1 / 0

Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010

Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010 . Who is BreakingPoint Systems ?. Founded September 2005 285% Revenue growth, 2009 vs. 2008 12 Quarters of Consecutive Growth Breakthrough, award-winning products

hung
Télécharger la présentation

Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010

  2. Who is BreakingPoint Systems ? Founded September 2005 285% Revenue growth, 2009 vs. 2008 12 Quarters of Consecutive Growth Breakthrough, award-winning products Privately held and based in Austin, TX Sales & Support: US, Canada, UK, France, Italy, Spain, Netherlands, Belgium, Israel, Switzerland, Finland, Sweden, Germany, Norway, India Japan, China, Korea, Taiwan, Malaysia, New Zealand, Australia, …
  3. What can BreakingPoint Systems Offer ? BreakingPoint provides New Generation of High Performance Test Equipment at All Inclusive L2, L3, L4, L7, Security and Fuzzing from the same test port at the time using the same Management Software and same Hardware. No License Model – All Features Available by Default
  4. What type of tests does BreakingPoint provide ? Realistic Traffic Emulation Layer 2-7 IPv4 and IPv6 Bit Blaster - Generates Ethernet frames (L2 Tests) Routing Robot - Generates IP packets (L3 Tests) Session Sender - Generates TCP and UDP (L4 Tests) L2 and L4 Recreate – Raw Playback, TCP and UDP PCAP AppSim –140+ Client and Server Application Protocols (L7 Tests) Layer 4-7 ClientSim– Interaction with Real Server (L7 Tests) Malicious Traffic Simulation Layer 2-7 IPv4 and IPv6 Security Module – 4,500+ unique attacks, 80+ evasion types Stack Scrambler – Protocol Fuzzing on AppSim Module Protocols No License Model – All Features Available by Default
  5. BreakingPoint Systems Key Benefits New Generation of Hardware Architecture optimized for Layer 2-7: FPGA and Network Processor High-Performance Traffic Simulation Layer 2-7 per 4U Chassis: Up to 80 Gbps L2/L3 Traffic Simulation Up to 40 Gbps L4/L7 Traffic Simulation Up to 1.5 Million New L7 Sessions per Second Up to 30 Million Concurrent L7 Sessions Flexible and Easy to Use Interface Web GUI to control L2, L3, L4, L7 Traffic, Security and Fuzzing Device Under Test Monitoring (SSH, Telnet, SNMP, Serial) Possibility to mix in the same test on a single test port in same test L2/L3 Stateless and L4/L7 Stateful traffic Good Stateless/Stateful and Malicious traffic
  6. User Friendly Web Interface
  7. Resiliency Score
  8. BreakingPoint Storm CTM (Cyber Tomography Machine) BreakingPoint Storm CTM™ 130+ applications 4,500+ live security attacks 80+ evasions 40 Gbps blended application traffic 30M concurrent TCP sessions 1.5M TCP sessions/second
  9. Keep Up-To-Date Application and Threat Intelligence Frequent and automatic applications and attack updates Published methodologies Service, support, and comprehensive maintenance
  10. BreakingPoint Resiliency Score Simple method to evaluate network device resiliency under real-world conditions Performance Frame rate Concurrent sessions New session rate Security Susceptibility to direct attack Optional strike blocking abilities Stability Resistance to fault injection Fixed standard to evaluate multiple devices Repeatable measurements
  11. Scoring the Target Device or Network
  12. Layer 3 Test Routing Robot Module
  13. Layer 3 Network Performance Validation Routing Robot determines if a DUT can handle high volumes of Layer 3 traffic by sending traffic from one interface and monitoring the receiving interface to see if the traffic is successfully received. Routing Robot can simulate Frame Size from 64 to 9216 Bytes
  14. BreakingPoint Routing Robot – Layer 3 Testing
  15. BreakingPoint Routing Robot – Layer 3 Testing
  16. RFC 2544 GUI
  17. Simple RFC2544 GUI
  18. Real-Time Stats
  19. Real-Time Stats
  20. RFC 2544 Test Result Summary
  21. Latency Measurement in Microseconds
  22. Traffic Overview
  23. Layer 4 Test Session Sender Module
  24. Layer 4 Network Performance Validation The Session Sender test component measures the device’s ability to handle a large number of new TCP session per second, concurrent TCP sessions and TCP Bandwidth. Session Sender can simulate Segment Size until 9146 Bytes
  25. BreakingPoint Session Sender – Layer 4 Testing
  26. BreakingPoint Session Sender – Layer 4 Testing
  27. BreakingPoint Session Sender – Layer 4 Testing
  28. BreakingPoint Session Sender – Layer 4 Testing
