AFM16 and 7300 Cassette


7300 Carrier

7300 AFM





4x40G (non-advanced) 2x Cassette Bays

8x40G and 16x10G

Size and Weight

4.4” x 7.2” x 1.0” (inches)

0.6lb (0.27kg)

6.4” x 9.8” x 1.4” (inches)

2.25lbs (1.02kg)

6.4” x 9.8” x 1.4” (inches)

2.25lbs (1.02kg)

1.75” x 17.5” x 15” (inches)

18lbs (8.2kg)

1.75” x 17.5” x 15” (inches)

14.8lbs (6.7kg)

Power Consumption




300W with 2x AFM16 Cassettes



  • Operating temp: 0 to 30°C
  • Operating humidity: 10 to 85%, noncondensing
  • Fans: Automatic temperature-controlled DC fans
  • Operating temp: 5 °C to 40 °C
  • Short-term* -5°C to 55°C
  • Short-term* with fan failure: -5°C to 40°C

*not to exceed 96 consecutive hours


Ixia offers an extensive set of visibility intelligence feature stacks so you can get the most out of your visibility and security platform – our capabilities allow filtering based on L2 through L7. Moreover, we provide industry-specific, specialized capabilities. Each stack of features is executed with a purpose-built design to ensure you get the best performance whether in a physical data-center or a private, hybrid or public cloud.

See how we stack up!

PacketStack Features

  • Deduplication
  • Header Stripping
  • Packet Trimming
  • Timestamping
  • Deduplication

    Deduplication Deduplication

    Don’t overload your tools - remove repeat data to deliver a unique stream to your tools so they can operate at their peak.

    • Use with other packet processing features at full line-rate without dropping packets!
    • Flexible configuration parameters – can apply this at ingress, dynamic or egress filters
    • Can disregard specific headers as required
    • Control deduplication window based on memory and time


  • Header Stripping

    Header Stripping Header (Protocol) Stripping

    Detect and remove headers so data can be easily analyzed by security and monitoring (IPS, IDS, NGFW, etc.) tools that do not support such protocols

    • Protocols and headers removed: Cisco Fabric path, VLAN or QinQ, VNTag, GTP, VXLAN, L2GRE/NVGRE, MPLS – L2VPN/VPLS with or without Control Word, L3VPN
  • Packet Trimming

    Packet Trimming Packet Trimming

    Send only what security and monitoring tools need by cutting out the unnecessary information and reducing packet size

    • Improve security by protecting sensitive user data – remove personally identifiable information (PII) for PCI compliance
    • Increase tool efficiency, by reducing average frame length by 75%
    • Trim packets from 64-16342 bytes and using many offset templates (MAC, VLAN, MPLS, etc)
    • Original packet length can be retained as part of Ixia trailer
  • Timestamping

    Timestamping Timestamping

    Network operators require high-accuracy timestamps on packets to correlate events with other device logs in low-latency financial data centers and to correlate traffic events across a WAN. With this feature, you can insert a high-accuracy timestamp into every packet at ingress.

    • Timestamp sources include local, PTP and NTP
    • Highly accurate – nanoseconds
    • Support timestamping at all speeds (1/10/40/100G)
    • Support for Wireshark, Riverbed, Corvil, and other popular analysis tools

PacketStack Features

  • Data Masking
  • GRE Tunneling
  • Burst Protection
  • Data Masking

    Data Masking Data Masking

    Hide or overwrite sensitive or personally identifiable information (PII) before providing the data to analysis tools. Achieve regulatory compliance for HIPAA, PCI-DSS financial transactions and more

    • Hide information you want to protect
    • Keep your customers and other info secure
    • Overwrite packet with any number of bytes at user configurable offset
    • Predefined offset templates for easy header skipping (start of L2, end of L2, end of L3)
    • For pre-defined credit card and other templates, check out Data Masking Plus, a part of AppStack
  • GRE Tunneling


    Encapsulate and de-encapsulate data to send and receive it from different sites and platforms within your environment. Encapsulation is mandatory for security reasons while packets traverse a WAN.

    • Integrate traffic from virtual tools (such as CloudLens), via L2GRE & ERSPAN, to a physical network packet broker for tools to process
    • Preserves complete L2 information, such as original MAC addresses
  • Burst Protection

    Burst Protection Burst Protection (Deep Packet Buffering)

    Burst protection or deep packet buffering allows monitoring tools to see everything without dropped packets when traffic exceeds tool bandwidth. The burst protection feature creates a “buffer” between the ingress ports where taps are connected and the egress port where tools are connected. Traffic is retained and moderated out to tools, to ensure tools get all relevant data.

    • Meet peak traffic needs more efficiently with less tools
    • Manage micro bursts more effectively to prevent unnecessary drops



Packet filtering capabilities that can be used ALL AT ONCE without packet loss! Go ahead and manipulate your traffic anyway you want – deduplicate, stamp, trim away – it will still all be there because with Ixia, you can use the features simultaneously. Your tools will get relevant traffic and in a format that is easy for them to process. Plus, we offer burst protection, to further prevent your tools from dropping packets also. All of this, still through a point and click configuration.

Ixia ensures all of its technology is purpose-built for performance, so that you can use all the features you want without concerns. All your packets will get to your tools because we use a dedicated hardware accelerator in our network packet brokers.