What is a network tap?

A network tap is a piece of hardware that allows you to monitor the computer network line. Tap is a physical device that is located in a network environment that allows the user to monitor the activity in the network section. In general, the installation of one of these devices requires interruption or redirecting of the network service because the lines are arranged to create space for the device. Although there are many legitimate reasons for using a network knock, there are also several illegal or unethical uses. By clicking the network, it allows the person to monitor the activity via the cable section by physical inserting the device to the line. This term is similar to clicking on the phone where the third party is able to listen to phone calls using the Click device.

In most cases, the network tap consists of three ports. Two ports are connected to the network cable -tapping on - called ports A and B. One of them is the output for monitoring devices such as a computer or storage unit. Network pOrty usually requires real closed cables. This is one of the largest restrictions when using a network click.

Because ports A and B require a cable with a finished end, a place where the tap can enter the system is very limited. In general, a person can disconnect a network cable from a hardware device such as a router or a switch, connect it to the knock and start a new piece of cable into the hardware device. This means that the tapper must have direct physical access to the network. If you need to click a remote location, the tapper must trim the cable and end the ends before the device can use.

In both cases, the network is temporarily disconnected when it is located by clicking. If there is no tap Bezanction, this outage may notify that one interferes with your network. Although the outage missed, the system can record the existence of a new passive hop on the network.

network administrators often use network toFlowers to monitor the user's activity and ensure that the network works as it should. This use of a network tap is within the network owner's rights and is not invasion of privacy regardless of the information observed. On the other hand, some taps are located to stole personal data or learn passwords and login information for the TAPP system. This application is against the law in almost any case.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?