SlideShare a Scribd company logo
Local cable television advertising is a tricky business.Commercial content comes
from many sources.National commercials are generated by Madison Avenue
advertising agencies,while local content comes from both regional and local
agencies.Collecting,managing,and distributing this diverse content and then
inserting it into various cable lineups is a management headache.
Sending television commercials
over the Internet raises security concerns
About Adlink
Adlink sells TV advertising
in Los Angeles across
44 cable networks.
S O L S O F T @ W O R K
“In the past, we relied on the privacy of
our network for security,” says Andrew
Dahl, the staff engineer at Adlink. But
how quickly things change.
“Our first task is to protect ourselves from
ourselves,” Dahl says, explaining that as
Adlink’s distribution network gets more
tightly linked with its business network,
the integration that results ends up
exposing the content-delivery network
to the outside world. Now Adlink must
worry about the sorts of things that plague
all net-enabled businesses: hackers, the
theft of proprietary information, Internet
scams, and worms, viruses, and Trojans.
Adlink first turned to Cisco to address its
security needs. “We were evaluating several
Cisco products, but what we really wanted
was a product that would not only secure
our network, but also could help us manage
the entire network from a central location,”
says Dahl. “After getting a clearer picture of
our needs, Cisco ended up recommending
a company called Solsoft.”
Solsoft was brought in to add policy
management to the basic goal of securing
an increasingly complex network. Adlink
delivers television commercial spot content
over Layer 3 IP via an ATM network. The
commercials are in MPEG format and
are transported from six different source
locations to over 80 video advertising
servers throughout Southern California.Each
advertising server then inserts commercial
content on one of the 44 cable networks
that Adlink serves. The 3500 insertion
points mentioned earlier each contain
opportunities (“avails”) for approximately
200 thirty-second commercials per day.
This represents nearly 700,000 commercial
insertions being performed within the
Adlink network on any given day,along with
additional error message traffic and other
diagnostics. In total there are approximately
1 million transaction or status messages per
day traveling on the network,in addition to
the very large MPEG files and schedule files.
That’s a lot of traffic.“Up until recently,Adlink
operated on a closed, private ATM network
with no other points of ingress, but due an
increasing need to integrate the data from
our various partners, we are having to open
our network up to allow multi-domain/owner
data paths,” says Dahl.
In Southern California,a company called Adlink
handles this complex task.Adlink maintains a
distribution network that delivers commercials
to the cable system operators covering 99%
of the cable homes in the Los Angeles/Palm
Springs “DMA”(Nielsen ratings terminology
for designated marketing area), the second
largest market in the US. Those cable systems
are physically segmented into 80 separate ad
insertable or “targetable”zones,each carrying
44 ad insertable cable networks.
The matrix of 80 zones by 44 networks produces
a set of over 3500 insertion points, each
requiring MPEG files and schedule files (along
with the return of logfiles and management
information) on a daily basis 365x24.
The key to this business is the ability to deliver
content over an IP network. However, as
Adlink’s previously private network becomes
increasingly tied into public networks,a new
concern has emerged:security.
Private Networks are No Longer Private
44 cable networks in the Adlink digital interconnect...
A complex task
T V & N E T W O R K
A D L I N K S T A T I S T I C S
Adlink has grown to become the nation's leading
digital interconnect capable of delivering several
hundredthousandspotsadayto 80cablesystems
where they air on 44 cable networks. Adlink's
systems are linked by 4,000 miles of IP/ATM network,
covering an area of more than 22,000 square
miles in Southern California.
LOS ANGELES DMA STATISTICS
Total Population:17,242,485 *
Total Households:5,554,300 **
TV Households:5,431,140 **
Adlink Cable Households:3,100,000 **
** Source:Nielsen,Los Angeles,Jan 2005
+ Nielson Palm Springs,Nov 2004
* SRC:Total Population,Average HH Income,
Ethnicity (based on Adlink universe - 2004
est.based on 2000 census)
Andrew Dahl, Staff Engineer
S O L S O F T @ W O R K
Adelphia are merging their corporate networks with
various private networks; distribution networks and
business networks are feeding into one another more
and more; and Adlink has to accommodate all of these
trends. Solsoft’s Policy Server helped them create order
out of chaos.Policy Server is an open system
for the centralized management of firewalls,
routers, switches, and VPNs. What made this
