• Adds network tap functionality to the Ditto and Ditto DX Forensic FieldStations
• Captures Internet and VOIP traffi c with virtually no packet loss*
• Captures sustained 10/100 Mbps network traffi c and short burst gigabit network traffi c*
• Filter and capture network traffi c to a tcpdump/Wireshark-compatible PCAP fi le
• Optional live capture stream (rpcap) interface for Wireshark
• Fail-safe design continues passing through network traffi c if power is lost
*Packet loss is a function of the type and saturation level of traffi c on the tapped network
Page 2
Ditto Network Tap Module User Manual
2
TABLE OF CONTENTS
1 General Information2
1.1 Package Contents2
1.2 Identifying Parts2
1.3 How to Use the Network Tap Module3
2 Setup3
3 Network Tap Functionality3
3.1 Home Screen3
3.1.1 PCAP Network Capture3
3.1.2 Live Network Capture4
3.1.3 Simultaneous PCAP and Live Network Capture5
3.2 Confi gure Screen5
3.2.1 System5
3.2.2 Network6
3.3 Network Capture6
3.3.1 Network Capture Settings6
3.3.2 Live Capture Settings7
3.3.3 Advanced Settings7
3.4 Using and Confi guring Network Capture Filters7
3.4.1 Filter Creation Via Web Browser7
3.4.2 Manual Filter Creation8
3.5 Using the Front Panel Interface in Standalone Mode9
4 Technical Specifi cations10
1 GENERAL INFORMATION
1.1 PACKAGE CONTENTS
The following list contains the items that are included in the
complete confi guration for this device. Please contact CRU if
any items are missing or damaged:
ItemQuantity
Network Tap Module1
Ethernet cable (RJ45)2
User Manual1
1.2 IDENTIFYING PARTS
Take a moment to familiarize yourself with the parts of the
product. This will help you to better understand the following
instructions.
FRONT
USB 2.0 Port
Protecting Your Digital Assets
RJ45 Gigabit
Ethernet Connection
RJ45 Gigabit
Ethernet Connection
BACK
Expansion Module
Connector
TM
USB 2.0
Passthrough
Page 3
Ditto Network Tap Module User Manual
3
1.3 HOW TO USE THE NETWORK TAP MODULE
Use the Network Tap Module with the Source Inputs side of your Ditto or Ditto DX to intercept network
traffic that travels between the target computer and the network it is connected to. The available con
nections include two RJ45 gigabit Ethernet ports and a USB 2.0 port for use with USB storage devices, a
keyboard, or a wifi adapter. Both RJ45 ports are direction agnostic, so it doesn’t matter which port is used
to connect to the network and which is used to connect to the target computer.
-
NOTE
CRU recommends that you switch the power off to your Ditto product when you add or remove a
device from it in order to avoid disk damage and data corruption.
2 SETUP
a. With your Ditto product powered off, insert the Network Tap Module into the Source Inputs side of your
Ditto product.
b. Connect an Ethernet cable connected to your network into one of the RJ45 gigabit Ethernet ports on the
expansion module.
c. Connect another Ethernet cable to the remaining RJ45 gigabit Ethernet port on the expansion module and
connect the other end to your computer.
d. Turn your Ditto product on.
You are ready to start using your Ditto product with the Network Tap Module! You may access its settings
via the Browser Interface (see your Ditto product’s user manual) or via the Front Panel (see Section 3.5).
3 NETWORK TAP FUNCTIONALITY
The Network Tap Module adds several new actions and functions to the Ditto and Ditto DX browser interface
and Front Panel. They are listed below:
3.1 HOME SCREEN
The Network Tap Module adds a “Network Capture” action to Action panel on the “Home” screen of the
Browser Interface. Click on the Home tab to access the “Home” screen from any other area of the Browser
Interface.
The “Network Capture” action provides two methods of capturing network traffic that can be combined and
used simultaneously if you wish. The first method captures network traffic and stores it in a series of incre
mented PCAP files on the local target destination. The second method captures network traffic in real-time
and outputs it to a remote monitor that uses a third-party Wireshark network protocol analyzer. Instructions
for both methods as well as instructions for using them simultaneously can be found below.
3.1.1 PCAP Network Capture
a. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
b. Select the network capture filter from the “Network Capture Filter” drop-down box or type in the
ports you wish to capture in the text box directly below. Use the syntax “port ## or ##” without
quotes (e.g. port 80 or 81 or 443).
c. Select “Network Tap” from the “Interface” drop-down box.
