

© 2024 Accedian Networks Inc. All rights reserved. Accedian®, Accedian Networks®,  the Accedian logo™, Skylight™, Skylight Interceptor™ and per-packet intel™, are trademarks or registered trademarks of Accedian Networks Inc. To view a list of Accedian trademarks visit: http://accedian.com/legal/trademarks/. 


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.