solution so appealing to Adlink was that it
actually manages heterogeneous security
environments. Most vendor management
software is designed to work only with that
vendor’s own gear. With Solsoft a customer
can combine various best-in-class products
from such companies as Cisco,Juniper,Check
Point, Nortel, and Symantec, and make all of
these products work together holistically.
“Once we heard about Solsoft,”explains Dahl,
“we scoured the Internet for other companies
doing the same thing. There was no one else
doing what they do, and that made the
decision easy for us. We went with Solsoft.”
Using Solsoft Policy Server, Adlink’s Operations
and IT staffs were able to define, document,
deploy, and audit policies across its complex
system of networks. Solsoft’s policy-based
system hardens networks against attacks
and human error by making sure security
rules are consistent end-to-end – something
that in large, distributed, heterogeneous
networks is practically impossible to do
manually or through various vendor-specific
management tools.
Policing the flow of traffic
“We needed a management solution that could accommodate
changing security policies on a month-to-month,
week-to-week, and day-to-day basis,” says Dahl.
To harden its ATM network, Adlink first deployed Cisco
831 routers in core locations and Cisco PIX 525 firewalls
at their affiliate locations. This helped secure the point
of ingress for affiliate network connections,but a centralized
system was still needed to manage those different devices,
one that would not be cumbersome or require a heavy
amount of manual configuration.
With Solsoft Policy Server in place, complex security
policies comprising access control, network address
translation,and anti-spoofing rules are now consistent
and enforceable throughout the network.Only certain
types of traffic are permitted over the ATM network,
and return traffic is tightly controlled within the ATM
network, thus freeing the content-delivery network
from superfluous traffic.
“Return traffic was a problem,” Dahl says, “but through
the Solsoft console, we can eliminate a lot of unnecessary
protocols like telnet or ftp over the ATM network.”
Even if those ports are disallowed,in the past,affiliates
or even certain software programs could open them
back up. With Solsoft Policy Server, not only are those
Creating security policies isn’t enough
©1997-2005 Solsoft.Solsoft and Solsoft NP are trademarks of Solsoft.Solsoft product specifications are subject to change without notice.Solsoft is protected
by French patent N° FR97/13254 and may be protected by other US patents,foreign patents or pending applications.All trademarks are the property of their respective owners.
Solsoft,Inc.
2065 Landings Drive
Mountain View,CA 94043
USA
+1 (650) 428 2800 tel
+1 (650) 428 2804 fax
Solsoft S.A.
47-53,Rue Raspail
92300 Levallois-Perret
France
+33 (0)1 47 15 04 00 tel
+33 (0)1 47 15 55 09 fax
Solsoft Central Europe
Prinzenallee 7
40549 Düsseldorf
Germany
+49 (0)211 52 391 550 tel
+49 (0)211 52 391 507 fax
Solsoft UK,Ltd.
1 Berkeley Street
London - W1J 8DJ
United Kingdom
+44 (0)20 7016 9090 tel
+44 (0)20 7016 9100 fax
E-mail :info@solsoft.com
www.solsoft.com
policies consistently enforced, but also the
change control process is carefully monitored
thanks to built-in reporting and workflow.
Centralizing the security management
function is a major theme in today’s
compliance-conscious IT environments.But
beyond the reporting that is so typical of
most security monitoring products,Solsoft
delivers intrinsic value by automating what
is normally an error-prone and labor-intensive
process,namely the configuration of security
policies across single-vendor and
heterogeneous networks.
“Solsoft Policy Server saves us a ton of time,”
Dahl noted. “Previously, if we implemented
a new security policy, we had to telnet into
every router and firewall and manually add
an access line entry. With Solsoft’s easy
front-end interface, what used to take several
hours now takes 10 minutes.”
Finally,Dahl says that Adlink was impressed by
the affordability of the Solsoft solution.
“Just from the time savings alone, we estimate
that we’ll see ROI within the first 24-30
months.”
T V & N E T W O R K
UPS
OC3
Connection
Cisco Router
T-1 DSU/CSU
Ethernet
DISTRIBUTION
CHANNEL
Connection to
Affiliate HQ’s
ADLINK / AFFILIATE
HEADEND
ADLINK
HEADQUARTERS
Workstations
Ethernet
T-1 DSU/CSU
T-1 DSU/CSU
T-1
Connection
Network
Distribution
Multicast
n CUBE
Alphaserver
RAID
Storage
Quality
control
MEPG2
Encoder
MEPG2
Encoder
nCube /
ADLINK-
Ad Insertion
System
nCube /
ADLINK-
Ad Insertion
System
nCube /
ADLINK-
Ad Insertion
System
nCube /
ADLINK-
Ad Insertion
System
Thus,even a simple matter such as controlling what types
of traffic flow over the network then becomes a concern.
Dahl believed that this situation would only worsen over
time. Cable operators are now looking to directly stream
commercials; major cable companies like Comcast and
For more info...

