Sản phẩm
Distributors:

 VPN Performance Validation

How secure are secure tunnels?
VPN Performance Validation
How secure is your data?
Perhaps the introductory question should read –
How is sensitive data being accessed and transferred
between sites?
The challenge many of us face today is understanding
how secure our data is, especially when it is stored
offshore on a cloud managed platform. The communication
of data securely between two sites is one of the
major issues facing IT systems today. The challenge is
further compounded when the applications in use are
latency sensitive.
Recent online events have shown that the time needed to
gain access to sensitive data is minutes! Reports show that
a dictionary type password attack or brute force attack
can forcefully provide access to a protected network and
data storage devices in less than quarter of an hour. Sadly,
the explosion in cheap computing power and personal
data on social networking communities is making the
criminal’s job far easier.
In terms of data access, the most common means of
securely accessing/transferring data is through secure
Virtual Private Networks (VPNs) of which there are
two types: client (IPSec VPN) and/or clientless mode
(TLS/SSL/DTLS VPN).
VPN Performance Validation
-How secure is your data?
- Choosing the right VPN validation model
- The importance of stateful per flow emulation
and analysis
- Per flow performance validation for secure VPNs
- Migrating to public/private cloud managed
platforms
- Why choose TeraVM to validate VPN
performance?
- Client versus Clientless VPNs
- Defining quantifiable VPN performance
measurements
- Illegal flows inside secure VPNs
-VPN performance validation strategy
- VPN seat license availability and reallocation
latency
- Building a benchmark
- Analysis of VPN tunnel performance in real time
- Assessing performance of varying the IPSec
algorithm formula
- Latency sensitive application performance inside
secure tunnels
- Impact of packet loss in secure VPNs
Validation of security platforms should cover functionality, scalability
and most importantly performance of both tunnel establishment and
the actual application performance in the secure tunnel.

 What is TeraVM?

Key Facts
TeraVM is 100% virtual
- Same test tool used to test physical solutions and/or virtual
solutions
- Supports all major hypervisors - ESXi, KVM
- Supports all major cloud platforms - OpenStack, AWS,
MS-Azure, Google Cloud, Oracle OCI, Containerization
- Supports 1 GbE, 10 GbE, 40 and 100 GbE NICs
Automation and Orchestration
- REST, CLI, Perl, TCL, XML, Java API, Python, Jython
- Cisco LaasNG, Cisco pyATS, Qualisystems (CloudShell)
L2-7 Stateful Traffic Application Emulation
- Voice: CUCM, CUBE, VoIP, WebEx, VoLTE, SIP & RTP, MOS
- Video: CMTS, CDN, Multicast, AMT, ABR, IPTV, VoD, OTT
streaming, Video conferencing, WebEx, TelePresence, HTTP
Video
- Data: TCP/UDP, Teraflow, Ookla speed test, HTTP/HTTPS, SMTP/
POP3, FTP, P2P, DNS, Quick UDP Internet Connections (QUIC)
Secure Access Firewall/VPN (ASA Firewall, FirePOWER)
- Secure TCP/UDP Protocols (SSL, TLS, DTLS, IPSec IKE)
- Client and Clientless VPNs (Cisco AnyConnect SSL and IPsec)
- 802.1x EAP-MD5, EAP & PEAP with MS CHAPv2 Authentication
- Mobile Secure Gateway validation (S1-U over IPSec)
Cybersecurity Threat and Malware Penetration
- 40,000+ attacks (Spam, Viruses, DDoS, Malware), updated
monthly
- DDoS attack applications:
‚ Flood: SYN, Reflective SYN, Reset, UDP, Ping, ARP
‚ Attacks: Teardrop; UDP Fragmentation; Configurable
Rates, Start and Stop
‚ Spoof Mac addressing
- Mixed application flows: Good, the Bad and your Own
Wireless RAN and Core Emulation
- RAN: 5G-NR, 4G-LTE, 3G, 2G - 1,000s of RANs
- CORE: 5G (NSA & SA), 4G-LTE 3G, 2G, Mobility, SecGW, MEC,
Network Slicing – Millions of UEs and Bearers
- CIoT: IPDD over NAS, NIDD over SCEF at Scale
- WiFi ePDG offload (EoGRE)
Wireless Core Interface Testing
- Support testing across multiple key Core interfaces
- Error Injection over 5G-N2 (AMF)
- Error Injection over 4G-S1 (MME)
Why TeraVM?
- Flow based tool with realism:
- Provides per-flow statistics in real time
- Statefully emulates and measures individual endpoint
and application performance for data, voice, video and security
services
- Easily pinpoint and isolate problem flows and bottlenecks
- Adaptive engine:
- Dynamically and Automatically find the maximum capacity of
Devices Under Test
- Same test profile can be used for multiple platforms
- Faster setup, faster testing, faster results = more testing = better
quality
- Centralized License Server/Elastic Test Bed:
- Scale with realism and grow on demand with license sharing
across geographical locations
- Flexibility to run anywhere... lab, datacenter and the cloud, with
consistent performance coverage
- Sharing test resources and methodologies delivering the most
cost-effective solution
- Shareable Cybersecurity threat database, maximizing resource
utilization and total cost of ownership
- Auto License Check-In on test completion
- System utilization reports (Location, User, Testbed, Licenses in
use, Usage stats)
- Wireless Mobility (5G, 4G, 3G, 2G) validation with realism:
- Emulate a city worth of stateful UE and subscriber network
activity
- Highly scalable user and control plane traffic. Scale beyond
100 Gbps of traffic
TeraVM is a software based L2-7 test tool running on x86 based servers, in
the Cloud (Amazon, Azure, Google Cloud, Oracle OCI, Openstack) and as a
container, delivering a fully virtualized application emulation and security
validation solution to test and secure devices, networks and their services.

