SlideShare a Scribd company logo
1 of 33
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
VISION ONE
2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DEPLOYING SECURITY IS NOT EASY
CONSTANT CHANGE
Threats
Laws
Applications
SINGLE PURPOSE TOOLS
EXPENSIVE
3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SECURITY IS CONSTANTLY CHANGING
There’s always a lot of ground to cover
4© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
See Everything
Intuitive UI and
patented filter
compiler
Look Within
ATI for SSL
decryption & App
intelligence
Virtualize
Manage traffic
from physical
and virtual taps
Layered Defense
Flexibly deploy
tools inline and
out-of-band
Optimize
ZERO-loss
advanced packet
processing
5© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
EVOLUTION OF INTELLIGENT VISIBILITY
All packets
TAP
Raw Packets
Only 10.0.0.0/8 traffic
Only TCP Port 25 traffic
L2-4 Filters
NPB
All unique frames going to 10.0.0.0/8
Only the first 128 bytes of TCP Port 25 frames
Hardware AFM
NPB
Adv. Packet Processing
All traffic from Georgia
All voice traffic from HTC
Ones
Someone from S. Africa watching
House of Cards on Netflix on an
iPhone on Vodacom’s network
NPB –
App Brokering
Meta Data
App Filtering
6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
FILTERING: IT’S YOUR CHOICE
The Hard WayThe Easy Way
Using other vendor’s filters “…we spent the better part of four
hours and some trial and error to get the map and its filters defined
and applied.”
“Ixia's Dynamic Filtering feature, on the other hand, took all of 10
minutes to perform the same task in our tests.”
7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
VLAN 1-3
VLAN 3-6
TCP
Automatically calculates filter overlaps, and creates
rules
3. What Automated Rule Set Compiler does
IXIA’S AUTOMATIC RULE ENGINE COMPILER
Network
SPAN
Port
Tool Port #1
Tool Port #2
Tool Port #3
Traffic multi-casted from one SPAN port to 3 tools
TCP
No. Criteria Action
0 VLAN 3 + TCP Tool 1, 2 & 3
1 VLAN 1-3 + TCP Tool 1 & 2
2 VLAN 4-6 + TCP Tool 2 & 3
3 VLAN 3 Tool 1 & 3
4 VLAN 1-2 Tool 1
5 VLAN 4-6 Tool 3
6 TCP Tool 2
7 Null Drop
 Automatically resolves overlapping rules.
Greatly simplifies getting to what you need.
 Hitless changes – no packets dropped
 Concurrent changes by different admin users
 Simple to integrate with external provisioning
systems – automated service provisioning
4. Why is this a big deal
1. What you want
Enter 3 simple filters in the Network Tool Control Panel
2. What you do
8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
INTELLIGENT PACKET PROCESSING
Dedicated hardware adds info or reduces unnecessary data
without information loss
on a per packet basis
All unique frames going to
10.0.0.0/8
Only the first 128 bytes of TCP Port
25 frames
Hardware AFM
NPB
Adv. Packet Processing
Advanced Packet Processing (AFM) Features
• Deduplication
• Header stripping
• Trimming
• Data Masking
• Timestamping
• Burst Protection
9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ADVANCED PACKET PROCESSING IN VISION ONE
• Challenge
• Need guaranteed packet processing performance,
but not on every port
• Solution
• Hardware-based processing guarantees performance
• Allocated to ports in 10G increments
• Full performance with multiple features enabled
• Benefits
• Packet processing reduces tool costs
• Reliable operational performance
• Any port can have AFM
• Maximize ATIP / DPI performance by AFM prefiltering
16x10G Shared AFM
10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DEDUPLICATION
Deduplication – Ensures that one copy of each frame is forwarded to for analysis
How do you get duplicate packets?
– Multiple taps are aggregated to the same tool
– A single SPAN port commonly generates duplicate packets
(see )
11© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
HEADER STRIPPING
Header Stripping – Detects and removes tunnel protocols from header to format data so
it can be analyzed by tools that do not support tunneled protocols.
PayloadIP Header
Header Stripping
MPLS Label
Typical Use Cases
• Translation: Strips a protocol header that an analysis tool
doesn’t parse and forwards the packet in a supported format.
– MPLS, VNTag, FabricPath, etc.
• vTap Termination: Terminates traffic from Phantom vTap
• ERSPAN termination: Terminates traffic from a remote /
branch office switch
12© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
PACKET TRIMMING
Packet Trimming – Truncates packets at a certain length and optionally inserts a trailer with the
original packet length before forwarding to a tool.
Typical Use Cases
• Tool Efficiency: Reduces the average frame length being sent to the tool for analysis.
– Remove SSL-encrypted payloads before analysis
– Remove payloads from tools that only analyze headers
• Security: If the packet payload is not needed for analysis then this feature can be used to protect
against revealing sensitive information such as Personally Identifiable Information (PII) as required by
many mandates such as PCI.
PayloadIP Header
Packet Slicing
13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DATA MASKING
Data Masking – Allows data at a specific offset in the frame to be set to a fixed value so that
Personally Identifiable Information (PII) is not forwarded to analytics tools.
Typical Use Cases
• Protecting PII: Enterprises and carriers often have mandates that require them not to store, forward, or
otherwise expose PII to internal or external users. Examples of such mandates are PCI (Payment Card
Industry) or HIPAA for health care in the USA. Violations often result in multi-million dollar penalties.
PayloadIP Header
Data Masking
XXXX
14© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
PACKET TIMESTAMPING
Packet Timestamping – Adds a trailer containing a timestamp to every packet so detailed latency
measurements can be made by the analysis tools.
Typical Use Cases
• Latency: A network performance analyzer can determine the latency between any taps in the
network by comparing the timestamps on the same packet from two different locations.
PayloadIP Header
Packet Timestamping
Timestamp
Vision ONE chassis uses PTP
or NTP to obtain time reference
15© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