More Related Content

What's hot

What's hot (19)

Microsoft Telecommunications Industry News | April 2021
Microsoft Telecommunications Industry News | April 2021Microsoft Telecommunications Industry News | April 2021
Microsoft Telecommunications Industry News | April 2021
 
Quick Quote App Portfolio
Quick Quote App PortfolioQuick Quote App Portfolio
Quick Quote App Portfolio
 
Cor review2018-a
Cor review2018-aCor review2018-a
Cor review2018-a
 
"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth"Islands of Connectivity" are harming profitability and slowing growth
"Islands of Connectivity" are harming profitability and slowing growth
 
Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...
Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...
Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...
 
Rock Networks 2016
Rock Networks 2016Rock Networks 2016
Rock Networks 2016
 
5g, creating everything connection architecture - C&T RF Antennas Inc
5g, creating everything connection architecture - C&T RF Antennas Inc5g, creating everything connection architecture - C&T RF Antennas Inc
5g, creating everything connection architecture - C&T RF Antennas Inc
 
Telco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 ExcerptTelco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 Excerpt
 
Telindus telecom-brochure
Telindus telecom-brochureTelindus telecom-brochure
Telindus telecom-brochure
 
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, MatoomaDWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
 
Multimode, The Key Ingredient For Ubiquitous Connectivity
Multimode, The Key Ingredient For Ubiquitous ConnectivityMultimode, The Key Ingredient For Ubiquitous Connectivity
Multimode, The Key Ingredient For Ubiquitous Connectivity
 
How three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionHow three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolution
 
The Evolution of Edge computing
The Evolution of Edge computingThe Evolution of Edge computing
The Evolution of Edge computing
 
5g technologies
5g technologies5g technologies
5g technologies
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing Lane
 
Intersil Corp Strategy Case Study
Intersil Corp Strategy Case StudyIntersil Corp Strategy Case Study
Intersil Corp Strategy Case Study
 
Cellular Internet of Things white paper
Cellular Internet of Things white paperCellular Internet of Things white paper
Cellular Internet of Things white paper
 
An Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case StudiesAn Introduction to IoT: Connectivity & Case Studies
An Introduction to IoT: Connectivity & Case Studies
 
Blind cache: a solution to content delivery challenges in an all-encrypted web
Blind cache: a solution to content delivery challenges in an all-encrypted webBlind cache: a solution to content delivery challenges in an all-encrypted web
Blind cache: a solution to content delivery challenges in an all-encrypted web
 

Viewers also liked

C Potgieter Fluorspar 15 presentation Overall
C Potgieter Fluorspar 15 presentation OverallC Potgieter Fluorspar 15 presentation Overall
C Potgieter Fluorspar 15 presentation Overall
Chris Potgieter
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media Strategy
Xtraordinary Women
 

Viewers also liked (11)

C Potgieter Fluorspar 15 presentation Overall
C Potgieter Fluorspar 15 presentation OverallC Potgieter Fluorspar 15 presentation Overall
C Potgieter Fluorspar 15 presentation Overall
 
Effectively Arguing Constitutional Speedy Trial Violations in Georgia Crimina...
Effectively Arguing Constitutional Speedy Trial Violations in Georgia Crimina...Effectively Arguing Constitutional Speedy Trial Violations in Georgia Crimina...
Effectively Arguing Constitutional Speedy Trial Violations in Georgia Crimina...
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media Strategy
 
Driving the New Era of Immersive Experiences
Driving the New Era of Immersive ExperiencesDriving the New Era of Immersive Experiences
Driving the New Era of Immersive Experiences
 
10.20.15
10.20.1510.20.15
10.20.15
 
If I were to Start a Media Business...
If I were to Start a Media Business...If I were to Start a Media Business...
If I were to Start a Media Business...
 
