SlideShare a Scribd company logo
1 of 5
Download to read offline
BreakingPoint LTE At-A-Glance




Test LTE/4G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE
Network Infrastructure


Telecom carriers rolling out Long Term Evolution (LTE) and 4G              With a BreakingPoint CTM, you can:
networks must test mobile infrastructures efficiently and accurately
                                                                              • Measure and harden the performance, security, and stability
under punishing real-world conditions, without spending a fortune
                                                                                of load balancers, firewalls, IPS devices, and other equipment
to do so. BreakingPoint CTM products answer this challenge with
                                                                                with up to 120 gigabits per second of application, attack, and
the industry’s most sophisticated and cost-effective Internet-scale
                                                                                malformed traffic.
LTE emulation.
                                                                              • Validate network and data center performance by re-creating
These products allow carriers to test their networks and the devices            more than 150 application protocols, including Twitter Mobile,
within them against the behavior of millions of simulated users                 AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®,
downloading rich media content, placing calls, purchasing music,                BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
browsing the Web, or unknowingly sharing the latest malware. A                  Facebook®, YouTube®, and Apple® FaceTime®, as well as other
BreakingPoint CTM replaces racks of equipment and complicated                   mobile, social, and gaming protocols—with Multicast support.
setup processes with a single-chassis device and a single user                • Stress network infrastructures with more than 4,500 security
interface (shown below).                                                        attacks and 28,000 pieces of malware—including more
                                                                                than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                evasions.
Effective Device
                                                                              • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
LTE network conditions needed to harden carrier-grade network                 • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                     botnet attacks to uncover previously hidden weaknesses.




          BreakingPoint CTM™ Products Enable Configuration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
BreakingPoint LTE At-A-Glance


  The Solution for Simulating Multi-Million-User LTE Networks,
  with Additional 3G Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest LTE networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of thousands of eNodeBs connecting to millions of devices
         such as smartphones, tablet computers, and netbooks.
     • Interactions among all the network elements involved in LTE
         communications, including user equipment (UE), eNodeBs,                               BreakingPoint FireStorm CTM Specifications
         Service Gateways (SGWs), Packet Data Network Gateways                                 A single BreakingPoint FireStorm CTM provides the equivalent
         (PGWs), and Mobility Management Entities (MMEs).                                      performance of many racks of servers from a 4U chassis, including:
     • A full Dynamic Host Control Protocol (DHCP) network, with                                   • 120 gigabits per second of blended stateful application traffic
         support for both DHCP Client and DHCP Server processes.                                   • 90 million concurrent TCP sessions
     • Support for both 3G and LTE environments with GTPv1 and                                     • 4 million TCP sessions per second
         GTPv2.
                                                                                                   • 1.5 million steady-state complete TCP sessions per second
  Technological Breakthroughs from an Easy-to-Use Product                                          • 120,000+ SSL sessions per second
  That Is Always Current                                                                           • 150+ stateful application protocols
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 4,500+ live security attacks
  configuration in a variety of network environments. Because of their
                                                                                                   • 28,000+ pieces of malware
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  the landscape for applications, attacks, and telecom standards. With
  a BreakingPoint CTM, you will:                                                               To learn more about all BreakingPoint products and services, visit
                                                                                               www.breakingpoint.com/products.
     • Receive frequent updates from the BreakingPoint Application
         and Threat Intelligence (ATI) research team, which is dedicated                       Schedule a Demonstration Today
         to keeping applications and attacks current and providing                             Find out why the world’s largest service providers rely on
         frequent feature and performance enhancements.                                        BreakingPoint to measure and harden the resiliency of their LTE
     • Employ built-in network traffic profiles—created using                                  infrastructures. Visit
         data collected from top global telecom carriers—or easily                             www.breakingpoint.com/LTE.
         customize these profiles to fit your own network’s unique
                                                                                               1.866.352.6691 U.S. Toll-Free
         conditions.
                                                                                               www.breakingpoint.com
     • Configure simulations in just minutes through a single user-
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and Data Loss Prevention solutions with a
         digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Technical Specifications                                                                         • North American Wireless Carrier Weeknight
                                                                                                   • North American Wireless Carrier Weeknight with iPhone
                                                                                                   • Sandvine Mobile Internet Report – Caribbean / Latin America
  Devices Emulated:                                                                                • Sandvine Mobile Internet Report – Europe
      • eNodeBs + UEs
                                                                                                   • Sandvine Mobile Internet Report – North America
      • PDN
                                                                                               Wireless Reporting Statistics:
      • MME
                                                                                                   • UE Attach Requests Sent / Accepted / Failed
      • SGW + PGW + PDN
                                                                                                   • UE Detach Requests Sent / Successes
      • eNodeBs + UEs + MME, SGW + PGW + PDN
                                                                                                   • S1AP Setup Requests / Successes
      • SGSN + UEs
                                                                                                   • S1AP Reset Requests Received / Reset ACKs Sent
      • GGSN + PDN
                                                                                                   • SCTP Open Requests / Open Successes
  Interfaces Supported:                                                                            • SCTP Close Requests / SCTP Close Successes
      • S1-U (eNodeB and SGW sides)
                                                                                                   • GTP Create Requests Processed
      • S1-MME (eNodeB side)
                                                                                                   • GTP Create Responses Processed
      • SGi (PDN side)
                                                                                                   • GTP Delete Requests Processed
      • S11 (MME and SGW sides)
                                                                                                   • GTP Delete Responses Processed
      • Gn (SSGN and GGSN sides)
                                                                                                   • GTP Client Side Tunnels
  Wireless Protocols Supported:                                                                    • GTP Client Side Sent / Received Data
      • S1AP                                                                                       • GTP Server Side Tunnels
      • GTP-C v1, GTP-C v2, GTP-U v1                                                               • GTP Server Side Sent / Received Data
      • SCTP (over UDP or IP)
                                                                                               Other Features:
  Performance (per FireStorm blade):                                                               • LTE specification supported: v9
      • Up to 4,000 eNodeBs                                                                        • All security strikes and live malware supported over LTE and 3G
      • Up to 3,000,000 UEs                                                                        • Specific mobile malware support
      • Up to 3,000,000 concurrent GTP tunnels                                                     • All application protocols supported
      • Up to 1,800 UE registrations/sec on the S1 interface                                       • Can emulate multiple device instances concurrently (MME,
      • Up to 225,000 UE registrations/sec on the S11 interface                                       SGW, GGSN, SSGN)
      • Up to 13 Gbps GTP-encapsulated application traffic                                         • Automatic generation of IMSI, MSISDN, and UE secret keys
      • Up to 11 (1 default + 10 dedicated) bearers / UE