Protecting Your Digital Assets
TM
-
Page 4
Ditto Network Tap Module User Manual
4
d. Select the media from the “Destination” drop-down box that you want Network Tap Module to save
your captured data.
e. Select the partition on the destination media you want to capture to from the “Partition” drop-down
box.
f. Bypass “Live Network Capture” and leave it disabled.
g. Click the Start button to begin capturing network data. When you are fi nished, click the Stop
button.
You can view the log of the network capture action by scrolling down to the “System Log” panel on
the “Home” screen. Find and click on the latest link, which will be denoted by a fi lename with a date/
timestamp format: “S_yyyymmddhhmmss”. Alternatively, you can click on the Logs button from the
top menu bar.
You can view the data retrieved from the network capture action by examining the destination media,
which will contain a folder named with the same data/timestamp format: “S_yyyymmddhhmmss”. This
folder includes the PCAP fi les containing the captured data, an XML fi le containing the log information of
the network capture, and—if hashing is enabled—a TXT fi le that contains each of the generated PCAP
fi les’ MD5 or SHA-1 hash value (see Section 5.1.2 to enable hashing).
3.1.2 Live Network Capture
a. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
b. Select the network capture fi lter from the “Network Capture Filter” drop-down box or type in the
ports you wish to capture in the text box directly below. Use the syntax “port ## or ##” without
quotes (e.g. port 80 or 81 or 443)
c. Disregard the “Interface” and “Destination” drop-down boxes.
d. Ensure your third party Wireshark network protocol analyzer is standing by to receive data. If you
need help in confi guring Wireshark itself, click the
ture” for a link to Wireshark’s remote capture documentation.
e. Click the Enable button next to “Live Network Capture” to turn live network capture on. When you
are fi nished capturing network traffi c, click the Disable button.
STOP!
Do NOT click the Start button! This button actually enables the PCAP network capture function that
captures network traffi c to your local destination media. It does NOT enable live network capture.
Figure 1. The “Action” section on the “Home” screen, showing
the options available for the “Network Capture” action.
Information icon next to “Live Network Cap-
Protecting Your Digital Assets
TM
Page 5
Ditto Network Tap Module User Manual
5
3.1.3 Simultaneous PCAP and Live Network Capture
a. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
b. Select the network capture fi lter from the “Network Capture Filter” drop-down box or type in the
ports you wish to capture in the text box directly below. Use the syntax “port ## or ##” without
quotes (e.g. port 80 or 81 or 443).
c. Select “Network Tap” from the “Interface” drop-down box.
d. Select the local media from the “Destination” drop-down box that you want Network Tap Module to
save your captured data to as a series of incremented PCAP fi les.
e. Select the partition on the local destination media you want to capture to from the “Partition” drop-
down box.
f. Ensure your third party Wireshark network protocol analyzer is standing by to receive data. If you
need help in confi guring Wireshark itself, click the
ture” for a link to Wireshark’s remote capture documentation.
g. Click the Enable button next to “Live Network Capture” to turn live network capture on. When you
are fi nished capturing network traffi c, click the Disable button.
h. Click the Start button to begin capturing network data to your local destination media. When you
are fi nished, click the Stop button.
Information icon next to “Live Network Cap-
You can view the log of the PCAP network capture action by scrolling down to the “System Log” panel
on the “Home” screen. Find and click on the latest link, which will be denoted by a fi lename with a date/
timestamp format: “S_yyyymmddhhmmss”. Alternatively, you can click on the Logs button from the
top menu bar.
You can view the data retrieved from the PCAP network capture action by examining the destina-
tion media, which will contain a folder named with the same data/timestamp format: “S_yyyymmd-
dhhmmss”. This folder includes the PCAP fi les containing the captured data, an XML fi le containing the
log information of the network capture, and—if hashing is enabled—a TXT fi le that contains each of the
generated PCAP fi les’ MD5 or SHA-1 hash value (see Section 5.1.2 to enable hashing).
3.2 CONFIGURE SCREEN
The “Confi gure” screen now has several new options that modify the way the Network Tap Interface func-
tions to suit your specifi c needs. These options are listed below. Click on the Confi gure tab to access the
“Confi gure” screen from the Browser Interface.
3.2.1 System
The “System” tab allows you to view and customize the following new settings. This information is
also displayed in the “System Settings” panel on the “Home” screen. When you are fi nished, click the
Commit Changes button to save the changes.
Typical Settings
• Network Capture Filter: Sets the default network capture fi lter for the “Network Capture”
action. The available fi lters are All, HTTP, E-Mail, SSH, or any available custom fi lter that you
Protecting Your Digital Assets
TM
Page 6
Ditto Network Tap Module User Manual
6
have saved onto the currently installed SD card. To create your own custom fi lter, see Section
11.3.