  29. Layer 2 Replay Raw Replay Recreate Module
  30. Recreate Captured Traffic The BreakingPoint Recreate feature replay PCAP exactly as it is based on raw data L2,L3,L4 and L7 information from the original PCAP. BreakingPoint will do Raw Playback. Layer 2 PCAP Replay give the ability to replicate customer issue on Mobile Protocols decoding.
  31. L2 Recreate Mobile Protocol GTP
  32. L2 Recreate Mobile Protocol IuUP
  33. Layer 4 Replay Mix TCP & UDP Recreate Module
  34. Recreate Captured Traffic The BreakingPoint Recreate feature recreates multi-flow TCP/UDP traffic based on data from PCAP. BreakingPoint does not use a raw playback, instead it will do stateful multi-flow allowing possibility to replay stateful TCP & UDP traffic with ability to amplify at High Performance.
  35. BreakingPoint Recreate: Capture File Setting
  36. BreakingPoint Recreate: Layer 4 Replay TCP/UDP
  37. BreakingPoint Recreate: Amplify Replay
  38. BreakingPoint Recreate: Layer 4 Replay TCP/UDP
  39. Layer 7 Test Application Simulator Module Real Protocols High Performance NOT Replay of PCAP
  40. Layer 7 Application Performance Validation Application Simulator allows you to define 120+ applications protocols to make complex application protocol distributions to simulate real world traffic. Application Simulator allows you to define in depth each protocol using advanced protocol configuration “SuperFlows”.
  41. Partial List of 140 Applications
  42. Partial List of 140 Applications
  43. Enterprise Mix Protocols
  44. Service Provider Mix Protocols
  45. Education Mix Protocols
  46. Create your own Mix of L7 Protocols
  47. High Level Real-Time Stats L2, L3, L4 and L7
  48. Detail Real-Time Stats per L7 Protocols
  49. Protocol API Custom Application Toolkit Create your Own Protocol
  50. What Is BreakingPoint Custom Application Toolkit? Protocol API to Create New Protocol XML-Based Description Language Ruby API for more advanced programming techniques Fully integrated with BreakingPoint Hardware BPS Storm CTM to simulate the New Protocol at High Performance with others native L7 Protocols.
  51. Importing Into BreakingPoint Storm CTM 2. Add “Custom Application” 3. Add “Process Dblock XML” 1. Create a SuperFlow
  52. P2P - LimeWire
  53. Youtube
  54. Layer 7 Test Client Simulator Module Interaction with Real Server
  55. Real Web Infrastructure
  56. BreakingPoint Test Infrastructure
  57. 34 Client Simulator Protocols Supported 1.  Chargen2.  Daytime3.  DB2 Connectivity4.  Discard5.  DNS6.  Echo7.  eDonkey8.  Finger9.  Gopher10.HTTP11.Ident12.IMAP13.IPP14.IRC15.MMS-MM1 16.Microsoft SQL17.MySQL18.NetBIOS Session19.NTP Synchronization20.POP321.QOTD22.Radius Access23.Radius Accounting24.Rlogin25.SMBv126.SMBv227.SMTP28.SNMPv1 29.STUN 30.SunRPC Bind31.Syslog32.Telnet33.TFTP34.Time 35.SIP
  58. Regular Expression to Extract, Insert and Modify
  59. SMB Statistics
  60. Security Test Security Module Real Attack NO Replay of Attack PCAP
  61. Network Security Performance Validation BreakingPoint Security component can be used to test network security devices – such as IPS, IDS and firewalls. It measures a device’s ability to protect a host by sending 4,500+ Attacks under CVE-ID, BugTraqID, OSVDB and verifying that the device successfully blocks the attacks.
  62. BreakingPoint Security Test Component
  63. BreakingPoint Security Test Component
  64. Security Test Report: High Level
  65. Security Test Report: Details
  66. Protocol Fuzzing Test Stack Scrambler Module
  67. Protocol Fuzzing Stack Scrambler tests the integrity of different protocol stacks by sending malformed packets to the device under test. It uses a fuzzing technique, which modifies a part of the packet (checksum, protocol options, etc.) to generate the corrupt data. Fuzzing could be done on AppSim Protocols.
  68. Packet Capture Exporting Export Compressed Packet Captures Ability to select only a specific range of packets Post Processing of Packet Captures use Berkley Packet Filtering
  69. Traffic Impairment
  70. Impairment per Subnet
  71. Possibility of Impairment
  72. Device Under Test (DUT) Real-Time Monitoring
  73. Real-Time Device Under Test Monitoring BreakingPoint offers the ability to connect to a DUT via Telnet, SNMP, SSH, or Serial to monitor the status of a DUT offering the ability to check CPU, Memory, New TCP connections per Second, Concurrent TCP Connections, Bandwidth and Packet per Second. Eliminates manual power-cycle reboots.
  74. Device Under Test Monitoring
  75. Device Under Test Monitoring
  76. Device Under Test Monitoring
  77. Test Scenario
  78. Mixing Layer 2-3 and Layer 4-7 Traffic BreakingPoint is the only solution able to send Layer 2-3 and Layer 4-7 traffic from a single test solution with single user interface on same test port.
  79. Mixing L2/L3 and L4/L7 Traffic
  80. Mixing L3/L7 IPv4 and L3/L7 IPv6 Traffic BreakingPoint is the only solution able to send L3/L7 IPv4 and L3/L7 IPv6 traffic from a single test solution with single user interface on same test port.
  81. Mixing L3/L7 IPv4 and L3/L7 IPv6 Traffic
  82. Mixing Good and Malicious Traffic BreakingPoint properly tests high-performance security devices with the capability to mix good traffic and malicious traffic emulating real world test scenarios.
  83. BreakingPoint: Mixing Good and Malicious Traffic
  84. Mixing Legitimate Traffic and Fuzzing Traffic BreakingPoint properly tests high-performance devices with the capability to mix good traffic and fuzzing traffic at the same time from the same test port and monitor the impact on the DUT over SSH, TELNET, SNMP or Serial.
  85. Mixing Legitimate Traffic and Fuzzing Traffic
  86. Automation using Drag and Drop GUI
  87. GUI Automation: Run Multiple Layer 2-7 Tests
  88. Global Reporting of Layer 2-7 Test Series
  89. BreakingPoint Systems Hardware Platform
  90. BPS Storm CTM Chassis – 8x 1 GigE Ports Hardware Information 1x Blades of 8x 1 GigE Ports SFP 1x Controller with Management Port and DUT Monitoring Port
  91. BPS Storm CTM Chassis – 16x 1 GigE Ports Hardware Information 2x Blades of 8x 1 GigE Ports SFP 1x Controller with Management Port and DUT Monitoring Port
  92. BPS Storm CTM Chassis – 4x 10 GigE Ports Hardware Information 1x Blades of 4x 10 GigE Ports XFP 1x Controller with Management Port and DUT Monitoring Port
  93. BPS Storm CTM Chassis – 8x 10 GigE Ports Hardware Information 2x Blades of 4x 10 GigE Ports XFP 1x Controller with Management Port and DUT Monitoring Port
  94. BPS Storm CTM Chassis – Mix Gigabit / 10 Gigabit Ports Hardware Information 1x Blade of 8x Gigabit Ports SFP 1x Blade of 4x 10 Gigabit Ports XFP 1x Controller with Management Port and DUT Monitoring Port
  95. BPS Storm CTM Hardware Platform Test Possibility
  96. BPS Storm CTM Hardware Platform Performance
  97. What kind of Network Equipment Validation ? BreakingPoint testing tools are used to validate the following network equipments: UTM IDS/IPS QoSDeep Packet Inspection Firewall Web Application Firewall Load Balancer WAN Accelerator Network Probe Lawful Interception SSL Accelerator Traffic Shaper SMTP Relay Anti-SPAM Proxy/Cache URL Filter Content Filter Anti-Virus /Anti-Malware …and more
  98. BreakingPoint Application and Threat Intelligence Program
  99. BreakingPoint Maintenance The BreakingPoint Application and Threat Intelligence (ATI) Program is an all-inclusive service that provides you with everything you need to maintain the BreakingPoint Storm CTM with new applications, security attacks, features, performance enhancements, service and support. With ATI, you will know that your devices, networks, and data centers are resilient against late-breaking attacks encountered in the wild, as well as emerging application protocols. You will also receive frequent performance enhancements and new features to streamline all of your resiliency measurement initiatives.
  100. The BreakingPoint ATI Program features Access to BreakingPoint's more than 130 application protocols with new applications provided frequently Current security coverage with 4,500+ security strikes, 80+ evasion techniques and frequent updates Surveillance and updates from our research team to keep your staff focused on resiliency, not research   Instant access to monthly product updates, new automation features, and management capabilities Easy access to our problem resolution team, product fixes, and online support Fast resolution of issues through full service and support
  101. Software Updates like Anti-Virus Update “One Click”
  102. Frequency New Major Release 2009
  103. Frequency New StrikePack 2009
  104. Frequency New L7 Protocols 2009
  105. Frequency New Attacks 2009
  106. Summary of BreakingPoint Systems Testing Products
  107. Summary of Test Possibilities
  108. Join the community ! http://www.breakingpointsystems.com/community/
  109. Thank You www.breakingpointsystems.com
More Related