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...
 
Continuous Delivery, DevOps, Cloud - New Requirements for New Architectures
Continuous Delivery, DevOps, Cloud - New Requirements for New ArchitecturesContinuous Delivery, DevOps, Cloud - New Requirements for New Architectures
Continuous Delivery, DevOps, Cloud - New Requirements for New Architectures
 
COMPANIES CUSTOMERS
COMPANIES  CUSTOMERSCOMPANIES  CUSTOMERS
COMPANIES CUSTOMERS
 
Single page apps with drupal 7
Single page apps with drupal 7Single page apps with drupal 7
Single page apps with drupal 7
 

Similar to Andrew at Adlink

Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
Nagui Chalache
 
RagingWire Case Study - Flextronics
RagingWire Case Study - FlextronicsRagingWire Case Study - Flextronics
RagingWire Case Study - Flextronics
Robert Lindsay
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Christopher Lietz
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Juniper Networks
 
Ethernet services
Ethernet servicesEthernet services
Ethernet services
Oscar Erazo
 
Discussion post responses.Please respond to the following two di.docx
Discussion post responses.Please respond to the following two di.docxDiscussion post responses.Please respond to the following two di.docx
Discussion post responses.Please respond to the following two di.docx
madlynplamondon
 
Now Corporation Marketing Book
Now Corporation Marketing BookNow Corporation Marketing Book
Now Corporation Marketing Book
Now Corporation
 

Similar to Andrew at Adlink (20)

Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
RagingWire Case Study - Flextronics
RagingWire Case Study - FlextronicsRagingWire Case Study - Flextronics
RagingWire Case Study - Flextronics
 
Einführung in die Cloud-Technologie
Einführung in die Cloud-TechnologieEinführung in die Cloud-Technologie
Einführung in die Cloud-Technologie
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
Avoid the Pitfalls of Migrating Your Solutions to the Cloud
Avoid the Pitfalls of Migrating Your Solutions to the CloudAvoid the Pitfalls of Migrating Your Solutions to the Cloud
Avoid the Pitfalls of Migrating Your Solutions to the Cloud
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Ensuring Business Continuity with Last-Mile Diversity and Redundancy
Ensuring Business Continuity with Last-Mile Diversity and RedundancyEnsuring Business Continuity with Last-Mile Diversity and Redundancy
Ensuring Business Continuity with Last-Mile Diversity and Redundancy
 
PDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdfPDT 94 - $15m - Series A - Cloudsmith.pdf
PDT 94 - $15m - Series A - Cloudsmith.pdf
 
Ethernet services
Ethernet servicesEthernet services
Ethernet services
 
Discussion post responses.Please respond to the following two di.docx
Discussion post responses.Please respond to the following two di.docxDiscussion post responses.Please respond to the following two di.docx
Discussion post responses.Please respond to the following two di.docx
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
PLNOG 7: Jos Martens, Bart van der Sloot - Internet updates from around the w...
PLNOG 7: Jos Martens, Bart van der Sloot - Internet updates from around the w...PLNOG 7: Jos Martens, Bart van der Sloot - Internet updates from around the w...
PLNOG 7: Jos Martens, Bart van der Sloot - Internet updates from around the w...
 
