Drag-n-Vu

A single-pane-of-glass network management system, at your fingertips

Ethernet TAPs

An Introduction to Drag-n-Vu™

Network Critical’s revolutionary Drag-n-Vu is a sophisticated computational engine with an intelligent and intuitive graphical user interface that enables fast, error-free configuration and simplifies change management.

Total Visibility
 

• Enables delivery of your critical network data to your security and analysis tools in seconds
 

• Complete control and visibility, providing greater flexibility than other competing solutions

• Advanced mathematics create sophisticated rule-generation algorithms in the background

Network Management System

 Fast and Simple Deployment
 

• Eliminate complexities of subnet and filters
 

• Patented Drag-n-Vu™ technology simplifies and guarantees correct configuration
 

• Enables user self-service
 

• Create filters and mapping data with drag and drop simplicity

 

Network GUI

Reduced Operational Costs

​• Filter and mapping tasks can be performed by network administrators rather than engineering personnel.

 

• Decrease down-time during maintenance windows

Graphical User Interface

Connecting a variety of network monitoring and security tools that all perform different functions and require varying subsets of network data is complicated. Even relatively simple tools like firewalls are easily misconfigured.

 

Manually configuring what goes into these tools and what comes out is a painfully slow, error-prone task. Mistakes in filter hierarchies or port assignments can create security vulnerabilities and service interruptions.

 

With Drag-n-Vu™, the painstaking planning, computation and detailed input requirements are removed. You now have complete control and visibility at your fingertips. Creating filters and mapping data to input and output ports is as easy as dragging the cursor over a graphical port representation and clicking.

See How It Works:

Significantly reduce your operational costs

Manually configuring what goes in and what comes out of your security and monitoring tools is a painfully slow, error-prone task. Mistakes in filter hierarchies or port assignments can create security vulnerabilities and service interruptions. The simplicity of Drag-n-Vu™ not only speeds up deployment, but reduces operational cost by allowing filter and mapping tasks to be performed by network administrators rather than engineering personnel. In network management, where change is the only constant, moving tool management downstream not only saves money but also decreases down-time during maintenance windows.
 

Use Cases and Features

  • Simple and accurate traffic configuration to direct and
    control traffic to performance and monitoring tools.

     

  • Create filters and flow-based data mapping with drag-
    and-drop simplicity, ensuring rapid detection and
    response to emerging threats.

     

  • Reduce operational costs and eliminate downtime during
    maintenance windows without the need for specialist
    engineering personnel.

A Drag-n-Vu™ use example: aggregation and filtering

Common use example: Aggregation & Filtering End-user has a number of SPAN ports and some ethernet TAPs in their architecture and want to leverage an IDS (Intrusion Detection System) to monitor their network for malicious activity or policy violations. In the below example we are showing 3 different ways to capture data traffic:

 

  • Module 1: This module shows 2 copper TAPs where A&C are transmit (Tx) and B&D are receive (Rx). Copies of the data traffic are pulled via the backplane, filtered for IPv4 traffic and then routed to module 4 port A
     

  • Module 2: This module shows 4 SPAN ports coming from network devices and aggregated in the backplane, filtered for IPv4 traffic and then routed to module 4 port A
     

  • Module 3: This module shows 4 ports connected from network TAPs and aggregated in the backplane, filtered for IPv4 traffic and then routed to module 4 port A
     

  • Module 4: This module shows all the filtered traffic from modules 1, 2 & 3 are being aggregated and sent to an IDS tool connected to port A.

This solution shows our hybrid TAP/packet broker aggregating all the traffic from different sources, applying a filter and then sending resulting data traffic to an IDS tool. NOTE: depending on the expected traffic volume, many end-users would enable load balancing and send multiple links to their IDS tools so no oversubscription could impact performance.

drag-n-vu

Filtered data traffic sent to IDS tool

1/10Gb SPAN ports

1Gb Copper Rx/Rx
(RJ-45 ports)

Passive optical dual TAP

A common Drag-n-Vu™ use case: aggregation and filtering

Below is a screenshot of Drag-n-Vu showing the mapping & filtering for this example. Our easy to use interface also makes it easy to visually see the architecture. Deeper detail is available by clicking on a port, a module or the chassis. Note the built in load balancing which could be utilized if desired.

Drag-n-vu Network Critical

The Key to Fast, Simple Deployment

Network management platform

Network Critical’s revolutionary Drag-n-Vu™ is a sophisticated 
computational engine with an intelligent and intuitive single-pane-of-glass graphical interface that enables fast, error-free configuration and simplifies change management.

Network Critical: Making Everyone the Expert

There's no need to referee your network and security teams. Network Critical's Network TAPs and Packet Brokers, along with their secret sauce, the Drag-n-Vu™ management system, are here to help by making everyone the expert.

network critical

SPEAK TO AN EXPERT

Together, we can find the perfect solution for your network

We understand your privacy is important. Network Critical does not share your personal information with any unauthorized parties. For more information on how we use your personal data, please review our Privacy Policy.

Technology Partnerships

Cisco is a global leader in telecommunications, security, network infrastructure and IT applications. As an official Cisco Solution Partner, Network Critical helps provide visibility and access for Cisco security and performance monitoring solutions.

Cisco Logo