CRU 31030-1577-0000 User manual

Wiebetech Branding
2c85m76y
PMS 711C
66c7m7y
PMS 299C
Product Name:
Univers 73 Black Extended
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
CRU®WiebeTech®
Ditto® Network Tap Module
User Manual
Features
• Adds network tap functionality to the Ditto and Ditto DX Forensic FieldStations
• Captures Internet and VOIP traffic with virtually no packet loss*
• Captures sustained 10/100 Mbps network traffic and short burst gigabit network traffic*
• Filter and capture network traffic to a tcpdump/Wireshark-compatible PCAP file
• Optional live capture stream (rpcap) interface for Wireshark
• Fail-safe design continues passing through network traffic if power is lost
*Packet loss is a function of the type and saturation level of traffic on the tapped network

2
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
1 GENERAL INFORMATION
1.1 PACKAGE CONTENTS
The following list contains the items that are included in the
complete configuration for this device. Please contact CRU if
any items are missing or damaged:
Item Quantity
Network Tap Module 1
Ethernet cable (RJ45) 2
User Manual 1
1.2 IDENTIFYING PARTS
Take a moment to familiarize yourself with the parts of the
product. This will help you to better understand the following
instructions.
TABLE OF CONTENTS
1 General Information 2
1.1 Package Contents 2
1.2 Identifying Parts 2
1.3 How to Use the Network Tap Module 3
2 Setup 3
3 Network Tap Functionality 3
3.1 Home Screen 3
3.1.1 PCAP Network Capture 3
3.1.2 Live Network Capture 4
3.1.3 Simultaneous PCAP and Live Network Capture 5
3.2 Configure Screen 5
3.2.1 System 5
3.2.2 Network 6
3.3 Network Capture 6
3.3.1 Network Capture Settings 6
3.3.2 Live Capture Settings 7
3.3.3 Advanced Settings 7
3.4 Using and Configuring Network Capture Filters 7
3.4.1 Filter Creation Via Web Browser 7
3.4.2 Manual Filter Creation 8
3.5 Using the Front Panel Interface in Standalone Mode 9
4 Technical Specifications 10
USB 2.0 Port
FRONT
RJ45 Gigabit
Ethernet Connection
RJ45 Gigabit
Ethernet Connection
BACK
Expansion Module
Connector
USB 2.0
Passthrough

3
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
1.3 HOW TO USE THE NETWORK TAP MODULE
Use the Network Tap Module with the Source Inputs side of your Ditto or Ditto DX to intercept network
traffic that travels between the target computer and the network it is connected to. The available con-
nections include two RJ45 gigabit Ethernet ports and a USB 2.0 port for use with USB storage devices, a
keyboard, or a wifi adapter. Both RJ45 ports are direction agnostic, so it doesn’t matter which port is used
to connect to the network and which is used to connect to the target computer.
CRU recommends that you switch the power off to your Ditto product when you add or remove a
device from it in order to avoid disk damage and data corruption.
2 SETUP
a. With your Ditto product powered off, insert the Network Tap Module into the Source Inputs side of your
Ditto product.
b. Connect an Ethernet cable connected to your network into one of the RJ45 gigabit Ethernet ports on the
expansion module.
c. Connect another Ethernet cable to the remaining RJ45 gigabit Ethernet port on the expansion module and
connect the other end to your computer.
d. Turn your Ditto product on.
You are ready to start using your Ditto product with the Network Tap Module! You may access its settings
via the Browser Interface (see your Ditto product’s user manual) or via the Front Panel (see Section 3.5).
3 NETWORK TAP FUNCTIONALITY
The Network Tap Module adds several new actions and functions to the Ditto and Ditto DX browser interface
and Front Panel. They are listed below:
3.1 HOME SCREEN
The Network Tap Module adds a “Network Capture” action to Action panel on the “Home” screen of the
Browser Interface. Click on the Home tab to access the “Home” screen from any other area of the Browser
Interface.
The “Network Capture” action provides two methods of capturing network traffic that can be combined and
used simultaneously if you wish. The first method captures network traffic and stores it in a series of incre-
mented PCAP files on the local target destination. The second method captures network traffic in real-time
and outputs it to a remote monitor that uses a third-party Wireshark network protocol analyzer. Instructions
for both methods as well as instructions for using them simultaneously can be found below.
3.1.1 PCAP Network Capture
a. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
b. Select the network capture filter from the “Network Capture Filter” drop-down box or type in the
ports you wish to capture in the text box directly below. Use the syntax “port ## or ##” without
quotes (e.g. port 80 or 81 or 443).
c. Select “Network Tap” from the “Interface” drop-down box.
NOTE