The Interconnection Index: Breaking Down Europe
The Interconnection Index: Breaking Down EuropeThe Interconnection Index: Breaking Down Europe
The Interconnection Index: Breaking Down Europe
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
 
Now Corporation Marketing Book
Now Corporation Marketing BookNow Corporation Marketing Book
Now Corporation Marketing Book
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 

Andrew at Adlink

  • 1. Local cable television advertising is a tricky business.Commercial content comes from many sources.National commercials are generated by Madison Avenue advertising agencies,while local content comes from both regional and local agencies.Collecting,managing,and distributing this diverse content and then inserting it into various cable lineups is a management headache. Sending television commercials over the Internet raises security concerns About Adlink Adlink sells TV advertising in Los Angeles across 44 cable networks. S O L S O F T @ W O R K “In the past, we relied on the privacy of our network for security,” says Andrew Dahl, the staff engineer at Adlink. But how quickly things change. “Our first task is to protect ourselves from ourselves,” Dahl says, explaining that as Adlink’s distribution network gets more tightly linked with its business network, the integration that results ends up exposing the content-delivery network to the outside world. Now Adlink must worry about the sorts of things that plague all net-enabled businesses: hackers, the theft of proprietary information, Internet scams, and worms, viruses, and Trojans. Adlink first turned to Cisco to address its security needs. “We were evaluating several Cisco products, but what we really wanted was a product that would not only secure our network, but also could help us manage the entire network from a central location,” says Dahl. “After getting a clearer picture of our needs, Cisco ended up recommending a company called Solsoft.” Solsoft was brought in to add policy management to the basic goal of securing an increasingly complex network. Adlink delivers television commercial spot content over Layer 3 IP via an ATM network. The commercials are in MPEG format and are transported from six different source locations to over 80 video advertising servers throughout Southern California.Each advertising server then inserts commercial content on one of the 44 cable networks that Adlink serves. The 3500 insertion points mentioned earlier each contain opportunities (“avails”) for approximately 200 thirty-second commercials per day. This represents nearly 700,000 commercial insertions being performed within the Adlink network on any given day,along with additional error message traffic and other diagnostics. In total there are approximately 1 million transaction or status messages per day traveling on the network,in addition to the very large MPEG files and schedule files. That’s a lot of traffic.“Up until recently,Adlink operated on a closed, private ATM network with no other points of ingress, but due an increasing need to integrate the data from our various partners, we are having to open our network up to allow multi-domain/owner data paths,” says Dahl. In Southern California,a company called Adlink handles this complex task.Adlink maintains a distribution network that delivers commercials to the cable system operators covering 99% of the cable homes in the Los Angeles/Palm Springs “DMA”(Nielsen ratings terminology for designated marketing area), the second largest market in the US. Those cable systems are physically segmented into 80 separate ad insertable or “targetable”zones,each carrying 44 ad insertable cable networks. The matrix of 80 zones by 44 networks produces a set of over 3500 insertion points, each requiring MPEG files and schedule files (along with the return of logfiles and management information) on a daily basis 365x24. The key to this business is the ability to deliver content over an IP network. However, as Adlink’s previously private network becomes increasingly tied into public networks,a new concern has emerged:security. Private Networks are No Longer Private 44 cable networks in the Adlink digital interconnect... A complex task T V & N E T W O R K A D L I N K S T A T I S T I C S Adlink has grown to become the nation's leading digital interconnect capable of delivering several hundredthousandspotsadayto 80cablesystems where they air on 44 cable networks. Adlink's systems are linked by 4,000 miles of IP/ATM network, covering an area of more than 22,000 square miles in Southern California. LOS ANGELES DMA STATISTICS Total Population:17,242,485 * Total Households:5,554,300 ** TV Households:5,431,140 ** Adlink Cable Households:3,100,000 ** ** Source:Nielsen,Los Angeles,Jan 2005 + Nielson Palm Springs,Nov 2004 * SRC:Total Population,Average HH Income, Ethnicity (based on Adlink universe - 2004 est.based on 2000 census) Andrew Dahl, Staff Engineer