BURST PROTECTION
Burst Protection – Adds extra buffering to 1G interfaces to provide protection from
microburst events and avoid data loss.
Typical Use Cases
• Aggregation: When aggregating traffic from multiple locations in the network to a single 1G
tool, it is possible to momentarily exceed 1Gbps of traffic.
• Speed Translation: When filtering a sub 1G flow from a single 10G link, burst protection can
prevent a momentary burst in the 10G flow from creating loss in the 1G analysis tool.
16© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
IXIA – ALWAYS FULL RATE ADVANCED PACKET PROCESSING
 The Bottom Line
Ixia always supports full rate processing
Independent of frame size
Independent of number of functions enabled
 See Tolly Test Report #216100
Full Rate Advanced Packet Processing
17© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ENTERPRISE – INTELLIGENT APPLICATION PROCESSING
• ATI Processor (ATIP) - Context-rich Application Visibility
• Application forwarding based on application, geography, and RegEx matching
• Real-time dashboard
• Rich NetFlow / IPFIX generation
– Device OS
– Browser
– Carrier BGP AS#
– Geolocation
• Data Masking
• Stateful SSL decryption
All traffic from Georgia
All voice traffic from HTC
Ones
Someone from S. Africa watching
House of Cards on Netflix on an
iPhone on Vodacom’s network
NPB –
App Brokering
Meta Data
App Filtering
18© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATIP – DEEP PACKET INSPECTION
 Reuses ATI engine to perform Deep Packet Inspection
 Identifies
Applications
Application events
Handset OS
Browser
Geolocation
 Subscription
Profiles update every 3 weeks
19© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
APPLICATION FILTERING
Point and Click
Filter settings
Geographic Matching
Click map or country name
App Matching
Static, dynamic, customApp Groups
Category, OS, etc.
20© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
REGEX SEARCHING & DATA MASKING
Easy Setup
Add to any filter
Predefined Patterns
Email, credit cards, SSN, etc.
Custom Patterns
Built in UI
Optional Masking
Partial or complete string
Fixed Offset
L2-L4 Header offset
21© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
FLEXIBLE TRAFFIC HANDLING
Easy Setup
Forward, NetFlow, or both
Real-time Stats
For all filters
22© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
RICH NETFLOW / IPFIX GENERATION
Easy Setup
One-click enable
Standard Fields
Including router offload IxFlow Extensions
Handset, browser, geo, SSL
High performance
Supports up to 10 collectors
23© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATIP ENABLES SSL INSIGHT
• Passive decryption – no impact on application performance
• Fully compatible with all other ATIP features:
Rich Netflow/IPFIX
Data Masking
Geolocation
• Easy setup – just import server certificate & key
• All popular key exchange & ciphers:
RSA & DH Key Exchange
SHA1/521/384/256/224
MD5
• Application Filtering
• Handset/workstation type
• Browser identification
• 3DES
• RC4
• AES
• ECC (Elliptic Curve)
• Encryption details reported over Netflow
Hardware Encryption Offload
24© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ATIP USE CASES
SaaS Issue Correlation to Service Provider Granular VoIP Filtering
25© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
TWO MAIN VISIBILITY TOPOLOGIES
Monitoring (out-of-band)
 Analytics tools terminate the traffic and do
not forward back to the network.
 Typical analytics tools:
Application Performance Monitoring
(APM)
Network Performance Monitoring (NPM)
Intrusion Detection System
Data recording
Inline (inband)
 Tools analyze and selectively drop traffic
or forward it back to the network.
 Typical inline tools
Intrusion Prevention System (IPS)
Data Loss Prevention (DLP)
Web Cache
SSL encrypt / decrypt
Firewall
26© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
INLINE & MONITORING TOGETHER
Inline Monitoring
Inline
• IPS (multiple vendors)
Out-of-band Monitoring
• Data logging
27© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
SERIAL INLINE DEPLOYMENT
Switch
1 2 3
28© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
EXTERNAL BYPASS
Why use External vs Integrated Bypass?
1. External reliability is 5 times better!
MTBF (Mean Time Between Failure in Hours)
External Bypass: 450,000
Integrated Bypass: 80,000
2. Easier to replace failed devices
No risk of taking network down
3. Same system size as integrated bypass
2U
29© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
EASY TO CONFIGURE
 Create complex topologies in minutes
Inline serial
Parallel load balanced
Inline serial & Parallel load balance together
30© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
N+M REDUNDANCY
Supports any combination of N+M tool redundancy
 N+M Redundancy: M warm standby tools to protect
N active tools
 N+1 Redundancy: a single warm standby tool to
protect N active tools
Behavior under tool failure
 Standby tool takes over traffic from failed tool
 Active tool traffic again when it recovers
 Failure detected via use of heartbeats
31© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
DETECT FAILURES QUICKLY - RICH HEARTBEATS
Detecting failures
 Heartbeats exist between bypass switch & NPB
 Heartbeats exist between NPB & tool
 Absence of heartbeats indicates failure
Key capabilities
 Predefined heartbeats to match different tools
 Highly customizable heartbeats for tricky situations
 Supports single-stage (blue) or multistage (red) heartbeats
32© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
VISION ONE – SECURITY WITHOUT SACRIFICE
 Intelligent
• ATIP: DPI for app awareness
• SSL decryption
• Reliable adv. packet processing
• Supports inline & monitoring
• Terminates physical & vTap traffic
 Compact
• 1U high
• Connectivity
• 48 SFP+ for 1G or 10G
• 4 QSFP+ for 4x40G or 16x10G
• Growth via expansion slot
 Reliable
• Based on NVOS 4.x
• Redundant, hot swappable power
supplies & fans
• NEBs capable
 Multiuser ready
• Extensive role-based access control
• Automatic Filter Rule Compiler
• Intuitive GUI
• RESTful API
33© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
#securitywithoutsacrifice
Amplify security without ever changing a cable.
See everything. Miss Nothing.