4
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
d. Select the media from the “Destination” drop-down box that you want Network Tap Module to save
your captured data.
e. Select the partition on the destination media you want to capture to from the “Partition” drop-down
box.
f. Bypass “Live Network Capture” and leave it disabled.
g. Click the Start button to begin capturing network data. When you are finished, click the Stop
button.
You can view the log of the network capture action by scrolling down to the “System Log” panel on
the “Home” screen. Find and click on the latest link, which will be denoted by a filename with a date/
timestamp format: “S_yyyymmddhhmmss”. Alternatively, you can click on the Logs button from the
top menu bar.
You can view the data retrieved from the network capture action by examining the destination media,
which will contain a folder named with the same data/timestamp format: “S_yyyymmddhhmmss”. This
folder includes the PCAP files containing the captured data, an XML file containing the log information of
the network capture, and—if hashing is enabled—a TXT file that contains each of the generated PCAP
files’ MD5 or SHA-1 hash value (see Section 5.1.2 to enable hashing).
3.1.2 Live Network Capture
a. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
b. Select the network capture filter from the “Network Capture Filter” drop-down box or type in the
ports you wish to capture in the text box directly below. Use the syntax “port ## or ##” without
quotes (e.g. port 80 or 81 or 443)
c. Disregard the “Interface” and “Destination” drop-down boxes.
d. Ensure your third party Wireshark network protocol analyzer is standing by to receive data. If you
need help in configuring Wireshark itself, click the Information icon next to “Live Network Cap-
ture” for a link to Wireshark’s remote capture documentation.
e. Click the Enable button next to “Live Network Capture” to turn live network capture on. When you
are finished capturing network traffic, click the Disable button.
Do NOT click the Start button! This button actually enables the PCAP network capture function that
captures network traffic to your local destination media. It does NOT enable live network capture.
Figure 1. The “Action” section on the “Home” screen, showing
the options available for the “Network Capture” action.
STOP!

5
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
3.1.3 Simultaneous PCAP and Live Network Capture
a. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
b. Select the network capture filter from the “Network Capture Filter” drop-down box or type in the
ports you wish to capture in the text box directly below. Use the syntax “port ## or ##” without
quotes (e.g. port 80 or 81 or 443).
c. Select “Network Tap” from the “Interface” drop-down box.
d. Select the local media from the “Destination” drop-down box that you want Network Tap Module to
save your captured data to as a series of incremented PCAP files.
e. Select the partition on the local destination media you want to capture to from the “Partition” drop-
down box.
f. Ensure your third party Wireshark network protocol analyzer is standing by to receive data. If you
need help in configuring Wireshark itself, click the Information icon next to “Live Network Cap-
ture” for a link to Wireshark’s remote capture documentation.
g. Click the Enable button next to “Live Network Capture” to turn live network capture on. When you
are finished capturing network traffic, click the Disable button.
h. Click the Start button to begin capturing network data to your local destination media. When you
are finished, click the Stop button.
You can view the log of the PCAP network capture action by scrolling down to the “System Log” panel
on the “Home” screen. Find and click on the latest link, which will be denoted by a filename with a date/
timestamp format: “S_yyyymmddhhmmss”. Alternatively, you can click on the Logs button from the
top menu bar.
You can view the data retrieved from the PCAP network capture action by examining the destina-
tion media, which will contain a folder named with the same data/timestamp format: “S_yyyymmd-
dhhmmss”. This folder includes the PCAP files containing the captured data, an XML file containing the
log information of the network capture, and—if hashing is enabled—a TXT file that contains each of the
generated PCAP files’ MD5 or SHA-1 hash value (see Section 5.1.2 to enable hashing).
3.2 CONFIGURE SCREEN
The “Configure” screen now has several new options that modify the way the Network Tap Interface func-
tions to suit your specific needs. These options are listed below. Click on the Configure tab to access the
“Configure” screen from the Browser Interface.
3.2.1 System
The “System” tab allows you to view and customize the following new settings. This information is
also displayed in the “System Settings” panel on the “Home” screen. When you are finished, click the
Commit Changes button to save the changes.
Typical Settings
• Network Capture Filter: Sets the default network capture filter for the “Network Capture”
action. The available filters are All, HTTP, E-Mail, SSH, or any available custom filter that you