  Predefined Mobility Application Profiles:
      • Mobile User
      • European Wireless Carrier Daytime
      • European Wireless Carrier Daytime with iPhone
      • European Wireless Carrier Weekday
      • European Wireless Carrier Weeknight
      • European Wireless Carrier Weeknight with iPhone
      • North American Wireless Carrier Weekday
      • North American Wireless Carrier Weekday Daytime
      • North American Wireless Carrier Weekday Daytime with
         iPhone
      • North American Wireless Carrier Weekday with iPhone

www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
© 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

More Related Content

What's hot

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesTuan Phan
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guidenajeeb625
 
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus TechnologiesNFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus TechnologiesAli Kafel
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Networkhypknight
 
Intel® Select Solutions for the Network
Intel® Select Solutions for the NetworkIntel® Select Solutions for the Network
Intel® Select Solutions for the NetworkLiz Warner
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM System Networking
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsLiz Warner
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13   NFV resiliency presentation - ali kafel - stratusETSI NFV#13   NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratusAli Kafel
 
Floorvision Brochure
Floorvision BrochureFloorvision Brochure
Floorvision BrochureFides Sales
 
Take the guesswork out of video surveillance with pre-validated Milestone s...
Take the guesswork out of video  surveillance with pre-validated  Milestone s...Take the guesswork out of video  surveillance with pre-validated  Milestone s...
Take the guesswork out of video surveillance with pre-validated Milestone s...Principled Technologies
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Michelle Holley
 
Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Zuora, Inc.
 
Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Principled Technologies
 
Shunra app cloud_whitepaper
Shunra app cloud_whitepaperShunra app cloud_whitepaper
Shunra app cloud_whitepaperAccenture
 

What's hot (20)

Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guide
 
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus TechnologiesNFV resiliency whitepaper - Ali Kafel, Stratus Technologies
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Network
 
Intel® Select Solutions for the Network
Intel® Select Solutions for the NetworkIntel® Select Solutions for the Network
Intel® Select Solutions for the Network
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
 
Veryx Services Catalog
Veryx Services CatalogVeryx Services Catalog
Veryx Services Catalog
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13   NFV resiliency presentation - ali kafel - stratusETSI NFV#13   NFV resiliency presentation - ali kafel - stratus
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
 
Floorvision Brochure
Floorvision BrochureFloorvision Brochure
Floorvision Brochure
 
Floor Vision Brochure
Floor Vision BrochureFloor Vision Brochure
Floor Vision Brochure
 
Pankaj_Joshi_Resume
Pankaj_Joshi_ResumePankaj_Joshi_Resume
Pankaj_Joshi_Resume
 
Take the guesswork out of video surveillance with pre-validated Milestone s...
Take the guesswork out of video  surveillance with pre-validated  Milestone s...Take the guesswork out of video  surveillance with pre-validated  Milestone s...
Take the guesswork out of video surveillance with pre-validated Milestone s...
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...
 
Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)
 
Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...
 
Shunra app cloud_whitepaper
Shunra app cloud_whitepaperShunra app cloud_whitepaper
Shunra app cloud_whitepaper
 

Similar to LTE Testing - Network Performance, Security, and Stability at Massive Scale

LTE Testing
LTE TestingLTE Testing
LTE TestingIxia
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetIxia
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionIxia
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetIxia
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boostHowest_ENM
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerRobb Boyd
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT ArchitectureSathiya keerthi
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 

Similar to LTE Testing - Network Performance, Security, and Stability at Massive Scale (20)

LTE Testing
LTE TestingLTE Testing
LTE Testing
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
BreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data SheetBreakingPoint Cloud and Virtualization Data Sheet
BreakingPoint Cloud and Virtualization Data Sheet
 
Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Xpt
XptXpt
Xpt
 
Xpt
XptXpt
Xpt
 
XPT Corporate Capability
XPT Corporate Capability XPT Corporate Capability
XPT Corporate Capability
 
Geef Industry 4.0 een boost
Geef Industry 4.0 een boostGeef Industry 4.0 een boost
Geef Industry 4.0 een boost
 
Building a Digital Telco
Building a Digital TelcoBuilding a Digital Telco
Building a Digital Telco
 
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless ControllerTechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
TechWiseTV Workshop: Cisco Catalyst 9800 Series Wireless Controller
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 

More from Ixia

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test MethodologyIxia
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyIxia
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test MethodologyIxia
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsIxia
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleIxia
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSIxia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieIxia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarIxia
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing MethodologyIxia
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityIxia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramIxia
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitIxia
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetIxia
 

More from Ixia (20)

Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
IPS Test Methodology
IPS Test MethodologyIPS Test Methodology
IPS Test Methodology
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
Server Load Balancer Test Methodology
Server Load Balancer Test MethodologyServer Load Balancer Test Methodology
Server Load Balancer Test Methodology
 
How to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation FirewallsHow to Test High-Performance Next-Generation Firewalls
How to Test High-Performance Next-Generation Firewalls
 
Catalyst 6500 ASA Service Module
Catalyst 6500 ASA Service ModuleCatalyst 6500 ASA Service Module
Catalyst 6500 ASA Service Module
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPSBreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets LieBreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber WarCybersecurity: Arm and Train US Warriors to Win Cyber War
Cybersecurity: Arm and Train US Warriors to Win Cyber War
 
Firewall Testing Methodology
Firewall Testing MethodologyFirewall Testing Methodology
Firewall Testing Methodology
 
Measure Network Performance, Security and Stability
Measure Network Performance, Security and StabilityMeasure Network Performance, Security and Stability
Measure Network Performance, Security and Stability
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) ProgramBreakingpoint Application Threat and Intelligence (ATI) Program
Breakingpoint Application Threat and Intelligence (ATI) Program
 
BreakingPoint Custom Application Toolkit
BreakingPoint Custom Application ToolkitBreakingPoint Custom Application Toolkit
BreakingPoint Custom Application Toolkit
 
BreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM DatasheetBreakingPoint FireStorm CTM Datasheet
BreakingPoint FireStorm CTM Datasheet
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