  • 2. S O L S O F T @ W O R K Adelphia are merging their corporate networks with various private networks; distribution networks and business networks are feeding into one another more and more; and Adlink has to accommodate all of these trends. Solsoft’s Policy Server helped them create order out of chaos.Policy Server is an open system for the centralized management of firewalls, routers, switches, and VPNs. What made this solution so appealing to Adlink was that it actually manages heterogeneous security environments. Most vendor management software is designed to work only with that vendor’s own gear. With Solsoft a customer can combine various best-in-class products from such companies as Cisco,Juniper,Check Point, Nortel, and Symantec, and make all of these products work together holistically. “Once we heard about Solsoft,”explains Dahl, “we scoured the Internet for other companies doing the same thing. There was no one else doing what they do, and that made the decision easy for us. We went with Solsoft.” Using Solsoft Policy Server, Adlink’s Operations and IT staffs were able to define, document, deploy, and audit policies across its complex system of networks. Solsoft’s policy-based system hardens networks against attacks and human error by making sure security rules are consistent end-to-end – something that in large, distributed, heterogeneous networks is practically impossible to do manually or through various vendor-specific management tools. Policing the flow of traffic “We needed a management solution that could accommodate changing security policies on a month-to-month, week-to-week, and day-to-day basis,” says Dahl. To harden its ATM network, Adlink first deployed Cisco 831 routers in core locations and Cisco PIX 525 firewalls at their affiliate locations. This helped secure the point of ingress for affiliate network connections,but a centralized system was still needed to manage those different devices, one that would not be cumbersome or require a heavy amount of manual configuration. With Solsoft Policy Server in place, complex security policies comprising access control, network address translation,and anti-spoofing rules are now consistent and enforceable throughout the network.Only certain types of traffic are permitted over the ATM network, and return traffic is tightly controlled within the ATM network, thus freeing the content-delivery network from superfluous traffic. “Return traffic was a problem,” Dahl says, “but through the Solsoft console, we can eliminate a lot of unnecessary protocols like telnet or ftp over the ATM network.” Even if those ports are disallowed,in the past,affiliates or even certain software programs could open them back up. With Solsoft Policy Server, not only are those Creating security policies isn’t enough ©1997-2005 Solsoft.Solsoft and Solsoft NP are trademarks of Solsoft.Solsoft product specifications are subject to change without notice.Solsoft is protected by French patent N° FR97/13254 and may be protected by other US patents,foreign patents or pending applications.All trademarks are the property of their respective owners. Solsoft,Inc. 2065 Landings Drive Mountain View,CA 94043 USA +1 (650) 428 2800 tel +1 (650) 428 2804 fax Solsoft S.A. 47-53,Rue Raspail 92300 Levallois-Perret France +33 (0)1 47 15 04 00 tel +33 (0)1 47 15 55 09 fax Solsoft Central Europe Prinzenallee 7 40549 Düsseldorf Germany +49 (0)211 52 391 550 tel +49 (0)211 52 391 507 fax Solsoft UK,Ltd. 1 Berkeley Street London - W1J 8DJ United Kingdom +44 (0)20 7016 9090 tel +44 (0)20 7016 9100 fax E-mail :info@solsoft.com www.solsoft.com policies consistently enforced, but also the change control process is carefully monitored thanks to built-in reporting and workflow. Centralizing the security management function is a major theme in today’s compliance-conscious IT environments.But beyond the reporting that is so typical of most security monitoring products,Solsoft delivers intrinsic value by automating what is normally an error-prone and labor-intensive process,namely the configuration of security policies across single-vendor and heterogeneous networks. “Solsoft Policy Server saves us a ton of time,” Dahl noted. “Previously, if we implemented a new security policy, we had to telnet into every router and firewall and manually add an access line entry. With Solsoft’s easy front-end interface, what used to take several hours now takes 10 minutes.” Finally,Dahl says that Adlink was impressed by the affordability of the Solsoft solution. “Just from the time savings alone, we estimate that we’ll see ROI within the first 24-30 months.” T V & N E T W O R K UPS OC3 Connection Cisco Router T-1 DSU/CSU Ethernet DISTRIBUTION CHANNEL Connection to Affiliate HQ’s ADLINK / AFFILIATE HEADEND ADLINK HEADQUARTERS Workstations Ethernet T-1 DSU/CSU T-1 DSU/CSU T-1 Connection Network Distribution Multicast n CUBE Alphaserver RAID Storage Quality control MEPG2 Encoder MEPG2 Encoder nCube / ADLINK- Ad Insertion System nCube / ADLINK- Ad Insertion System nCube / ADLINK- Ad Insertion System nCube / ADLINK- Ad Insertion System Thus,even a simple matter such as controlling what types of traffic flow over the network then becomes a concern. Dahl believed that this situation would only worsen over time. Cable operators are now looking to directly stream commercials; major cable companies like Comcast and For more info...