6
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
have saved onto the currently installed SD card. To create your own custom filter, see Section
11.3.
• Hash Type: Sets the default hash algorithm that will be used for disk verification, the “Hash
Disk” action, and now also PCAP file verification.
Available algorithms: None, MD5, SHA-1, SHA-256, MD5 & SHA-1, MD5 (SW) & SHA-1, MD5 &
SHA-1 (SW), MD5 & SHA256, MD5 (SW) & SHA-256, MD5 & SHA-256 (SW), MD5 (SW), SHA-1
(SW), MD5 (SW) & SHA-1 (SW), SHA-1 (SW) & MD5, SHA-1 (SW) & SHA-256, SHA-256 (SW) &
MD5, SHA-256 (SW), or SHA-512 (SW).
3.3 NETWORK CAPTURE
The new “Network Capture” tab allows you to view and customize the following new settings for all net-
work capture actions. When you are finished, click the Commit Changes button to save the changes.
3.3.1 Network Capture Settings
• Image File Count: Specifies the maximum number of image files that are created on the des-
tination disk. When the number is reached, the Network Tap Module will begin overwriting the
oldest file on the disk for each new file that is created. Set this to ‘0’ to fill the disk until it reaches
capacity.
• Image File Segment Size: Allows you to specify the size in bytes that each image file should be.
The minimum size is 1M (megabyte). The maximum size is limited by the target file system. If this
field is left blank, the maximum size will be used. When the specified size is reached, a new image
file is created. Click the Information icon for more information.
• Snap Size: Allows you to capture up to the specified amount of bytes of each packet of data. Click
the Information icon for more information.
• Dropped Pkt Log Interval: Allows you to specify the time interval in minutes of how often the
Network Tap Module writes its accumulated dropped packet information to the Action log. Setting
this value to ‘0’ disables packet loss reporting. Click the Information icon for more information.
Figure 2. The “Network Capture” tab on the “Configure” screen.

7
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
3.3.2 Live Capture Settings
When enabled, this service runs continuously in the background and streams captured data in realtime
over the network to a remote monitor using the third-party Wireshark network protocol analyzer. See
Section 4.1.1 for more information.
• Auto Start: Set this value to ‘Enabled’ to turn on live capture as soon as the Network Tap Module
is powered on. Set this value to ‘Disabled’ if you want the user to choose when to start the live
capture service in the Browser Interface.
• Port: This is the port that the Network Tap Module uses to talk to the third-party network protocol
analyzer software. The default port is 2002.
• Username: The username used by the third-party network protocol analyzer software.
• Password: The password used by the third-party network protocol analyzer software.
3.3.3 Advanced Settings
• Buffer Size: Sets the the buffer size used by the Network Tap Module during a network capture
action. The minimum size is 512K (kilobytes). The default size of 16M (megabyte) works best for
most use cases. Click the Information icon for more information.
• MTU: If you are using the Network Tap Module on a network that’s configured to a non-standard
maximum transmission unit size (e.g. it uses jumbo frames), then set this field to match that value.
Most Ethernet LANs will use the standard MTU of 1500. The commonly accepted range for a valid
MTU is 68 to 65,535 as defined in RFC 791. Click the Information icon for more information.
• Link Speed: Allows you to set the Ethernet connection speed throughput. In most cases, ‘Auto
Negotiate’ will work. If you experience problems staying connected, you may need to change the
speed to match what your network’s capabilities are.
3.4 USING AND CONFIGURING NETWORK CAPTURE FILTERS
Insert the SD Card containing your network capture filter(s) into the Network Tap Module and your custom
network capture filters will become available in the “Network Capture Filter” drop-down box when con-
figuring a “Network Capture” action. You may also add subdirectories that contain one or more network
capture filter XML files to the DittoNetCapFilter directory.
To add or edit your own network capture filter, choose the way that works best for your usage scenario.
3.4.1 Filter Creation Via Web Browser
a. Insert the SD Card into the SDCard slot on the rear of the Network Tap Module.
b. Using the Browser Interface, select Network Capture from the “Action to Perform” drop-down
box.
c. If you are editing an existing network capture filter that you created, select it from the “Network
Capture Filter” drop-down box.
d. Type in the ports you wish to capture in your network capture filter in the text box directly below the
“Network Capture Filter” drop-down box (see Figure 3). Use the word ‘or’ to separate each port.
e. Click the Save button. The “Save Network Capture Filter” dialog box will pop up (see Figure 4).