More Related Content

What's hot

Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies sushmil123
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Canada
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your businessCisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance FirewallsIxia
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Canada
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmatCisco Canada
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solutionCPqD
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRCisco Canada
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationDenham Pearce
 

What's hot (20)

Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation Branch
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Ignite your network digitize your business
Ignite your network digitize your businessIgnite your network digitize your business
Ignite your network digitize your business
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Testing High Performance Firewalls
Testing High Performance FirewallsTesting High Performance Firewalls
Testing High Performance Firewalls
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmat
 
5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution5 ixia lte qo e – e2e test solution
5 ixia lte qo e – e2e test solution
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Ix Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise PresentationIx Veri Wave Enterprise Presentation
Ix Veri Wave Enterprise Presentation
 

Similar to Vision one-customer

IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsCisco Russia
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...Cisco Canada
 
CisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area NetworksCisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area NetworksAreaNetworking.it
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасностиАльбина Минуллина
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
Mạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiMạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiSunmedia Corporation
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdfssuser88346b
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...Cisco Canada
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 

Similar to Vision one-customer (20)

IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spotsIXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
IXIA VISIBILITY ARCHITECTURE Eliminating Blind spots
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
 
CisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area NetworksCisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area Networks
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
Mạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiMạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mới
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 

Recently uploaded

定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 

Recently uploaded (20)

