A network tap instead is a fully passive device. Electrically or optically (e.g. using a prism) packets are copied onto the tap ports. Unless you use an aggregation tap, a tap has one tap port per direction. This means that in order to monitor 1 link, you need 2 NICs, one for the first and the other for the second direction. In this case you won’t ever loose a single packet as in the mirror case, because each direction is using a link, instead of merging both directions onto the same link. Network Taps are available for copper and Fiber lines from 1G to 100G. Fiber tap installation incurs minimal network latency. Copper based are technologies implemented to not disturb the network line in case of powerless Copper Tap.

Aggregation Taps

Aggregation Taps are aggregating the RX- and TX traffic of one network link to one monitoring port. Therefore it is possible to analyze the Full Duplex network traffic on one single interface. After aggregating the TX - and RX traffic to one single port, the aggregated traffic is regenerated to a second monitoring port, providing the possibility to have a second monitoring tool to analyze the Full Duplex traffic with also just one NIC. The monitoring link can be oversubscribed in this case.

Regeneration Taps

Regeneration Network TAPs provide a safe and simple way to access live network traffic and provide copies to one or many monitoring ports. Aggregation and Regeneration network TAPs allow you to connect multiple Network Tools and Analyzers for your monitoring solutions

Virtual Taps

Virtual Tap bridges the physical and virtual, so that you can monitor the virtualized network with your existing set of tools. With this technology is capable of capturing and then sending inter-VM traffic of interest to the tools that are already monitoring your physical network. Virtualization Taps provide 100% visibility of traffic passing between Virtual Machines (VMs) in virtualized computing environments and clouds. Virtualization Taps include integrated management and monitoring tools for your virtualized monitoring layer. These versatile software devices also send monitored traffic in encapsulated tunnels to physical monitoring tools, so you can use your existing tools and infrastructure to monitor your virtual environment.