8
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
f. Use the “Select Filter...” drop-down box and select New Filter... to create a new filter or select an
existing filter to overwrite it.
g. Use the “Select File...” drop-down box and select New File... to create a new XML file, or select an
existing file to add your network capture filter to the file.
h. Type the desired filename into the “File Name” text box.
i. Type the desired name of the filter into the “Filter Name” text box.
j. Click the Save button to save the filter.
3.4.2 Manual Filter Creation
To manually create a network capture filter on an SD Card, you must manually create a DittoNetCap-
Filter directory on your SDCard first. Then you can add one or more network capture filter XML files to
that directory.
Create an XML file using the following structure and place it within the DittoNetCapFilter directory on
your SDCard:
<?xml version=”1.0” encoding=”UTF-8”?>
<!-- All attributes must be in single quotes if they contain double quotes.
-->
<dittoNetCapFilter
xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance”
xsi:noNamespaceSchemaLocation=”netCapFilter.xsd”
>
<fi lter title=”All”>insert port numbers here, separated by the word‘or’</
fi lter>
</dittoNetCapFilter>
The name of the network capture filter XML file can be any legal file name with an XML file extension.
Each XML file may contain one or more <filter title=”...”> blocks. The filter block’s title will appear at
the bottom of the “Network Capture Filter” selection list prepended with “SDCard/” followed by the
subdirectory’s name, if any.
You cannot remove existing selections from the Network Capture Filter list.
Figure 3. The “Action” screen, showing where to type in the
ports that you wish to capture with the “Network Capture”
action.
Figure 4. The “Save Network Capture Filter”
dialog box lets you save custom network
capture filters.
NOTE

9
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
To download an XML Schema that can be used to validate your network capture filter XML file, type
the following into the address bar of an Internet browser, where <IP Address> is the IP address of your
Network Tap Module: http://<IP Address>/data/DittoNetCapFilter/netCapFilter.xsd
Click the Information icon for a link to a site that describes the syntax supported by network capture
filters.
3.5 USING THE FRONT PANEL INTERFACE IN STANDALONE MODE
The Front Panel interface now allows you to perform a network capture and modify various settings about
its functionality. These new settings are listed herein.
3.5.1 Settings
The “Settings” screen allows you to view and customize the following new settings, which are grouped
into three subsections. These settings will be the default settings used in any actions performed.
The System Settings below cannot be modified if the Front Panel user account does not have full
access to the “Config” permission. See your Ditto product’s user manual for information on how to
customize the Front Panel user account.
System Settings
• Hash Type: Sets the default hash algorithm that will be used for disk verification, the “Hash
Disk” action, and now also PCAP file verification.
Available algorithms: None, MD5, SHA-1, SHA-256, MD5 & SHA-1, MD5 (SW) & SHA-1, MD5 &
SHA-1 (SW), MD5 & SHA256, MD5 (SW) & SHA-256, MD5 & SHA-256 (SW), MD5 (SW), SHA-1
(SW), MD5 (SW) & SHA-1 (SW), SHA-1 (SW) & MD5, SHA-1 (SW) & SHA-256, SHA-256 (SW) &
MD5, SHA-256 (SW), or SHA-512 (SW).
NetCap Settings
This new section allows you to modify the settings that govern network capture actions.
• NetCap Filter: Sets the default network capture filter for the “Network Capture” action. The
available filters are All, HTTP, E-Mail, SSH, or any available custom filter that you have saved
onto the currently installed SD card. To create your own custom filter, see Section 3.4.
• NetCap File Count: Specifies the maximum number of image files (based on image file seg-
ment size, see Section 3.3.1) that are created on the destination disk. When the number is
reached, the Network Tap Module will begin overwriting the oldest file on the disk for each
new file that is created. Set this to ‘0’ to fill the disk until it reaches capacity.
• NetCap Snap Size: Allows you to capture up to the specified amount of bytes of each packet
of data.
• NetCap Pkt Log Inter: Allows you to specify the time interval in minutes of how often the Net-
work Tap Module writes its accumulated dropped packet information to the Action log. Setting
this value to ‘0’ disables packet loss reporting.
• Live Capture: This service runs continuously in the background and streams captured data in
realtime over the network to a remote monitor using the third-party Wireshark network protocol
analyzer. See Section 3.1.2 for more information.
NOTE

