Skip to content

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that

  • It can be over subscribed, and the lowest priority when it comes to forwarding all the packets to the intended device.
  • Using a SPAN port is processor-intensive and can have a negative performance on the switch itself.

To avoid this we can use a network TAP which is a simple device that connects directly to the cabling infrastructure to split or copy packets for monitoring purposes such as security or packet capture devices.

So where do I deploy a tap? A quick answer to this is anywhere you need 100% of the data all the time from L1 to L7. The above diagram is also a useful reference guide.

Thank you to ProfiTap for the article.

Related Posts

Everything You Need to Know About Flyaway Kits — And How to Build One for IT and OT Networks

Everything You Need to Know About Flyaway Kits — And How to Build One for IT and OT Networks

In the world of network performance and cybersecurity, the ability to move fast can make the difference between a quick…
Why Use an In-House NTP Server Over Public

Why Use an In-House NTP Server Over Public

Accurate time synchronization is a critical part of keeping modern networks running smoothly. Every log entry, security event, and data…
ProfiShark: Portable, High-Fidelity Packet Capture for Modern Network Troubleshooting

ProfiShark: Portable, High-Fidelity Packet Capture for Modern Network Troubleshooting

Gain Complete Network Visibility — Anywhere, Anytime Network professionals know that accurate packet capture is the foundation for diagnosing performance,…
From Alerts to Scoreboards: Bodet’s Modular Solutions for Facilities

From Alerts to Scoreboards: Bodet’s Modular Solutions for Facilities

Bodet offers a wide range of modular and scalable solutions designed to improve communication, safety, and engagement across various environments.…
Understanding Network Impairment Emulation: Building Resilient and High-Performance Networks

Understanding Network Impairment Emulation: Building Resilient and High-Performance Networks

Modern networks are more complex than ever — spanning cloud, edge, and on-prem environments with applications that depend on consistent,…