Deep packet inspection

APCON's deep packet inspection (DPI) technology sees the data payload as well as the header of a packet that travels through a visibility switch, identifying and eliminating any packets non-compliant to network policy, violating spam protocols, containing viruses or malware, or any user-defined criteria to prevent the packet from passing through the inspection node.

Deep traffic awareness can be acted upon to analyze user behavior, prioritize business-critical traffic, or stop data leaks.

Set your own rules

Identify all hidden threats

Deep packet inspection (DPI), also known as complete packet inspection, is used to monitor network traffic at the packet level. Unlike conventional packet filtering, DPI can analyze not just headers but examine protocols and application data as well as the actual content of packets. Our advanced DPI-based packet classification offers complete IP traffic visibility up to Layer 7. It enables traffic classification, automatically detecting over 1600 applications and 400 protocols in real time with a high degree of accuracy. We can identify applications, protocols, and packets with a certain type of payload, even when traffic is encrypted or obfuscated, and react accordingly.

Since DPI allows IT teams to categorize traffic based not just on data — like origin server IP, destination IP, or ports used — but also things like traffic type, relative or actual payload, or protocol, they can search for non-compliance with policies or filtering rules, spam, viruses, and malware. Based on inspection results, they can then filter out low-risk flows to protect existing tools or classify, reroute, drop, mask, or alert on packets that match.

This kind of packet inspection keeps tools running efficiently, provide immediate insight into network threats or slowdowns, and determine whether reduced throughput is caused by the network or an application.


  • Pattern matching included with all IntellaFlex XR HyperEngine blades

  • Application filtering, traffic shaping, and pattern matching are licensable for IntellaView HyperEngine blades

  • real time processing across 1G / 10G / 25G / 40G / 100G feeds

  • Easily create new filters through the GUI


  • Eliminate bottlenecks, latency, and slow data speeds

  • Ensure maximum performance of your monitoring tools

  • Classify, reroute, or restrict specific applications & protocols

  • Prevent buffer overflow attacks, denial-of-service (DoS) attacks, spam, viruses, and malware

Take a test drive

Schedule a demo today for access to our online demo center and see IntellaView's deep packet inspection capabilities using live traffic data.

Schedule a demo

Deep packet inspection hardware

Stop data leaks, block malware

Evaluate the data and the header of a transmitted packet, filtering out any non-compliance to protocol, spam, viruses, and intrusions. Deep packet inspection is a licensable feature on the following APCON hardware:

Ultra-high performance network visibility


The IntellaView HyperEngine enables real time packet processing of 100G network traffic to prevent tool oversubscription and supports up to 600G total throughput through six packet processing service engines that can be run concurrently.

Explore IntellaView
Deep packet inspection blades
  • IntellaView

    HyperEngine Packet Processor


    • real time processing across 1G / 10G / 40G / 100G feeds, supporting up to 600G total throughput
    • Shared source ports can use the same service engine
    • Application filtering, pattern matching, traffic shaping, packet deduplication, and NetFlow record generation,
    Learn more

1G / 10G / 40G legacy platform

IntellaFlex XR

The IntellaFlex XR HyperEngine network packet broker blade adds up to 200G of high-performance processing features to IntellaFlex XR monitoring systems. With up to 16 configurable service points, it provides real time processing across 1G / 10G / 40G / 100G feeds.

Deep packet inspection blades
  • IntellaFlex XR



    • Performance up to 200G
    • 16 internal service points, 2 40G Ethernet ports
    • Packet deduplication, NetFlow generation, tunnel termination, packet slicing, protocol header stripping, and pattern matching
    Learn more

White Paper

Today's data centers need network packet brokers

This EMA white paper presents various emerging network and security operations requirements, what to look for when evaluating a network packet broker, and the essentials needed for your digital journey.

Footer Menu

We've got answers.

Get in touch


Subscribe to our newsletter

Get the latest news sent right to your inbox.

We're hiringView positionsVisit our careers page

© 2022 APCON, Inc. All rights reserved.

Privacy Policy