Sie sind auf Seite 1von 8

Ixia BreakingPoint Storm

Is Your Network Infrastructure Resilient Against


Attack and High-Stress Application Trafc?
The Ixia BreakingPoint Storm nds previously impossible-to-detect stress fractures in your network,
network devices, or data center before they are exploited
The BreakingPoint Storm is a Cyber Tomography Machine
designed for the world in which we livea perilously
interconnected universe with escalating network trafc and cyber
attacks from a growing list of enemies. It is the only product
that allows you to pinpoint previously impossible-to-detect
weaknesses and vulnerabilities in network components such as
routers, switches, rewalls, servers and data centers before they
can be exploited to wreak havoc within your critical network
infrastructure.
Based on a breakthrough in network processor technology and
a future-proof product architecture, only BreakingPoint Storm can
provide this unprecedented insight by producing these real-world
conditions:
A custom blend of stateful application and malicious trafc
for your network at 40GB per second
An always current real-world mix of applications and attacks
Unprecedented scalability producing true global network
scenarios and trafc from millions of users
With the ability to simulate real-world conditions at those
performance levels, only the BreakingPoint Storm can truly
measure the resiliency and accuracy of products that rely on
deep packet inspection (DPI) technologynetwork devices, lawful
intercept systems, data loss prevention solutions and more. By
measuring the resiliencyperformance, security and stabilityof
discrete network components under high-stress, hostile conditions,
BreakingPoint enables you to nd the hidden stress fractures
lurking within your critical network.
Comprehensive Applications, Attacks, Service and Support
BreakingPoint also offers the BreakingPoint Application and
Threat Intelligence (ATI) Program, an all-in-one service
backed by a team of security experts. This program keeps your
BreakingPoint Storm updated with the latest security attacks and
applications, as well as new product features and performance
upgrades as they are released.
BreakingPoint Storm measures how your network or data center
will weather cyber attack or the stress of high-volume trafc with a
solution that is:
Enterprises, government agencies and contractors, service
providers and network equipment manufacturers at the
forefront of the war on cybercrime rely on BreakingPoint
products and expertise to:
Harden Network Infrastructures: Assault network
infrastructures with a custom, global and current blend
of stateful applications, live security attacks and extreme
high-stress load to measure resiliency. Gain visibility into
never-before-seen areas of your network, probing every
weakness and vulnerability to pinpoint hidden stress
fractures.
Optimize Data Center Resiliency: Simulate the
behavior of millions of users, a crush of real-world
application trafc and live security attacks to ensure that
data centers will be resilient under hostile conditionsall
without the need to deploy racks of high-speed servers and
costly software.
Evaluate Network Equipment: Evaluate and
select the most appropriate network equipment for
your infrastructure with standardized, repeatable and
deterministic product assessments. Measure and harden
the resiliency of routers, switches, rewalls, IPS, UTM and
other devices by subjecting them to real-world conditions
prior to deployment and after patches or conguration
changes.
Maintain Resiliency and Compliance: Identify
network devices or systems that would benet from tuning
and conguration changes. Audit and maintain standards
compliance throughout the life cycle of network devices
and systems.
Research and Train Security Experts: Re-create
global-scale network conditions and the ever-changing
threat landscape. Analyze the impact of trafc on network
devices and systems to conduct research and train the next
generation of security experts.
Learn More Inside >>
Ixia BreakingPoint Storm
Comprehensive: Simulates Real-World Scenarios
The BreakingPoint Storm provides comprehensive
simulations for any situation:
Network Proles Use precongured trafc proles to
represent a range of network scenarioswireless, global
service provider, enterprise, government and others
Application Simulator Measure the ability of a
network device to accurately process a variety of application
layer trafc ows
Client Simulator Measure the ability of a server or server
farm to efciently handle extreme trafc volume by simulating
the behavior of millions of concurrent users
Security Subject a device to thousands of unique security
attacks to validate blocking capabilities or conrm the
stability of devices
Session Sender Measure the ability of a device to handle
concurrent TCP sessions by creating and maintaining large
numbers of valid TCP sessions with contrived data
Stack Scrambler Measure the ability of a device to operate
in the face of invalid IP, UDP and TCP packets produced by
fuzzing
Re-create Capture and re-create trafc ows that are
independent of network topology
Routing Robot Measure the ability of a device to correctly
route IP packets by producing IP packets with a UDP payload
Realistic and Adaptive: More Than 34K+ Security
Attacks and 180 Applications With Frequent Updates
The BreakingPoint Storm adapts to the ever-changing cyber
landscape with the latest real-world applications and live security
attacks.
Live Security Attacks With security in our DNA,
BreakingPoint provides an extensive and always current
library of 34K+ realistic security attacks with updates
published by our dedicated team of in-house security
researchers. Using advanced security coprocessor
technology, these attacks are randomized, obfuscated and
undetectable by trivial pattern-matching intrusion prevention
system (IPS) algorithms
Microsoft Tuesday Updates Ensure that your network or
device is fully covered with full Microsoft Tuesday coverage
Real-World Applications Select and blend stateful
application trafc from a library of more than 180 of the
worlds most popular applications: AOL IM, Google
Gmail, FIX, Gnutella, IBM DB2, VMware VMotion,
HTTP, Microsoft CIFS/SMB, MAPI, Oracle, Encrypted
BitTorrent, eDonkey, MSN Nexus, RADIUS, SIP, Skype,
Windows Live Messenger, World of Warcraft, Yahoo!
Mail, Yahoo! Messenger and many others
Custom Toolkits Optional Custom Toolkits accelerate attacks
and proprietary protocols
BreakingPoint Storm Cybersecurity Advantages
Real-World Application and Network Proles
Precongured stateful application trafc proles for a range
of networks: mobile, service provider, enterprise, government,
higher education and others
Blend of more than 180 global applications, such as AOL
IM, Google Gmail, FIX, Gnutella, IBM DB2, VMware
VMotion, HTTP, Microsoft CIFS/SMB, MAPI, Oracle,
Encrypted BitTorrent, eDonkey, MSN Nexus, RADIUS, SIP,
Skype, Windows Live Messenger, World of Warcraft,
Yahoo! Mail, Yahoo! Messenger and many others
No performance degradation with blended protocols
Stateful re-creation of captured trafc, including an industry-
leading 2 Gigabytes of capture buffer per port
Optional Custom Application Toolkit for proprietary
applications
Live Security Attacks
Searchable library of more than 34K+ live security attacks
and frequent updates
Comprehensive Microsoft Tuesday coverage
More than 80 evasions to validate common security defenses
Optional Custom Strike Toolkit for custom attacks
All-in-One Application and Threat Intelligence
The latest attacks and applications as well as new product
features, upgrades, maintenance, service and support
Backed by dedicated Application and Threat Intelligence
team
Deep Packet Inspection (DPI), Data Loss Prevention,
Anomaly Detection and Lawful Intercept Validation
DPI validation using needle-in-a-haystack scenarios
Ability to embed anomalous trafc patterns and multilingual
keywords into tens of millions of data streams
Easy to Use, Easily Scalable
Intuitive object-oriented user interface for creating realistic
simulations
Wizard-like labs for accelerating conguration
Ability to scale to unlimited performance levels
Unprecedented Performance from a Single Chassis
40 Gbps of stateful application trafc
80,000+ SSL sessions per second from a single chassis
30 million concurrent TCP sessions
1.5 million TCP sessions per second
600,000 steady-state complete TCP sessions per second
Comprehensive IPv6 Compliance Validation
Most current and complete IPv4/IPv6 dual-stack
Ixia BreakingPoint Storm
Fast: Emits High-Stress Trafc Composed of Millions of Users, 40GB of Stateful Applications and 80,000 SSL
Sessions per Second
The BreakingPoint Storm emits a high-speed mix of hundreds of application
protocols, thousands of security attacks and millions of users to measure the
resiliency of your network infrastructure against attack and high-stress load.
High-Speed Blended Application Trafc Assault network devices and networks
with up to 40 Gigabits per second (Gbps) of stateful application trafc in a
single chassis
Network ProcessorBased Architecture Reach unprecedented throughput levels
with the only solution architected for performance, realism and responsiveness
using a patent-pending network processorbased platform. The native 64-bit
architecture delivers unparalleled performance in a single 3-slot chassis:
40 Gbps of stateful application trafc
80,000+ SSL sessions per second from a single chassis
30 million concurrent TCP sessions
1.5 million TCP sessions per second
600,000 steady-state complete TCP sessions per second
1GE and 10GE Interfaces Mix or match your choice of an 8-port 1GE or 4-port
10GE interface card
Scalable Scale to enormous performance levels with multiple chassis using a
single user interface, one conguration and integrated reporting
Easy to Use, Scale and Update: Provides Extensive Automation,
Precongured Labs and Intuitive User Interface
The BreakingPoint Storm makes it easy to reuse scenarios, parameters and
application settings; run concurrent independent simulations; and even
perform all features via the Tcl API. Create and modify complex evaluations
and measurements without the need for time-consuming scripting and reduce
conguration time to a matter of minutes.
Simulation Labs Streamline conguration with a library of precongured
simulations that combine all the elements needed for many common product
assessments, including:
BreakingPoint Resiliency Score
RFC 2544 Validation Lab
Mobile Network Optimization
Session Sender Lab
Device Control and Automation Connect directly to a network or data center
device to gather performance and security measurements without the need for a
separate switch
Simulation Import/Export Enable multiple users to share and reuse scenarios
for a range of devices with an easy-to-use bulk import/export functionality
Real-Time Statistics Immediately visualize measurement data during the
evaluation
Extensive Reporting Generate comprehensive and congurable reports, in
Web/PDF format or as raw data, that provide insight and analysis to staff at
all levels. Automatically produce detailed reports to streamline remediation
efforts
ATI Program for Updates, Service and Support Automatically receive the
latest attacks, applications and operating systems upgrades at no additional
cost, as well as access to comprehensive service and support
Network Neighborhood Unique within the industry, the BreakingPoint Storm
advanced user interface separates application simulation components from
a particular network topology, making it simple to scale and to recongure
simulations around new requirements. This object-oriented user interface
eliminates complexity and makes it easy to reuse parameters and application
settings by layering them on top of easily recongured network topologies
BreakingPoint Storm Application Manager
Choose from more than 150 applications, and tailor each protocol
and simulation to your exact needs.
BreakingPoint Storm Intuitive User Interface
Create and modify complex simulations with built-in automation,
precongured labs and an intuitive user interface.
BreakingPoint Storm Strike Database
Search for the live security attacks you need; save them in a smart
list and it will automatically update with the latest attacks that t
your original search criteria.
Ixia BreakingPoint Storm
Multi-User Conduct up to 16 concurrent simulations for maximum
productivity, and add multiple users with varying privileges
Scalable Simulation Scale to enormous performance levels by
linking multiple BreakingPoint Storm s using a single user interface,
conguration and integrated reporting
Tcl API Build your own sophisticated scenarios with our full-featured
programmatic Tcl interface
Repeatable, Deterministic and Scientic: Leverage Proven
Methodologies, Repeatable Labs and Pseudo Random
Number Generation
The BreakingPoint Storm features prepackaged simulation labs for
standardized and repeatable assessments. The product also supports
pseudo random number generation (PRNG) to ensure that randomized
components of a simulation can be repeated. The BreakingPoint Storm
is also the only product to provide a Resiliency Score Lab, a repeatable,
deterministic and scientic score of a devices performance, security and
stability over time.
Prepackaged and Repeatable Simulation Labs Leverage
precongured simulation labs that require minimal modication to
streamline setup and tedious conguration changes
Pseudo Random Number Generation (PRNG) Produce random yet
repeatable trafc simulations using a PRNG seed. PRNG ensures that
even the randomized components of a simulation sequence may be
repeated identically across multiple cycles
BreakingPoint Resiliency Score Use the standardized Resiliency
Score Lab for a deterministic, scientic and easy-to-use evaluation
mechanism for the performance, security and stability of networking
devices. With virtually no conguration effort, users can easily
compare the resiliency of numerous networking devices or highlight
scoring trends over time, holding their equipment vendors accountable
for performance and security weaknesses
The BreakingPoint Resiliency Score
Certication for performance and security is nothing
new. In fact, we have come to expect it for everything
from our phones to our automobiles. Yet cyber
infrastructure equipment, which supports our businesses
and governments, has no standardized certication for
performance and security. Instead we rely on statements
made in product marketing literature, which are based
on best-case
scenarios, not
real-world truths.
Organizations
want measurable
answers, not
assurances,
when it comes to
cybersecurity.
The BreakingPoint
Resiliency Score
replaces marketing
assurances with
the measurable
answers needed
to harden cyber
infrastructure against attack and peak application load.
Using the BreakingPoint Resiliency Score, available within
the BreakingPoint Storm, enterprises, service providers
and government agencies can evaluate equipment using
an objective, repeatable and scientically measured
certication of the performance, security and stability
of any network or network device. The BreakingPoint
Resiliency Score is a highly automated, relevant and
reproducible scoring mechanism that measures the
resiliency of a network or network device under real-world
application trafc, real-time security attacks, heavy user
load and other methods.
The BreakingPoint Resiliency Score lets you:
Conduct standardized, deterministic and repeatable
bake-offs to evaluate vendor performance and security
claims
Identify deployments that are inherently less resilient
and establish risk models for managed security service
engagements
Institute and consistently analyze accurate liability
models
Create tiered pricing models that take into account
liability and risk models
Identify and remediate security and performance
degradation over time to ensure ongoing resiliency
Rightsize your infrastructure by evaluating resiliency
based on deployment scenarios
Make more informed network device and service
purchase decisions
The BreakingPoint Resiliency Score
A standardized and highly automated means to measure
and deterministically score the performance, security and stability
of networking devices.
Ixia BreakingPoint Storm
All Inclusive: Stay Current With The Application and
Threat Intelligence (ATI) Program
BreakingPoint products are architected to adapt rapidly to change. That is
the only way to ensure that networks will maintain ongoing resiliency against
attack. BreakingPoint continuously introduces security strikes and applications
from BreakingPoint Labs through our Application and Threat Intelligence (ATI)
service and support program.
The only research team of its kind, the BreakingPoint ATI team is a dedicated
group of security researchers and application protocol engineers committed
to keeping the BreakingPoint Storm completely current. The research team
provides frequent strike and protocol updates and is on call to provide users
with requested protocols, often in a matter of hours. The combination of the
BreakingPoint Storm and up-to-date security strikes and protocols enables
you to nd critical cyber infrastructure vulnerabilities before it is too late.
Additional Options
BreakingPoint Custom Application Toolkit: Write and accelerate your own proprietary applications
BreakingPoint Custom Strike Toolkit: Develop and accelerate custom security attacks
BreakingPoint Storm Technical Specications
System Conguration
3-slot chassis with 1 system controller
Up to 2 interface cards per chassis; options include:
10GE interface card
4 10GE ports
XFP interface
2 Gigabytes of capture buffer per port
1GE interface card
8 1GE ports
SFP interface
1 Gigabyte of capture buffer per port
Physical Specications
Rack Units: 4
Installed: 17.4 in. W x 7 in. H x 19.5 in. D (44.2 cm W x 17.8 cm H x 49.8 cm D)
Shipping Weight: 45 lbs. (20.4 kg)
Operating Environment: 15 C to 40 C
Nonoperating Environment: -20 C to 70 C
Power Requirements: 100-240V, 50/60 Hz
Maximum Power Consumption: 1200W
Regulatory Approvals: FCC Class A, CE, EN60950
BreakingPoint ATI Program
Keep your simulations current with the very latest live security attacks,
real-world applications and features automatically updated to your
BreakingPoint Storm.
The BreakingPoint Storm
3-slot chassis is available with a 10GE or 1GE interface card and can
be seamlessly connected to additional chassis for unlimited performance
scalability.
Ixia BreakingPoint Storm
Partial List of More Than 150 Real-World Applications
In addition to more than 4,500 live security attacks, the BreakingPoint Storm supports a growing portfolio of more than 150
applications, with new applications and security attacks added frequently. Visit www.breakingpoint.com for the most up-to-date list.
AUTHENTICATION
DIAMETER
RADIUS Accounting
RADIUS Access
CHAT | INSTANT MESSAGING
AIM6 Keyserver
AIM6 Rendezvous
AIM6 Switchboard
AOL Instant Messenger
Google Talk
ICQ
IRC
JABBER
MSN Dispatch
MSN Nexus
MSN Notication
MSN Passport
MSN Switchboard
OSCAR
OSCAR File Transfer
QQ IM
QQ Live
Windows Live Messenger
Yahoo! Messenger
CUSTOM APPLICATIONS
BGP
RAW
DATA TRANSFER
FTP
Gopher
HTTP
NNTP
RSync
TFTP
DATA TRANSFER / FILE
SHARING
IPP
NetBIOS
NetBIOS DGM
NetBIOS NS
NetBIOS SSN
NFS
RPC NFS
SMB
SMB/CIFS
SMB v2
DATABASES
IBM DB2
Informix
Microsoft SQL
MySQL
Oracle
PostgreSQL
Sybase
TDS
TNS
DISTRIBUTED COMPUTING
Citrix
DCE/RPC
VMware VMotion
ENTERPRISE APPLICATIONS
DCE/RPC Endpoint Mapper
DCE/RPC Exchange
Directory
DCE/RPC MAPI Exchange
LPD
MODBUS
SAP
EMAIL/WEBMAIL
AOL Webmail
Google Gmail
GMX Webmail
GMX Webmail Attachment
MSN Hotmail
MSN Hotmail Attachment
IMAP
IMAPv4 Advanced
Outlook Web Access
POP3
POP3 Advanced
SMTP
Yahoo! Mail
Yahoo! Mail Attachment
FINANCIAL
FIX
FIXT

GAMES
World of Warcraft
Xbox Live
MOBILE
HTTP Mobile
BlackBerry Services
BBC iPlayer
Apple App Store
Android Market
PEER-TO-PEER
Applejuice
BitTorrent Peer
BitTorrent Tracker
BitTorrent
eDonkey
Gnutella Leaf
Gnutella Ultrapeer
PPLive/QQLive
WinNY
REMOTE ACCESS
RDP
REXEC
RFB
RLogin
Telnet
SECURE DATA TRANSFER
HTTPS
SSH
SYSTEM/NETWORK
ADMINISTRATOR
DNS
DNS (Deprecated)
IDENT
IPMI v1.5
Finger
LDAP
NTP
RIP
RPC Bind
RPC Mount
SNMP
Sun RPC
Syslog
Time
SOCIAL NETWORKING |
MEDIA
Facebook
Twitter
TELEPHONY
SMPP
MM1
H.225
H.225 RAS
H.245
H.248
H.323
TR-069
TESTING AND
MEASUREMENT
Chargen
Daytime
Discard
Echo
OWAMP Control
OWAMP Test
QOTD
TWAMP Control
TWAMP Test
VOICE / VIDEO
BICC
H.255.0
H.255 RAS
H.245
H.248
MMS MM1
Netix Streaming
RTCP
RTP
RTP Unidirectional Stream
RTCP
RTSP
SCCP
SIP
Skype
Skype UDP Helper
STUN
STUN v2
Ixia BreakingPoint Storm
Notes:
Ixia BreakingPoint Storm
www.ixiacom.com/breakingpoint
PN: 915-6711-01, Rev. A, September 2012. This material is for informational purposes only and subject to change without notice. It describes Ixias present plans to develop
and make available to its customers certain products, features, and capabilities. Ixia is only obligated to provide those deliverables specically included in a written agreement
between Ixia and the customer.
About BreakingPoint
BreakingPoint pioneered the rst and only solution to expose previously
impossible-to-detect stress fractures within cyber infrastructure
components before they are exploited to compromise customer
data, corporate assets, brand reputation and even national security.
BreakingPoint cybersecurity products are the standard by which the
worlds governments, enterprises and service providers optimize the
resiliency of their cyber infrastructures. For more information, visit www.
breakingpoint.com.
BreakingPoint Storm
BreakingPoint has pioneered Cyber Tomography with the introduction
of the BreakingPoint Storm, enabling users to see for the rst time the
virtual stress fractures lurking within their cyber infrastructure through
the simulation of crippling attacks, high-stress trafc load and millions of
users.
BreakingPoint Storm is a three-slot chassis that provides the equivalent
performance and simulation of racks and racks of servers, including:
40 Gigabits per second of blended stateful application trafc
30 million concurrent TCP sessions
1.5 million TCP sessions per second
600,000+ complete TCP sessions per second
80,000+ SSL sessions per second
150+ stateful applications
4,500+ live security strikes
BreakingPoint Resources
Hardening cyber infrastructure is not easy work, but nothing that is
this important has ever been easy. Enterprises, service providers,
government agencies and equipment vendors are under pressure
to establish a cyber infrastructure that can not only repel attack but
that is alsow resilient to application sprawl and maximum load.
BreakingPoints provides the technology and solutions that allow these
organizations to create a hardened and resilient cyber infrastructure.
BreakingPoint also provides the very latest industry resources to make
this process that much easier, including resiliency methodologies, how-
to guides, white papers, webcasts and a newsletter. To learn more, visit
www.breakingpoint.com/resources.
BreakingPoint Application and Threat Intelligence
Community
Join discussions on the latest developments in application and threat
intelligence. BreakingPoint Labs brings together a diverse community of
people leveraging the most current insight to harden cyber infrastructure
to withstand crippling attack and high-stress application load. Visit
www.breakingpointlabs.com.
Contact BreakingPoint
Learn more about BreakingPoint products
and services by contacting a representative
in your area.
1.866.352.6691 U.S. Toll Free
www.breakingpoint.com
BreakingPoint Global Headquarters
3900 North Capital of Texas Highway
Austin, TX 78746
email: salesinfo@breakingpoint.com
tel: 512.821.6000
toll free: 866.352.6691
BreakingPoint Government
Solutions Group
Washington, D.C.
email: government@breakingpoint.com
tel: 703.443.1301
BreakingPoint EMEA Sales Ofce
Paris, France
email: emea_sales@breakingpoint.com
tel: + 33 6 08 40 43 93
BreakingPoint APAC Sales Ofce
Suite 2901, Building #5, Wanda Plaza
No. 93 Jianguo Road
Chaoyang District, Beijing, 100022,
China
email: apac_sales@breakingpoint.com
tel: + 86 10 5960 3162

Das könnte Ihnen auch gefallen