As part of the Gigamon Deep Observability Pipeline, the GigaVUE® TA Series of visibility nodes aggregates traffic from SPAN ports and network TAP devices installed across the network, giving a pervasive view into information in motion. To address networks of different speeds (1G, 10G, 25G, 40G, 100G, 400G) and scales, the series consists of a number of appliance models to select from.
The GigaVUE TA Series incorporates a set of core packet brokering capabilities, referred to as core intelligence, which help improve efficiency and reduce costs.
Effective network visibility, network monitoring and network security begins with a properly constructed visibility and analytics fabric at the edge, typically with traffic running over lower-speed links or relatively low-utilization, higher-speed links.
GigaVUE TA Series consists of edge visibility nodes that run GigaVUE-OS, incorporating a range of core intelligence packet-brokering capabilities to improve the effectiveness and efficiency of monitoring tools and gain visibility into cloud and remote sites. Clustering GigaVUE TA Series nodes with GigaVUE HC Series nodes extends and enables more pervasive visibility.
GigaVUE-FM provides single-pane-of-glass fabric management through which users can manage and orchestrate the deep observability pipeline.
The GigaVUE TA Series is especially useful for:
Regardless of size, each appliance runs the same GigaVUE-OS, supports end-to-end orchestration with GigaVUE-FM, and provides more intelligent traffic handling when combined with GigaVUE HC Series.
Attributes | GigaVUE-TA25 | GigaVUE-TA200 | GigaVUE-TA400 |
---|---|---|---|
Total throughput | 2Tb | 6.4Tb | 12.8Tb |
400Gb ports | - | - | 32 |
100Gb ports | 8 | 64 | 128 |
40Gb ports | 8 | 64 | 32 |
25Gb ports | 56 | 128 | 128 |
10Gb ports | 56 | 128 | 128 |
1Gb ports | 48 | - | - |
Header Stripping | Y | Y | Y |
Tunneling | Y | Y | Y |
Clustering | Y | Y | N * |
# Rack units | 1 | 2 | 1 |
*Coming in future release
“My highest priority was finding a solution that allowed us to watch more than the ocean of data passing at the network border, that allowed us to sharpen our focus on the data we care about most. Now, we feel more comfortable that we’re not missing traffic and are better able to highlight and inspect traffic of interest to reduce false positives and optimize inline security tool performance.”
To explore more use case videos, visit the Tech Hub.
We're here to help you find the right solution for your business.
By submitting this form, you agree to our Terms & Agreement. View our Privacy Statement.