LTE Testing - Network Performance, Security, and Stability at Massive Scale

  • 1. BreakingPoint LTE At-A-Glance Test LTE/4G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE Network Infrastructure Telecom carriers rolling out Long Term Evolution (LTE) and 4G With a BreakingPoint CTM, you can: networks must test mobile infrastructures efficiently and accurately • Measure and harden the performance, security, and stability under punishing real-world conditions, without spending a fortune of load balancers, firewalls, IPS devices, and other equipment to do so. BreakingPoint CTM products answer this challenge with with up to 120 gigabits per second of application, attack, and the industry’s most sophisticated and cost-effective Internet-scale malformed traffic. LTE emulation. • Validate network and data center performance by re-creating These products allow carriers to test their networks and the devices more than 150 application protocols, including Twitter Mobile, within them against the behavior of millions of simulated users AOL® IM, Yahoo!® Mail and Messenger, Google® Gmail, Skype®, downloading rich media content, placing calls, purchasing music, BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, browsing the Web, or unknowingly sharing the latest malware. A Facebook®, YouTube®, and Apple® FaceTime®, as well as other BreakingPoint CTM replaces racks of equipment and complicated mobile, social, and gaming protocols—with Multicast support. setup processes with a single-chassis device and a single user • Stress network infrastructures with more than 4,500 security interface (shown below). attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. Effective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale LTE network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. BreakingPoint CTM™ Products Enable Configuration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
  • 2. BreakingPoint LTE At-A-Glance The Solution for Simulating Multi-Million-User LTE Networks, with Additional 3G Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest LTE networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of thousands of eNodeBs connecting to millions of devices such as smartphones, tablet computers, and netbooks. • Interactions among all the network elements involved in LTE communications, including user equipment (UE), eNodeBs, BreakingPoint FireStorm CTM Specifications Service Gateways (SGWs), Packet Data Network Gateways A single BreakingPoint FireStorm CTM provides the equivalent (PGWs), and Mobility Management Entities (MMEs). performance of many racks of servers from a 4U chassis, including: • A full Dynamic Host Control Protocol (DHCP) network, with • 120 gigabits per second of blended stateful application traffic support for both DHCP Client and DHCP Server processes. • 90 million concurrent TCP sessions • Support for both 3G and LTE environments with GTPv1 and • 4 million TCP sessions per second GTPv2. • 1.5 million steady-state complete TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 120,000+ SSL sessions per second That Is Always Current • 150+ stateful application protocols BreakingPoint CTMs are designed for ease of use and rapid • 4,500+ live security attacks configuration in a variety of network environments. Because of their • 28,000+ pieces of malware exclusive design, they evolve along with the frequent changes in • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces the landscape for applications, attacks, and telecom standards. With a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit www.breakingpoint.com/products. • Receive frequent updates from the BreakingPoint Application and Threat Intelligence (ATI) research team, which is dedicated Schedule a Demonstration Today to keeping applications and attacks current and providing Find out why the world’s largest service providers rely on frequent feature and performance enhancements. BreakingPoint to measure and harden the resiliency of their LTE • Employ built-in network traffic profiles—created using infrastructures. Visit data collected from top global telecom carriers—or easily www.breakingpoint.com/LTE. customize these profiles to fit your own network’s unique 1.866.352.6691 U.S. Toll-Free conditions. www.breakingpoint.com • Configure simulations in just minutes through a single user- friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and Data Loss Prevention solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 3. BreakingPoint LTE At-A-Glance Technical Specifications • North American Wireless Carrier Weeknight • North American Wireless Carrier Weeknight with iPhone • Sandvine Mobile Internet Report – Caribbean / Latin America Devices Emulated: • Sandvine Mobile Internet Report – Europe • eNodeBs + UEs • Sandvine Mobile Internet Report – North America • PDN Wireless Reporting Statistics: • MME • UE Attach Requests Sent / Accepted / Failed • SGW + PGW + PDN • UE Detach Requests Sent / Successes • eNodeBs + UEs + MME, SGW + PGW + PDN • S1AP Setup Requests / Successes • SGSN + UEs • S1AP Reset Requests Received / Reset ACKs Sent • GGSN + PDN • SCTP Open Requests / Open Successes Interfaces Supported: • SCTP Close Requests / SCTP Close Successes • S1-U (eNodeB and SGW sides) • GTP Create Requests Processed • S1-MME (eNodeB side) • GTP Create Responses Processed • SGi (PDN side) • GTP Delete Requests Processed • S11 (MME and SGW sides) • GTP Delete Responses Processed • Gn (SSGN and GGSN sides) • GTP Client Side Tunnels Wireless Protocols Supported: • GTP Client Side Sent / Received Data • S1AP • GTP Server Side Tunnels • GTP-C v1, GTP-C v2, GTP-U v1 • GTP Server Side Sent / Received Data • SCTP (over UDP or IP) Other Features: Performance (per FireStorm blade): • LTE specification supported: v9 • Up to 4,000 eNodeBs • All security strikes and live malware supported over LTE and 3G • Up to 3,000,000 UEs • Specific mobile malware support • Up to 3,000,000 concurrent GTP tunnels • All application protocols supported • Up to 1,800 UE registrations/sec on the S1 interface • Can emulate multiple device instances concurrently (MME, • Up to 225,000 UE registrations/sec on the S11 interface SGW, GGSN, SSGN) • Up to 13 Gbps GTP-encapsulated application traffic • Automatic generation of IMSI, MSISDN, and UE secret keys • Up to 11 (1 default + 10 dedicated) bearers / UE Predefined Mobility Application Profiles: • Mobile User • European Wireless Carrier Daytime • European Wireless Carrier Daytime with iPhone • European Wireless Carrier Weekday • European Wireless Carrier Weeknight • European Wireless Carrier Weeknight with iPhone • North American Wireless Carrier Weekday • North American Wireless Carrier Weekday Daytime • North American Wireless Carrier Weekday Daytime with iPhone • North American Wireless Carrier Weekday with iPhone www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 4. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 5. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com © 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.