top of page
Network TAPs

Network TAPs

Gain total intelligent access for 100% of your network's traffic.

Network TAPs page
Ethernet TAPs

Understanding Network TAPs

TAPs (test access points), commonly known as Ethernet or Network TAPs, are stand-alone hardware devices that make an exact copy of all of the traffic that flows between two end-points in a network. They are usually favoured because they are independent of the network, making them fully configurable. The copied traffic, from the TAP, is then able to undergo complex packet manipulation, as it is output to various network tools; such as security and performance tools. All this is completed while the live traffic continues to pass through the network, without disturbance. 

Network TAPs are the base layer of Smart Network Access and are able to monitor various events on a local network, meaning total visibility is maintained across all of the network's security and monitoring platforms, which is vital for the performance of any and all networks.





Deep Packet















Network Critical's SmartNA Network TAP range is unique to the market as each TAP has been built by us from the ground-up. This allows for more a tailored device that suits your needs, which makes for an ideal TAP for any purpose for use, be it monitoring, security or for performance. The SmartNA TAPs are also able to aggregate, filter, slice, dice, mask, strip and more to help you get the information you need to perform your best.

network tool deployment
Untitled design (3).png


We continuously strive for improvement to ensure we deliver the highest-quality products.

How Do Network TAPs Work?
Part 2: The TAP Strategy

Ensure the smooth running of your entire Network Management by creating a TAP Strategy that suits your needs. Say goodbye to messy data, missing packets and network down-time.

Modular Ethernet TAP

Intelligent Hybrid TAPs

Network Critical’s hybrid TAPs provide high quality performance and flexibility needed to manage tools that protect network infrastructure, secure information and keep up with the ever-changing attack environment. 

Active Ethernet TAPs

Bypass TAPs with heartbeat technology provide real-time network security without sacrificing network reliability or availability. Network Critical’s SmartNA-XL™ TAPs with 10/40G Bypass module provides the high-speed performance needed to connect security tools and protect network traffic in real-time. 

Modular network tap

Passive Fiber TAPs

Passive Fiber TAP
Passive Network TAP

These passive TAPs provide secure and simple access to the live traffic in your high speed production networks, without introducing latency or a point of failure. Installed into key links in your production network our passive optical LC and MPO TAPs pass all full-duplex traffic, including errors, to your monitoring network for unbeatable visibility. Network Critical offers several Passive TAP solutions including:

  • Passive Fiber TAPs for 10Mb~100Gb

  • Passive Fiber TAP modules for SmartNA-XL System

  • High Density - up to 36 taps in 1U 

  • MTP® Elite Connectors Available

  • Front/Rear Cable Management System

TAP aggregation


Aggregate SPAN/TAP traffic feeds across multiple network links, filtering, optimizing and feeding the combined traffic to connected security and monitoring tools for further analysis

Network filtering


Identify traffic based on signature or patterns across any part of the packet - or corresponding to application sessions - and forward to security appliances, increasing their efficacy and performance.

Load Balancing


Distribute traffic among multiple ports based on a variety of options: hashing, bandwidth, cumulative traffic, packet rate, connections, and more.

eBook Library

Network Visibility Checklist

The Network Visibility Checklist

Network Critical’s Guide to Planning, Selecting and Deploying TAP and Packet Broker Technology

network critical experts


Together, we can find the perfect solution for your network

We understand your privacy is important. Network Critical does not share your personal information with any unauthorized parties. For more information on how we use your personal data, please review our Privacy Policy.

bottom of page