• Hash Type: Sets the default hash algorithm that will be used for disk verifi cation, the “Hash
Disk” action, and now also PCAP fi le verifi cation.
<fi lter title=”All”>insert port numbers here, separated by the word‘or’</
fi lter>
</dittoNetCapFilter>
The name of the network capture fi lter XML fi le can be any legal fi le name with an XML fi le extension.
Each XML fi le may contain one or more <fi lter title=”...”> blocks. The fi lter block’s title will appear at
the bottom of the “Network Capture Filter” selection list prepended with “SDCard/” followed by the
subdirectory’s name, if any.
NOTE
You cannot remove existing selections from the Network Capture Filter list.
Figure 3. The “Action” screen, showing where to type in the
ports that you wish to capture with the “Network Capture”
action.
Protecting Your Digital Assets
TM
Figure 4. The “Save Network Capture Filter”
dialog box lets you save custom network
capture fi lters.
Page 9
Ditto Network Tap Module User Manual
9
To download an XML Schema that can be used to validate your network capture fi lter XML fi le, type
the following into the address bar of an Internet browser, where <IP Address> is the IP address of your
Network Tap Module: http://<IP Address>/data/DittoNetCapFilter/netCapFilter.xsd
Click the
fi lters.
Information icon for a link to a site that describes the syntax supported by network capture
3.5 USING THE FRONT PANEL INTERFACE IN STANDALONE MODE
The Front Panel interface now allows you to perform a network capture and modify various settings about
its functionality. These new settings are listed herein.
3.5.1 Settings
The “Settings” screen allows you to view and customize the following new settings, which are grouped
into three subsections. These settings will be the default settings used in any actions performed.
NOTE
The System Settings below cannot be modifi ed if the Front Panel user account does not have full
access to the “Confi g” permission. See your Ditto product’s user manual for information on how to
customize the Front Panel user account.
System Settings
• Hash Type: Sets the default hash algorithm that will be used for disk verifi cation, the “Hash
Disk” action, and now also PCAP fi le verifi cation.
This User Manual contains proprietary content of CRU Acquisition Group, LLC (“CRU”) which is protected by copyright, trademark, and other intellectual
property rights.
Use of this User Manual is governed by a license granted exclusively by CRU (the “License”). Thus, except as otherwise expressly permitted by that
License, no part of this User Manual may be reproduced (by photocopying or otherwise), transmitted, stored (in a database, retrieval system, or otherwise), or otherwise used through any means without the prior express written permission of CRU.
Use of the full Network Tap Module product is subject to all of the terms and conditions of this User Manual and the above referenced License.
CRU®, WiebeTech®, and Ditto® (collectively, the “Trademarks”) are trademarks owned by CRU and are protected under trademark law. This User Manual
does not grant any user of this document any right to use any of the Trademarks.
Product Warranty
CRU warrants this product to be free of significant defects in material and workmanship for a period of three years from the original date of purchase.
CRU’s warranty is nontransferable and is limited to the original purchaser.
Limitation of Liability
The warranties set forth in this agreement replace all other warranties. CRU expressly disclaims all other warranties, including but not limited to, the
implied warranties of merchantability and fitness for a particular purpose and non-infringement of third-party rights with respect to the documentation
and hardware. No CRU dealer, agent, or employee is authorized to make any modification, extension, or addition to this warranty. In no event will CRU
or its suppliers be liable for any costs of procurement of substitute products or services, lost profits, loss of information or data, computer malfunction,
or any other special, indirect, consequential, or incidental damages arising in any way out of the sale of, use of, or inability to use any CRU product or
service, even if CRU has been advised of the possibility of such damages. In no case shall CRU’s liability exceed the actual money paid for the products
at issue. CRU reserves the right to make modifications and additions to this product without notice or taking on additional liability.
FCC Compliance Statement: “This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device
may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.”
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will
be required to correct the interference at this own expense.
In the event that you experience Radio Frequency Interference, you should take the following steps to resolve the problem:
1) Ensure that the case of your attached drive is grounded.
2) Use a data cable with RFI reducing ferrites on each end.
3) Use a power supply with an RFI reducing ferrite approximately 5 inches from the DC plug.
4) Reorient or relocate the receiving antenna.
Part Number: A9-000-0061 Rev 1.01000 SE Tech Center Drive, Suite 160, Vancouver, WA 98683
For more information,
visit the CRU web site.
www.cru-inc.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.