10
Protecting Your Digital AssetsTM
Ditto Network Tap Module User Manual
• LiveCap Auto Start: Set this value to ‘Enabled’ to turn on live capture as soon as the Network
Tap Module is powered on. Set this value to ‘Disabled’ if you want the user to choose when to
start the live capture service in the Browser Interface.
• NetCap MTU: If you are using the Network Tap Module on a network that’s configured to a
non-standard maximum transmission unit size (e.g. it uses jumbo frames), then set this field
to match that value. Most Ethernet LANs will use the standard MTU of 1500. The commonly
accepted range for a valid MTU is 68 to 65,535 as defined in RFC 791.
• NetCap Link Speed: Allows you to set the Ethernet connection speed throughput. In most
cases, ‘Auto Negotiate’ will work. If you experience problems staying connected, you may need
to change the speed to match what your network’s capabilities are.
4 TECHNICAL SPECIFICATIONS
Product Name Ditto Network Tap Module
Ditto Family Compatibility Ditto Forensic FieldStation, Ditto DX Forensic FieldStation
Data Interface Types &
Speeds
1000BASE-T EtherNet: up to 1 Gbps
USB 2.0: up to 480 Mbps
Supported Drive Types External USB HDDs, SSDs and media card readers
Data Connectors Two (2) 1000BASE-T Ethernet connectors
One (1) USB 2.0 connectors
External material All-metal construction
Operating Humidity 5% to 95%, non-condensing
Power over Ethernet PoE+ (30W)
Compliance
EMI Standard: FCC Part 15 Class A
EMC Standard: EN55024, EN55032
CE, RoHS
Product Weight Standalone: 0.5 pounds (0.23 kg)
Product Dimensions 2.81in W x 4.94in L x 1.43in H (71.3mm W x 125.6mm L x 36.4mm H)
Technical Support
Your investment in CRU products is backed up by our free technical sup-
port for the lifetime of the product. Contact us through our website, www.
cru-inc.com/support or call us at 1-800-260-9800 or +1-360-816-1800.

For more information,
visit the CRU web site.
www.cru-inc.com
Part Number: A9-000-0061 Rev 1.0 1000 SE Tech Center Drive, Suite 160, Vancouver, WA 98683
© 2018 CRU Acquisition Group, LLC. ALL RIGHTS RESERVED.
This User Manual contains proprietary content of CRU Acquisition Group, LLC (“CRU”) which is protected by copyright, trademark, and other intellectual
property rights.
Use of this User Manual is governed by a license granted exclusively by CRU (the “License”). Thus, except as otherwise expressly permitted by that
License, no part of this User Manual may be reproduced (by photocopying or otherwise), transmitted, stored (in a database, retrieval system, or other-
wise), or otherwise used through any means without the prior express written permission of CRU.
Use of the full Network Tap Module product is subject to all of the terms and conditions of this User Manual and the above referenced License.
CRU®, WiebeTech®, and Ditto®(collectively, the “Trademarks”) are trademarks owned by CRU and are protected under trademark law. This User Manual
does not grant any user of this document any right to use any of the Trademarks.
Product Warranty
CRU warrants this product to be free of significant defects in material and workmanship for a period of three years from the original date of purchase.
CRU’s warranty is nontransferable and is limited to the original purchaser.
Limitation of Liability
The warranties set forth in this agreement replace all other warranties. CRU expressly disclaims all other warranties, including but not limited to, the
implied warranties of merchantability and fitness for a particular purpose and non-infringement of third-party rights with respect to the documentation
and hardware. No CRU dealer, agent, or employee is authorized to make any modification, extension, or addition to this warranty. In no event will CRU
or its suppliers be liable for any costs of procurement of substitute products or services, lost profits, loss of information or data, computer malfunction,
or any other special, indirect, consequential, or incidental damages arising in any way out of the sale of, use of, or inability to use any CRU product or
service, even if CRU has been advised of the possibility of such damages. In no case shall CRU’s liability exceed the actual money paid for the products
at issue. CRU reserves the right to make modifications and additions to this product without notice or taking on additional liability.
FCC Compliance Statement: “This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device
may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired opera-
tion.”
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will
be required to correct the interference at this own expense.
In the event that you experience Radio Frequency Interference, you should take the following steps to resolve the problem:
1) Ensure that the case of your attached drive is grounded.
2) Use a data cable with RFI reducing ferrites on each end.
3) Use a power supply with an RFI reducing ferrite approximately 5 inches from the DC plug.
4) Reorient or relocate the receiving antenna.
Table of contents
Other CRU PCI Card manuals