定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 

Vision one-customer

  • 1. 1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | VISION ONE
  • 2. 2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DEPLOYING SECURITY IS NOT EASY CONSTANT CHANGE Threats Laws Applications SINGLE PURPOSE TOOLS EXPENSIVE
  • 3. 3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SECURITY IS CONSTANTLY CHANGING There’s always a lot of ground to cover
  • 4. 4© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | See Everything Intuitive UI and patented filter compiler Look Within ATI for SSL decryption & App intelligence Virtualize Manage traffic from physical and virtual taps Layered Defense Flexibly deploy tools inline and out-of-band Optimize ZERO-loss advanced packet processing
  • 5. 5© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | EVOLUTION OF INTELLIGENT VISIBILITY All packets TAP Raw Packets Only 10.0.0.0/8 traffic Only TCP Port 25 traffic L2-4 Filters NPB All unique frames going to 10.0.0.0/8 Only the first 128 bytes of TCP Port 25 frames Hardware AFM NPB Adv. Packet Processing All traffic from Georgia All voice traffic from HTC Ones Someone from S. Africa watching House of Cards on Netflix on an iPhone on Vodacom’s network NPB – App Brokering Meta Data App Filtering
  • 6. 6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | FILTERING: IT’S YOUR CHOICE The Hard WayThe Easy Way Using other vendor’s filters “…we spent the better part of four hours and some trial and error to get the map and its filters defined and applied.” “Ixia's Dynamic Filtering feature, on the other hand, took all of 10 minutes to perform the same task in our tests.”
  • 7. 7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | VLAN 1-3 VLAN 3-6 TCP Automatically calculates filter overlaps, and creates rules 3. What Automated Rule Set Compiler does IXIA’S AUTOMATIC RULE ENGINE COMPILER Network SPAN Port Tool Port #1 Tool Port #2 Tool Port #3 Traffic multi-casted from one SPAN port to 3 tools TCP No. Criteria Action 0 VLAN 3 + TCP Tool 1, 2 & 3 1 VLAN 1-3 + TCP Tool 1 & 2 2 VLAN 4-6 + TCP Tool 2 & 3 3 VLAN 3 Tool 1 & 3 4 VLAN 1-2 Tool 1 5 VLAN 4-6 Tool 3 6 TCP Tool 2 7 Null Drop  Automatically resolves overlapping rules. Greatly simplifies getting to what you need.  Hitless changes – no packets dropped  Concurrent changes by different admin users  Simple to integrate with external provisioning systems – automated service provisioning 4. Why is this a big deal 1. What you want Enter 3 simple filters in the Network Tool Control Panel 2. What you do
  • 8. 8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | INTELLIGENT PACKET PROCESSING Dedicated hardware adds info or reduces unnecessary data without information loss on a per packet basis All unique frames going to 10.0.0.0/8 Only the first 128 bytes of TCP Port 25 frames Hardware AFM NPB Adv. Packet Processing Advanced Packet Processing (AFM) Features • Deduplication • Header stripping • Trimming • Data Masking • Timestamping • Burst Protection
  • 9. 9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ADVANCED PACKET PROCESSING IN VISION ONE • Challenge • Need guaranteed packet processing performance, but not on every port • Solution • Hardware-based processing guarantees performance • Allocated to ports in 10G increments • Full performance with multiple features enabled • Benefits • Packet processing reduces tool costs • Reliable operational performance • Any port can have AFM • Maximize ATIP / DPI performance by AFM prefiltering 16x10G Shared AFM
  • 10. 10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DEDUPLICATION Deduplication – Ensures that one copy of each frame is forwarded to for analysis How do you get duplicate packets? – Multiple taps are aggregated to the same tool – A single SPAN port commonly generates duplicate packets (see )
  • 11. 11© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | HEADER STRIPPING Header Stripping – Detects and removes tunnel protocols from header to format data so it can be analyzed by tools that do not support tunneled protocols. PayloadIP Header Header Stripping MPLS Label Typical Use Cases • Translation: Strips a protocol header that an analysis tool doesn’t parse and forwards the packet in a supported format. – MPLS, VNTag, FabricPath, etc. • vTap Termination: Terminates traffic from Phantom vTap • ERSPAN termination: Terminates traffic from a remote / branch office switch
