Skip to content

Two common methods to copy traffic to your monitoring or security tools is a Span port or network tap. Span can be convenient for quick troubleshooting, remote locations or when you do not have access to the physical infrastructure. The risk of using a span port is that

  • It can be over subscribed, and the lowest priority when it comes to forwarding all the packets to the intended device.
  • Using a SPAN port is processor-intensive and can have a negative performance on the switch itself.

To avoid this we can use a network TAP which is a simple device that connects directly to the cabling infrastructure to split or copy packets for monitoring purposes such as security or packet capture devices.

So where do I deploy a tap? A quick answer to this is anywhere you need 100% of the data all the time from L1 to L7. The above diagram is also a useful reference guide.

Thank you to ProfiTap for the article.

Related Posts

Network Time Synchronization: A Complete Guide

Network Time Synchronization: A Complete Guide

Learn how accurate network time synchronization is crucial for operations, security, and performance in various applications, from finance to IoT.
Network Visibility: Security Applications of Network TAPs, Brokers and Bypass Switches

Network Visibility: Security Applications of Network TAPs, Brokers and Bypass Switches

Security starts with awareness, but what happens when critical traffic slips through unnoticed? For security teams and network administrators alike,…
Why Cheap Standalone Clocks Cost You More: The Case for Synchronized & PoE Clocks

Why Cheap Standalone Clocks Cost You More: The Case for Synchronized & PoE Clocks

Accurate and synchronized timekeeping is crucial for maintaining operational efficiency in any organization. While inexpensive standalone clocks might seem appealing…
Profitap Cloud TAP: Unlocking Full Network Visibility in Kubernetes Environments

Profitap Cloud TAP: Unlocking Full Network Visibility in Kubernetes Environments

Achieving comprehensive visibility into network traffic across diverse environments is a critical challenge for IT teams. Profitap‘s Cloud TAP emerges…
AI-Generated Threats - Why your NDR can’t keep up and how to fix it with CySight CEO Rafi Sabel

AI-Generated Threats - Why your NDR can’t keep up and how to fix it with CySight CEO Rafi Sabel

In today’s rapidly evolving cyber threat landscape, the emergence of AI-generated attacks has posed significant challenges to traditional Network Detection…