An Introduction to Drag-n-Vu™
Network Critical’s revolutionary Drag-n-Vu™ is a sophisticated computational engine with an intelligent and intuitive graphical user interface that enables fast, error-free configuration and simplifies change management.
• Enables delivery of your critical network data to your security and analysis tools in seconds
• Complete control and visibility, providing greater flexibility than other competing solutions
• Advanced mathematics create sophisticated rule-generation algorithms in the background
Fast and Simple Deployment
• Eliminate complexities of subnet and filters
• Patented Drag-n-Vu™ technology simplifies and guarantees correct configuration
• Enables user self-service
• Create filters and mapping data with drag and drop simplicity
Reduced Operational Costs
• Filter and mapping tasks can be performed by network administrators rather than engineering personnel
• Decrease down-time during maintenance windows
Connecting a variety of network monitoring and security tools that all perform different functions and require varying subsets of network data is complicated. Even relatively simple tools like firewalls are easily misconfigured.
Manually configuring what goes into these tools and what comes out is a painfully slow, error-prone task. Mistakes in filter hierarchies or port assignments can create security vulnerabilities and service interruptions.
With Drag-n-Vu™, the painstaking planning, computation and detailed input requirements are removed. You now have complete control and visibility at your fingertips. Creating filters and mapping data to input and output ports is as easy as dragging the cursor over a graphical port representation and clicking.
See How It Works:
Significantly reduce your operational costs
Manually configuring what goes in and what comes out of your security and monitoring tools is a painfully slow, error-prone task. Mistakes in filter hierarchies or port assignments can create security vulnerabilities and service interruptions. The simplicity of Drag-n-Vu™ not only speeds up deployment, but reduces operational cost by allowing filter and mapping tasks to be performed by network administrators rather than engineering personnel. In network management, where change is the only constant, moving tool management downstream not only saves money but also decreases down-time during maintenance windows.
Use Cases and Features
Simple and accurate traffic configuration to direct and
control traffic to performance and monitoring tools.
Create filters and flow-based data mapping with drag-
and-drop simplicity, ensuring rapid detection and
response to emerging threats.
Reduce operational costs and eliminate downtime during
maintenance windows without the need for specialist
A Drag-n-Vu™ use example: aggregation and filtering
Common use example: Aggregation & Filtering End-user has a number of SPAN ports and some ethernet TAPs in their architecture and want to leverage an IDS (Intrusion Detection System) to monitor their network for malicious activity or policy violations. In the below example we are showing 3 different ways to capture data traffic:
Module 1: This module shows 2 copper TAPs where A&C are transmit (Tx) and B&D are receive (Rx). Copies of the data traffic are pulled via the backplane, filtered for IPv4 traffic and then routed to module 4 port A
Module 2: This module shows 4 SPAN ports coming from network devices and aggregated in the backplane, filtered for IPv4 traffic and then routed to module 4 port A
Module 3: This module shows 4 ports connected from network TAPs and aggregated in the backplane, filtered for IPv4 traffic and then routed to module 4 port A
Module 4: This module shows all the filtered traffic from modules 1, 2 & 3 are being aggregated and sent to an IDS tool connected to port A.
This solution shows our hybrid TAP/packet broker aggregating all the traffic from different sources, applying a filter and then sending resulting data traffic to an IDS tool. NOTE: depending on the expected traffic volume, many end-users would enable load balancing and send multiple links to their IDS tools so no oversubscription could impact performance.
Filtered data traffic sent to IDS tool
1/10Gb SPAN ports
1Gb Copper Rx/Rx
Passive optical dual TAP
A common Drag-n-Vu™ use case: aggregation and filtering
Below is a screenshot of Drag-n-Vu™ showing the mapping & filtering for this example. Our easy to use interface also makes it easy to visually see the architecture. Deeper detail is available by clicking on a port, a module or the chassis. Note the built in load balancing which could be utilized if desired.
The Key to Fast, Simple Deployment
Network Critical’s revolutionary Drag-n-Vu™ is a sophisticated
computational engine with an intelligent and intuitive single-pane-of-glass graphical interface that enables fast, error-free configuration and simplifies change management.
Network Critical: Making Everyone the Expert
There's no need to referee your network and security teams. Network Critical's Network TAPs and Packet Brokers, along with their secret sauce, the Drag-n-Vu™ management system, are here to help by making everyone the expert.
SPEAK TO AN EXPERT
Together, we can find the perfect solution for your network
Cisco is a global leader in telecommunications, security, network infrastructure and IT applications. As an official Cisco Solution Partner, Network Critical helps provide visibility and access for Cisco security and performance monitoring solutions.