 Product Brief

VIAVI
TeraVM
Cybersecurity Database
Agile and Progressive Security Validation.

 Cybersecurity threats are evolving at a pace, that it has now become extremely difficult, to continuously assess

and validate the effectiveness of security against the latest exploits. In many cases, it has become so complex and
costly that many security defences simply go unvalidated. At the rate that new vulnerabilities are being exposed,
there is a real worry that security defences are lagging behind.
TeraVM’s Cybersecurity Threat Database provides the capability to analyze security with a comprehensive
repository of traffic signatures, enabling assessment with the Good, the Bad and your Own. The TeraVM threat
database includes known Common Vulnerability and Exposures (CVE), unknown (researched threats) and the ability
to include your own traffic profiles, providing the maximum coverage possible for threat assessment.
With TeraVM, you can be assured that you will have the most up to date assessment capability, as and when the
threat-scape changes. This not only helps to ensure that you have the right level of security but your investment in
threat assessment is protected for the future.
Efficient and Reliable Assessment of Security Counter Measures
Security Hardening
By emulating the latest CVE security threat and exploit profiles, users of
TeraVM can quickly assess security vulnerabilities in a safe and contained
manner. TeraVM enables users to quickly pinpoint where the weaknesses are
in their security counter measures ensuring the appliance or application is
patched for any vulnerabilities.
Performance Under Duress
Determine with precision the effectiveness of security counter measures
against scaled and targeted attacks. Assess what the impact is on normal
network operations in a safe and contained manner. Use TeraVM to emulate
common distributed denial of service attacks with known exploits and
device vulnerabilities.

 What is TeraVM?

 
Key Facts
TeraVM is 100% virtual
- Same test tool used to test physical solutions and/or virtual
solutions
- Supports all major hypervisors - ESXi, KVM
- Supports all major cloud platforms - OpenStack, AWS,
MS-Azure, Google Cloud, Oracle OCI, Containerization
- Supports 1 GbE, 10 GbE, 40 and 100 GbE NICs
Automation and Orchestration
- REST, CLI, Perl, TCL, XML, Java API, Python, Jython
- Cisco LaasNG, Cisco pyATS, Qualisystems (CloudShell)
L2-7 Stateful Traffic Application Emulation
- Voice: CUCM, CUBE, VoIP, WebEx, VoLTE, SIP & RTP, MOS
- Video: CMTS, CDN, Multicast, AMT, ABR, IPTV, VoD, OTT
streaming, Video conferencing, WebEx, TelePresence, HTTP
Video
- Data: TCP/UDP, Teraflow, Ookla speed test, HTTP/HTTPS, SMTP/
POP3, FTP, P2P, DNS, Quick UDP Internet Connections (QUIC)
Secure Access Firewall/VPN (ASA Firewall, FirePOWER)
- Secure TCP/UDP Protocols (SSL, TLS, DTLS, IPSec IKE)
- Client and Clientless VPNs (Cisco AnyConnect SSL and IPsec)
- 802.1x EAP-MD5, EAP & PEAP with MS CHAPv2 Authentication
- Mobile Secure Gateway validation (S1-U over IPSec)
Cybersecurity Threat and Malware Penetration
- 40,000+ attacks (Spam, Viruses, DDoS, Malware), updated
monthly
- DDoS attack applications:
 Flood: SYN, Reflective SYN, Reset, UDP, Ping, ARP
 Attacks: Teardrop; UDP Fragmentation; Configurable
Rates, Start and Stop
 Spoof Mac addressing
- Mixed application flows: Good, the Bad and your Own
Wireless RAN and Core Emulation
- RAN: 5G-NR, 4G-LTE, 3G, 2G - 1,000s of RANs
- CORE: 5G (NSA & SA), 4G-LTE 3G, 2G, Mobility, SecGW, MEC,
Network Slicing – Millions of UEs and Bearers
- CIoT: IPDD over NAS, NIDD over SCEF at Scale
- WiFi ePDG offload (EoGRE)
Wireless Core Interface Testing
- Support testing across multiple key Core interfaces
- Error Injection over 5G-N2 (AMF)
- Error Injection over 4G-S1 (MME)
 
Why TeraVM?
- Flow based tool with realism:
- Provides per-flow statistics in real time
- Statefully emulates and measures individual endpoint
and application performance for data, voice, video and security
services
- Easily pinpoint and isolate problem flows and bottlenecks
- Adaptive engine:
- Dynamically and Automatically find the maximum capacity of
Devices Under Test
- Same test profile can be used for multiple platforms
- Faster setup, faster testing, faster results = more testing = better
quality
- Centralized License Server/Elastic Test Bed:
- Scale with realism and grow on demand with license sharing
across geographical locations
- Flexibility to run anywhere... lab, datacenter and the cloud, with
consistent performance coverage
- Sharing test resources and methodologies delivering the most
cost-effective solution
- Shareable Cybersecurity threat database, maximizing resource
utilization and total cost of ownership
- Auto License Check-In on test completion
- System utilization reports (Location, User, Testbed, Licenses in
use, Usage stats)
- Wireless Mobility (5G, 4G, 3G, 2G) validation with realism:
- Emulate a city worth of stateful UE and subscriber network
activity
- Highly scalable user and control plane traffic. Scale beyond
100 Gbps of traffic
TeraVM is a software based L2-7 test tool running on x86 based servers, in
the Cloud (Amazon, Azure, Google Cloud, Oracle OCI, Openstack) and as a
container, delivering a fully virtualized application emulation and security
validation solution to test and secure devices, networks and their services.
1
Tìm kiếm