Search

Network tunneling

Tunnel initiation and termination are services that can be applied to APCON ports allowing them to be used as tunnel sources or destinations. Tunneling protocols allow for the movement of packets from one network to another, both physical and virual, on-premises or remote, getting traffic of interest to the tools that need to see it.

Tunneling allows you to route and deliver traffic where it needs to be analyzed or stored.

Easy tunnel termination

The right packets to the right places

Tunneling works by encapsulating packets, basically wrapping packets inside of other packets. In an encapsulated packet, the header and payload of the first packet goes inside the payload section of the surrounding packet so the original packet essentially becomes the payload.

Terminating encapsulated tunnel traffic enables multiple applications including virtual network monitoring. IntellaTap-VM virtual TAPs use tunnel encapsulation to forward VM traffic of interest to the monitoring network while the IntellaView platform's tunnel termination feature decapsulates the tunnel traffic to ensure tool compatibility.

Network tunelling is an easy way to transport various traffic from once place to another, such as from blind spots or remote sites to the tools that need to see it, regardless of the environment.

Features

Benefits

  • Encapsulate GRE tunnel and direct traffic over IPv4 / IPv6 networks

  • Direct traffic between IntellaView at remote locations and IntellaView at the core data center

  • Direct traffic to on-premises or cloud-based tools

  • Decapsulates tunnel traffic to ensure tool compatibility

Take a test drive

Schedule a demo today for access to our online demo center to see how easy it is to use IntellaView to set up tunneling between local or remote, physical or virtual sources on a live aggregation switch.

Schedule a demo

Network tunneling solutions

Get control of all your traffic

Provide your IT teams access to any traffic anywhere within your organization, local or remote, physical or virtual. Tunneling is a licensable feature on the following APCON hardware:

Ultra-high performance network visibility

IntellaView

APCON's IntellaView Management Interface for our industry-leading IntellaView platform provides easy-to-configure tunnel initiation and termination. This feature will be available soon on the new 600G IntellaView HyperEngine packet processor as well.

Explore IntellaView
Tunnel initiation / termination blades
  • IntellaView

    52-Port Multi-Function

    ACI-4030-E52

    • 48 ports capable of supporting 1G, 10G or 25G
    • 4 ports of 40G / 100G
    • Tunnel initiation & termination, protocol header stripping, and packet slicing
    Learn more
  • IntellaView

    36-Port Multi-Function

    ACI-4030-E36

    • 36 x 40G / 100G front panel ports, 2 40G Ethernet ports
    • Can support 144 1G / 10G / 25G ports with breakouts
    • Packet deduplication, tunnel initiation & termination, protocol header stripping, and packet slicing
    Learn more
  • IntellaView

    EdgeSwitch

    ACI-4432-EDG-1

    • Traffic filtering: Pre-filter and send traffic to security tools.
    • Traffic aggregation: Aggregate top-of-rack switches, consolidate remote sites, and simplify traffic management for advanced processing
    • Port tagging: Gain visibility into where network traffic originates to increase network security, now including ERSPAN-based VLAN tagging
    Learn more

1G / 10G / 40G legacy platform

IntellaFlex XR

Tunneling is also available via the WebXR graphical user interface for our IntellaStore II+, IntellaFlex XR multi-function blades and IntellaFlex XR HyperEngine packet processor.

Tunnel initiation / termination blades
  • IntellaFlex XR

    HyperEngine

    ACI-3033-E02-1

    • Performance up to 200G
    • 16 internal service points, 2 40G Ethernet ports
    • Packet deduplication, NetFlow generation, tunnel termination, packet slicing, protocol header stripping, and pattern matching
    Learn more
  • IntellaFlex XR

    IntellaStore II+

    ACI-3033-S14-2

    • 12 ports 1G / 10G and 2 ports 40G Ethernet
    • Integrated analysis tool server
    • Packet deduplication, NetFlow generation, tunnel termination, packet slicing, protocol header stripping, and packet time stamping
    Learn more

White Paper

Today's data centers need network packet brokers

This EMA white paper presents various emerging network and security operations requirements and what to look for when evaluating a network packet broker and the essentials you'll need for your digital journey.

Footer Menu

Questions?
We've got answers.

Get in touch

Hardware

Subscribe to our newsletter

Get the latest news sent right to your inbox.

We're hiringView positionsVisit our careers page
Search
Search
LinkedIn
Twitter
Facebook
YouTube

© 2022 APCON, Inc. All rights reserved.

Privacy Policy