  • 12. 12© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | PACKET TRIMMING Packet Trimming – Truncates packets at a certain length and optionally inserts a trailer with the original packet length before forwarding to a tool. Typical Use Cases • Tool Efficiency: Reduces the average frame length being sent to the tool for analysis. – Remove SSL-encrypted payloads before analysis – Remove payloads from tools that only analyze headers • Security: If the packet payload is not needed for analysis then this feature can be used to protect against revealing sensitive information such as Personally Identifiable Information (PII) as required by many mandates such as PCI. PayloadIP Header Packet Slicing
  • 13. 13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DATA MASKING Data Masking – Allows data at a specific offset in the frame to be set to a fixed value so that Personally Identifiable Information (PII) is not forwarded to analytics tools. Typical Use Cases • Protecting PII: Enterprises and carriers often have mandates that require them not to store, forward, or otherwise expose PII to internal or external users. Examples of such mandates are PCI (Payment Card Industry) or HIPAA for health care in the USA. Violations often result in multi-million dollar penalties. PayloadIP Header Data Masking XXXX
  • 14. 14© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | PACKET TIMESTAMPING Packet Timestamping – Adds a trailer containing a timestamp to every packet so detailed latency measurements can be made by the analysis tools. Typical Use Cases • Latency: A network performance analyzer can determine the latency between any taps in the network by comparing the timestamps on the same packet from two different locations. PayloadIP Header Packet Timestamping Timestamp Vision ONE chassis uses PTP or NTP to obtain time reference
  • 15. 15© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | BURST PROTECTION Burst Protection – Adds extra buffering to 1G interfaces to provide protection from microburst events and avoid data loss. Typical Use Cases • Aggregation: When aggregating traffic from multiple locations in the network to a single 1G tool, it is possible to momentarily exceed 1Gbps of traffic. • Speed Translation: When filtering a sub 1G flow from a single 10G link, burst protection can prevent a momentary burst in the 10G flow from creating loss in the 1G analysis tool.
  • 16. 16© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | IXIA – ALWAYS FULL RATE ADVANCED PACKET PROCESSING  The Bottom Line Ixia always supports full rate processing Independent of frame size Independent of number of functions enabled  See Tolly Test Report #216100 Full Rate Advanced Packet Processing
  • 17. 17© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ENTERPRISE – INTELLIGENT APPLICATION PROCESSING • ATI Processor (ATIP) - Context-rich Application Visibility • Application forwarding based on application, geography, and RegEx matching • Real-time dashboard • Rich NetFlow / IPFIX generation – Device OS – Browser – Carrier BGP AS# – Geolocation • Data Masking • Stateful SSL decryption All traffic from Georgia All voice traffic from HTC Ones Someone from S. Africa watching House of Cards on Netflix on an iPhone on Vodacom’s network NPB – App Brokering Meta Data App Filtering
  • 18. 18© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATIP – DEEP PACKET INSPECTION  Reuses ATI engine to perform Deep Packet Inspection  Identifies Applications Application events Handset OS Browser Geolocation  Subscription Profiles update every 3 weeks
  • 19. 19© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | APPLICATION FILTERING Point and Click Filter settings Geographic Matching Click map or country name App Matching Static, dynamic, customApp Groups Category, OS, etc.
  • 20. 20© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | REGEX SEARCHING & DATA MASKING Easy Setup Add to any filter Predefined Patterns Email, credit cards, SSN, etc. Custom Patterns Built in UI Optional Masking Partial or complete string Fixed Offset L2-L4 Header offset
  • 21. 21© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | FLEXIBLE TRAFFIC HANDLING Easy Setup Forward, NetFlow, or both Real-time Stats For all filters
  • 22. 22© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | RICH NETFLOW / IPFIX GENERATION Easy Setup One-click enable Standard Fields Including router offload IxFlow Extensions Handset, browser, geo, SSL High performance Supports up to 10 collectors
