Column Control DTX

Vision ONE (Model: Vision ONE) Network Packet Broker

Data Sheets

Introduction

 

Amplify your security without changing a cable. Keysight Vision ONE provides IT Operations the ability to deploy resources where they are needed most and secure any traffic in their network.

 

Keysight Vision ONE acts as the first step to security, providing reliable inline connectivity for security tools such as intrusion prevention systems (IPS), data loss prevention (DLP), and Web firewalls. It simultaneously connects out-of-band monitoring tools like intrusion detection systems (IDS) and data recorders.

 

Integrated intelligence features enable you to access encrypted traffic using inline or out-of-band decryption, reduce analysis traffic using advanced packet processing, and precisely select traffic by application type, and geography. Keysight Vision ONE forwards selected traffic in a variety of formats to interoperate with any security tool.

 

Highlights

 

• Extends the reach of security tools to access the entire network

• Supports inline and out-of-band monitoring use cases

• Inline and Out-of-Band Decryption options with stateful, clear text output

• Supports VOIP / VoLTE (SIP/RTP Correlation)

• Supports line-rate packet deduplication, header stripping and other advanced features, including cascading operations

• Supports L2GRE termination from vTap and L2GRE Origination to WAN

• Supports protocol header stripping for all known protocols, standard or proprietary

• Enables identification of applications by bandwidth, session, and geography

• Supports simultaneous packet forwarding and generation of NetFlow v9 and v10 (IPFIX) records and JSON records

• Supports both fan-in and fan-out to increase 10/40G port density

• “Double your ports” when ports are in simplex mode

• Delivers frequent updates via ATI subscription

• Priority-based filtering including inline and HA configuration supported

• IFC clustering with other Vision platforms to offer single pane of glass management

• IFC clustering and inline HA are recognized as the best in the industry

 

Key Features

 

• Powerful GUI allows you to focus on security rather than configuration—the industry-leading user interface and patented filter compiler make configuration simple for both inline and out-of-band topologies

• CLI support for NetStack and inline features

• Inline Decryption the ability to decrypt and re-encrypt traffic as a transparent proxy for both inline and out-of-band tool deployments. Offloads the decryption burden from tools to improve ROI and security performance

• Out-of-Band Decryption provides downstream security tools with plain text content, so they do not need to support or incur the performance overhead of decrypting traffic to find hidden threats

• VOIP / VoLTE support provides correlation, sampling and whitelisting of SIP/RTP traffic. Allows visibility into Evolved Packet Core (EPC) and IP Multimedia Core Network Subsystem (IMS) interfaces based on SIP messaging.

• Zero-loss advanced packet processing improves security tool efficiency through techniques such as deduplication and packet trimming without dropping packets.

• Classify traffic in real time with hundreds of pre-loaded application signatures, and direct it to the correct tool according to parameters such as application type, geolocation, or even handset type—so tools get just the traffic type they need, again optimizing your investment in tool infrastructure

• Sophisticated load balancing distributes traffic across several tools for monitoring or inline in serial or parallel to maximize up-time and ensure that no critical data is lost

• Comprehensive wizards make inline tool deployment extremely easy for complex use cases that require tool sharing or VLAN translation

• Space efficient 1RU design saves rack space in your data center

•Secure serial console port with authentication 

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX