Presentation is loading. Please wait.

Presentation is loading. Please wait.

Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010.

Similar presentations


Presentation on theme: "Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010."— Presentation transcript:

1 Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010

2 Who is BreakingPoint Systems ? Founded September 2005 285% Revenue growth, 2009 vs. 2008 12 Quarters of Consecutive Growth Breakthrough, award-winning products Privately held and based in Austin, TX Sales & Support: US, Canada, UK, France, Italy, Spain, Netherlands, Belgium, Israel, Switzerland, Finland, Sweden, Germany, Norway, India Japan, China, Korea, Taiwan, Malaysia, New Zealand, Australia, …

3 What can BreakingPoint Systems Offer ? BreakingPoint provides New Generation of High Performance Test Equipment at All Inclusive L2, L3, L4, L7, Security and Fuzzing from the same test port at the time using the same Management Software and same Hardware. 3 No License Model – All Features Available by Default

4 Realistic Traffic Emulation Layer 2-7 IPv4 and IPv6 What type of tests does BreakingPoint provide ? 4 Layer 4-7 Bit Blaster - Generates Ethernet frames (L2 Tests) Routing Robot - Generates IP packets (L3 Tests) Session Sender - Generates TCP and UDP (L4 Tests) AppSim – 140+ Client and Server Application Protocols (L7 Tests) L2 and L4 Recreate – Raw Playback, TCP and UDP PCAP Security Module – 4,500+ unique attacks, 80+ evasion types Stack Scrambler – Protocol Fuzzing on AppSim Module Protocols ClientSim – Interaction with Real Server (L7 Tests) Malicious Traffic Simulation Layer 2-7 IPv4 and IPv6 No License Model – All Features Available by Default

5 BreakingPoint Systems Key Benefits New Generation of Hardware Architecture optimized for Layer 2-7: –FPGA and Network Processor High-Performance Traffic Simulation Layer 2-7 per 4U Chassis: –Up to 80 Gbps L2/L3 Traffic Simulation –Up to 40 Gbps L4/L7 Traffic Simulation –Up to 1.5 Million New L7 Sessions per Second –Up to 30 Million Concurrent L7 Sessions Flexible and Easy to Use Interface –Web GUI to control L2, L3, L4, L7 Traffic, Security and Fuzzing –Device Under Test Monitoring (SSH, Telnet, SNMP, Serial) –Possibility to mix in the same test on a single test port in same test L2/L3 Stateless and L4/L7 Stateful traffic Good Stateless/Stateful and Malicious traffic 5

6 User Friendly Web Interface 6

7 Resiliency Score 7

8 BreakingPoint Storm CTM (Cyber Tomography Machine) BreakingPoint Storm CTM™ 130+ applications 4,500+ live security attacks 80+ evasions 40 Gbps blended application traffic 30M concurrent TCP sessions 1.5M TCP sessions/second

9 Keep Up-To-Date Application and Threat Intelligence Frequent and automatic applications and attack updates Published methodologies Service, support, and comprehensive maintenance

10 BreakingPoint Resiliency Score Resiliency Score StabilityPerformanceSecurity Simple method to evaluate network device resiliency under real-world conditions –Performance Frame rate Concurrent sessions New session rate –Security Susceptibility to direct attack Optional strike blocking abilities –Stability Resistance to fault injection Fixed standard to evaluate multiple devices Repeatable measurements 10

11 Scoring the Target Device or Network 11

12 Layer 3 Test Routing Robot Module 12

13 Layer 3 Network Performance Validation Routing Robot determines if a DUT can handle high volumes of Layer 3 traffic by sending traffic from one interface and monitoring the receiving interface to see if the traffic is successfully received. Routing Robot can simulate Frame Size from 64 to 9216 Bytes 13

14 BreakingPoint Routing Robot – Layer 3 Testing 14

15 BreakingPoint Routing Robot – Layer 3 Testing 15

16 RFC 2544 GUI 16

17 Simple RFC2544 GUI 17

18 Real-Time Stats 18

19 Real-Time Stats 19

20 RFC 2544 Test Result Summary 20

21 Latency Measurement in Microseconds 21

22 Traffic Overview 22

23 Layer 4 Test Session Sender Module 23

24 Layer 4 Network Performance Validation The Session Sender test component measures the device’s ability to handle a large number of new TCP session per second, concurrent TCP sessions and TCP Bandwidth. Session Sender can simulate Segment Size until 9146 Bytes 24

25 BreakingPoint Session Sender – Layer 4 Testing 25

26 26 BreakingPoint Session Sender – Layer 4 Testing

27 27 BreakingPoint Session Sender – Layer 4 Testing

28 28 BreakingPoint Session Sender – Layer 4 Testing

29 Layer 2 Replay Raw Replay Recreate Module 29

30 Recreate Captured Traffic The BreakingPoint Recreate feature replay PCAP exactly as it is based on raw data L2,L3,L4 and L7 information from the original PCAP. BreakingPoint will do Raw Playback. Layer 2 PCAP Replay give the ability to replicate customer issue on Mobile Protocols decoding. 30

31 L2 Recreate Mobile Protocol GTP 31

32 L2 Recreate Mobile Protocol IuUP 32

33 Layer 4 Replay Mix TCP & UDP Recreate Module 33

34 Recreate Captured Traffic The BreakingPoint Recreate feature recreates multi-flow TCP/UDP traffic based on data from PCAP. BreakingPoint does not use a raw playback, instead it will do stateful multi- flow allowing possibility to replay stateful TCP & UDP traffic with ability to amplify at High Performance. 34

35 BreakingPoint Recreate: Capture File Setting 35

36 BreakingPoint Recreate: Layer 4 Replay TCP/UDP 36

37 BreakingPoint Recreate: Amplify Replay 37

38 BreakingPoint Recreate: Layer 4 Replay TCP/UDP 38

39 Layer 7 Test Application Simulator Module Real Protocols High Performance NOT Replay of PCAP 39

40 Layer 7 Application Performance Validation Application Simulator allows you to define 120+ applications protocols to make complex application protocol distributions to simulate real world traffic. Application Simulator allows you to define in depth each protocol using advanced protocol configuration “SuperFlows”. 40

41 Partial List of 140 Applications Chat AIM6 Keyserver AIM6 Rendezvous AIM6 Switchboard AOL Instant Messenger IRC Jabber MSN Dispatch MSN Nexus MSN Notification MSN Passport MSN Switchboard OSCAR OSCAR File Transfer QQ IM Windows Live Messenger Yahoo! Messenger ICQ Authentication DIAMETER RADIUS Accounting RADIUS Access Databases IBM DB2 Informix Microsoft SQL MySQL Oracle PostgreSQL Sybase TDS TNS Data Transfer FTP Gopher HTTP NNTP RSync TFTP Data Transfer / File Sharing IPP NetBIOS NETBIOS DGM NETBIOS NS NETBIOS SSN NFS RPC NFS SMB SMB/CIFS SMBv2 Email IMAP IMAPv4 Advanced Outlook Web Access POP3 POP3 Advanced SMTP Financial FIX FIXT Games World of Warcraft Enterprise Applications DCE/RPC Endpoint Mapper DCE/RPC Exchange Directory DCE/RPC MAPI Exchange SAP Distributed Computing Citrix DCE/RPC VMware VMotion Custom Toolkits Applications Raw Security Attacks Email AOL Web Mail Gmail GMX Webmail GMX Webmail Attachment Hotmail Hotmail Attachment Orange Webmail Yahoo! Mail Yahoo! Mail Attachment

42 Partial List of 140 Applications Remote Access RDP RFB RLogin Telnet Secure Data Transfer HTTPS SSH Voice/Media H.225.0 H.225 RAS H.245 MMS MM1 RTCP RTP RTP Unidirectional Stream RTSP SIP Skype Skype UDP Helper STUN Telephony SMPP MM1 H.323 System/Network Admin DNS DNS (Deprecated) IDENT Finger LDAP NTP RPC Bind RPC Mount SNMP SNMPv1 Sun RPC Syslog Time Testing and Measurement Chargen Daytime Discard Echo OWAMP Control OWAMP Test QOTD TWAMP Control TWAMP Test Social Networking Twitter MySpace Peer-to-Peer AppleJuice BitTorrent Peer BitTorrent Tracker BitTorrent eDonkey Gnutella Leaf Gnutella Ultrapeer PPLive QQLive Winny

43 Enterprise Mix Protocols 43

44 Service Provider Mix Protocols 44

45 Education Mix Protocols 45

46 Create your own Mix of L7 Protocols 46

47 High Level Real-Time Stats L2, L3, L4 and L7 47

48 Detail Real-Time Stats per L7 Protocols 48

49 Protocol API Custom Application Toolkit Create your Own Protocol 49

50 What Is BreakingPoint Custom Application Toolkit? Protocol API to Create New Protocol XML-Based Description Language Ruby API for more advanced programming techniques Fully integrated with BreakingPoint Hardware BPS Storm CTM to simulate the New Protocol at High Performance with others native L7 Protocols. 50

51 Importing Into BreakingPoint Storm CTM 51 1. Create a SuperFlow 2. Add “Custom Application” 3. Add “Process Dblock XML”

52 P2P - LimeWire 52

53 Youtube 53

54 Layer 7 Test Client Simulator Module Interaction with Real Server 54

55 Real Web Infrastructure 55

56 BreakingPoint Test Infrastructure 56

57 34 Client Simulator Protocols Supported 1. Chargen 2. Daytime 3. DB2 Connectivity 4. Discard 5. DNS 6. Echo 7. eDonkey 8. Finger 9. Gopher 10.HTTP 11.Ident 12.IMAP 13.IPP 14.IRC 15.MMS-MM1 57 16.Microsoft SQL 17.MySQL 18.NetBIOS Session 19.NTP Synchronization 20.POP3 21.QOTD 22.Radius Access 23.Radius Accounting 24.Rlogin 25.SMBv1 26.SMBv2 27.SMTP 28.SNMPv1 29.STUN 30.SunRPC Bind 31.Syslog 32.Telnet 33.TFTP 34.Time 35.SIP

58 Regular Expression to Extract, Insert and Modify 58

59 SMB Statistics 59

60 Security Test Security Module Real Attack NO Replay of Attack PCAP 60

61 Network Security Performance Validation BreakingPoint Security component can be used to test network security devices – such as IPS, IDS and firewalls. It measures a device’s ability to protect a host by sending 4,500+ Attacks under CVE-ID, BugTraqID, OSVDB and verifying that the device successfully blocks the attacks. 61

62 62 BreakingPoint Security Test Component

63 63 BreakingPoint Security Test Component

64 Security Test Report: High Level 64

65 Security Test Report: Details 65

66 Protocol Fuzzing Test Stack Scrambler Module 66

67 Protocol Fuzzing Stack Scrambler tests the integrity of different protocol stacks by sending malformed packets to the device under test. It uses a fuzzing technique, which modifies a part of the packet (checksum, protocol options, etc.) to generate the corrupt data. Fuzzing could be done on AppSim Protocols. 67

68 Packet Capture Exporting Export Compressed Packet Captures Ability to select only a specific range of packets Post Processing of Packet Captures use Berkley Packet Filtering

69 Traffic Impairment 69

70 Impairment per Subnet 70

71 Possibility of Impairment 71

72 Device Under Test (DUT) Real-Time Monitoring 72

73 Real-Time Device Under Test Monitoring BreakingPoint offers the ability to connect to a DUT via Telnet, SNMP, SSH, or Serial to monitor the status of a DUT offering the ability to check CPU, Memory, New TCP connections per Second, Concurrent TCP Connections, Bandwidth and Packet per Second. Eliminates manual power-cycle reboots. 73

74 Device Under Test Monitoring 74

75 Device Under Test Monitoring 75

76 Device Under Test Monitoring 76

77 Test Scenario 77

78 Mixing Layer 2-3 and Layer 4-7 Traffic BreakingPoint is the only solution able to send Layer 2-3 and Layer 4-7 traffic from a single test solution with single user interface on same test port. 78

79 Mixing L2/L3 and L4/L7 Traffic 79

80 Mixing L3/L7 IPv4 and L3/L7 IPv6 Traffic BreakingPoint is the only solution able to send L3/L7 IPv4 and L3/L7 IPv6 traffic from a single test solution with single user interface on same test port. 80

81 Mixing L3/L7 IPv4 and L3/L7 IPv6 Traffic 81

82 Mixing Good and Malicious Traffic BreakingPoint properly tests high-performance security devices with the capability to mix good traffic and malicious traffic emulating real world test scenarios. 82

83 BreakingPoint: Mixing Good and Malicious Traffic 83

84 Mixing Legitimate Traffic and Fuzzing Traffic BreakingPoint properly tests high-performance devices with the capability to mix good traffic and fuzzing traffic at the same time from the same test port and monitor the impact on the DUT over SSH, TELNET, SNMP or Serial. 84

85 Mixing Legitimate Traffic and Fuzzing Traffic 85

86 Automation using Drag and Drop GUI 86

87 GUI Automation: Run Multiple Layer 2-7 Tests 87

88 Global Reporting of Layer 2-7 Test Series 88

89 BreakingPoint Systems Hardware Platform 89

90 BPS Storm CTM Chassis – 8x 1 GigE Ports Hardware Information –1x Blades of 8x 1 GigE Ports SFP –1x Controller with Management Port and DUT Monitoring Port 90

91 BPS Storm CTM Chassis – 16x 1 GigE Ports Hardware Information –2x Blades of 8x 1 GigE Ports SFP –1x Controller with Management Port and DUT Monitoring Port 91

92 BPS Storm CTM Chassis – 4x 10 GigE Ports Hardware Information –1x Blades of 4x 10 GigE Ports XFP –1x Controller with Management Port and DUT Monitoring Port 92

93 BPS Storm CTM Chassis – 8x 10 GigE Ports Hardware Information –2x Blades of 4x 10 GigE Ports XFP –1x Controller with Management Port and DUT Monitoring Port 93

94 BPS Storm CTM Chassis – Mix Gigabit / 10 Gigabit Ports Hardware Information –1x Blade of 8x Gigabit Ports SFP –1x Blade of 4x 10 Gigabit Ports XFP –1x Controller with Management Port and DUT Monitoring Port 94

95 BPS Storm CTM Hardware Platform Test Possibility 8x Gigabit Blade4x 10 Gigabit Blade Number of Interface8x 1 Gigabit4x 10 Gigabit Type of Interface8x SFP4x XFP L2 TestYes L3 TestYes L4 TestYes L7 TestYes Number of Protocols120+ Protocols Security TestYes, 4,500+ Attacks Protocol Fuzzing TestYes Recreate L2 PCAPYes Recreate L4 PCAP TCP/UDPYes PCAP Capture Buffer8 GB / 1 GB per Port8 GB / 2 GB per Port 95

96 BPS Storm CTM Hardware Platform Performance 1x Blade 8x Gigabit1x Blade 4x 10 Gigabit L2/L3 Packet/Sec12 Millions60 Millions L2/L3 Bandwidth8 Gbps (64 Bytes)40 Gbps (64 Bytes) L4/L7 TCP/SEC500,000750.000 L4/L7 TCP OPEN10 Millions15 Millions L4/L7 Bandwidth8 Gbps20 Gbps 96 2x Blade 16x Gigabit2x Blades 8x 10 Gigabit L2/L3 Packet/Sec24 Millions120 Millions L2/L3 Bandwidth16 Gbps (64 Bytes)80 Gbps (64 Bytes) L4/L7 TCP/SEC1 Million1.5 Millions L4/L7 TCP OPEN20 Millions30 Millions L4/L7 Bandwidth16 Gbps40 Gbps

97 What kind of Network Equipment Validation ? BreakingPoint testing tools are used to validate the following network equipments: 97 UTM IDS/IPS QoS Deep Packet Inspection Firewall Web Application Firewall Load Balancer WAN Accelerator Network Probe Lawful Interception SSL Accelerator Traffic Shaper SMTP Relay Anti-SPAM Proxy/Cache URL Filter Content Filter Anti-Virus /Anti-Malware …and more

98 BreakingPoint Application and Threat Intelligence Program 98

99 BreakingPoint Maintenance The BreakingPoint Application and Threat Intelligence (ATI) Program is an all-inclusive service that provides you with everything you need to maintain the BreakingPoint Storm CTM with new applications, security attacks, features, performance enhancements, service and support. With ATI, you will know that your devices, networks, and data centers are resilient against late-breaking attacks encountered in the wild, as well as emerging application protocols. You will also receive frequent performance enhancements and new features to streamline all of your resiliency measurement initiatives.

100 The BreakingPoint ATI Program features Access to BreakingPoint's more than 130 application protocols with new applications provided frequently Current security coverage with 4,500+ security strikes, 80+ evasion techniques and frequent updates Surveillance and updates from our research team to keep your staff focused on resiliency, not research Instant access to monthly product updates, new automation features, and management capabilities Easy access to our problem resolution team, product fixes, and online support Fast resolution of issues through full service and support

101 Software Updates like Anti-Virus Update “One Click” 101

102 Frequency New Major Release 2009 102

103 Frequency New StrikePack 2009 103

104 Frequency New L7 Protocols 2009 104

105 Frequency New Attacks 2009 105

106 Summary of BreakingPoint Systems Testing Products 106

107 Summary of Test Possibilities 107

108 Join the community ! 108 http://www.breakingpointsystems.com/community/

109 Thank You www.breakingpointsystems.com 109


Download ppt "Testing With Your Customer In Mind to Accelerate Product Innovation and Adoption Product Presentation – July 2010."

Similar presentations


Ads by Google