  • 23. 23© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATIP ENABLES SSL INSIGHT • Passive decryption – no impact on application performance • Fully compatible with all other ATIP features: Rich Netflow/IPFIX Data Masking Geolocation • Easy setup – just import server certificate & key • All popular key exchange & ciphers: RSA & DH Key Exchange SHA1/521/384/256/224 MD5 • Application Filtering • Handset/workstation type • Browser identification • 3DES • RC4 • AES • ECC (Elliptic Curve) • Encryption details reported over Netflow Hardware Encryption Offload
  • 24. 24© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | ATIP USE CASES SaaS Issue Correlation to Service Provider Granular VoIP Filtering
  • 25. 25© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | TWO MAIN VISIBILITY TOPOLOGIES Monitoring (out-of-band)  Analytics tools terminate the traffic and do not forward back to the network.  Typical analytics tools: Application Performance Monitoring (APM) Network Performance Monitoring (NPM) Intrusion Detection System Data recording Inline (inband)  Tools analyze and selectively drop traffic or forward it back to the network.  Typical inline tools Intrusion Prevention System (IPS) Data Loss Prevention (DLP) Web Cache SSL encrypt / decrypt Firewall
  • 26. 26© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | INLINE & MONITORING TOGETHER Inline Monitoring Inline • IPS (multiple vendors) Out-of-band Monitoring • Data logging
  • 27. 27© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | SERIAL INLINE DEPLOYMENT Switch 1 2 3
  • 28. 28© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | EXTERNAL BYPASS Why use External vs Integrated Bypass? 1. External reliability is 5 times better! MTBF (Mean Time Between Failure in Hours) External Bypass: 450,000 Integrated Bypass: 80,000 2. Easier to replace failed devices No risk of taking network down 3. Same system size as integrated bypass 2U
  • 29. 29© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | EASY TO CONFIGURE  Create complex topologies in minutes Inline serial Parallel load balanced Inline serial & Parallel load balance together
  • 30. 30© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | N+M REDUNDANCY Supports any combination of N+M tool redundancy  N+M Redundancy: M warm standby tools to protect N active tools  N+1 Redundancy: a single warm standby tool to protect N active tools Behavior under tool failure  Standby tool takes over traffic from failed tool  Active tool traffic again when it recovers  Failure detected via use of heartbeats
  • 31. 31© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | DETECT FAILURES QUICKLY - RICH HEARTBEATS Detecting failures  Heartbeats exist between bypass switch & NPB  Heartbeats exist between NPB & tool  Absence of heartbeats indicates failure Key capabilities  Predefined heartbeats to match different tools  Highly customizable heartbeats for tricky situations  Supports single-stage (blue) or multistage (red) heartbeats
  • 32. 32© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | VISION ONE – SECURITY WITHOUT SACRIFICE  Intelligent • ATIP: DPI for app awareness • SSL decryption • Reliable adv. packet processing • Supports inline & monitoring • Terminates physical & vTap traffic  Compact • 1U high • Connectivity • 48 SFP+ for 1G or 10G • 4 QSFP+ for 4x40G or 16x10G • Growth via expansion slot  Reliable • Based on NVOS 4.x • Redundant, hot swappable power supplies & fans • NEBs capable  Multiuser ready • Extensive role-based access control • Automatic Filter Rule Compiler • Intuitive GUI • RESTful API
  • 33. 33© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | #securitywithoutsacrifice Amplify security without ever changing a cable. See everything. Miss Nothing.

Editor's Notes

  1. Deploying security is not easy Networks are continuously at risk of exposure Things are constantly changing…new threats, new compliance requirements, new applications. And It takes many specialized tools to protect the network And those tools are expensive xxx ---------------------- Tools are single purpose They are expensive Network threats keep changing Governance and compliance needs always changing…. New apps always emerging Need to be adaptable Every enterprise is under attack To secure something you need to see it Securing the enterprise is a hard job Threats Malware Compliance DLP
  2. To top it all …. The network is constantly evolving…. BYOD – is adding many uncontrolled devices on the network So much more traffic is encrypted….you don’t know what's hiding in that encryption IoT is adding endpoints that need to be protected from attack and you never know which one could be compromised With the cloud your data has gone off premise but you still have to protect it. XXXXXXXXXXXXXX Show the mega trends…. IoT BYOD Cloud services Encryption
  3. 100,000 Hours for NPB 450,000 Hours for iBypass