SlideShare a Scribd company logo
1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
UPGRADING YOUR FIREWALL?
IT’S TIME FOR AN INLINE SECURITY
FABRIC
Ajay Pandey, MS(Boston), LL.B, CCIE #14792 (R&S/Sec), CISSP, CISA
Enterprise Solutions Architect - APAC
2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
106 / hour 66%Growth in information-based security
incidents from 2014 to 20152
25%Chance that your organization will be
breached over next 24 months3
$550kAverage cost of unplanned outage for
enterprises, growing 15% annually2
Average number of malware hits1
1 ZK Research Study for Ixia, April 2016
ATTACKS CONTINUE TO RISE
2 Kaspersky Lab, Cost of Security Breaches, September 2015
3 Ponemon Institute, Data Breach Study, May 2015
3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Server
Switch
Switch
Switch
 Single points of failure
 Administrative tension
 Tools not used efficiently
 Difficult to scale
INLINE SECURITY IS EXPANDING
4© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
• Increased risk of downtime
• Upgrade disruption
• Inefficient use of budget and limit on ROI
• Difficult to scale
• Incomplete security monitoring
DISADVANTAGES OF CURRENT PRACTICES
5© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
INCREASED RISK OF DOWNTIME
6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
ELIMINATE DOWNTIME FROM TOOL
FAILURES
Monitored Tool Links via Heartbeat Packets
7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
UPGRADE & MAINTENANCE DISRUPTIONS
8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
ELIMINATE UPGRADE / MAINTENANCE DISRUPTION
Monitored Tool Links via Heartbeat Packets
9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
INEFFICIENT CAPACITY UTILIZATION
10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
MAXIMIZE CAPACITY USAGE
Bypass Switch
Bypass Switch
Network Packet
Broker (NPB)
• Aggregate security tool
capacity
• Selectively route traffic
to security tools
Monitored Tool Links via Heartbeat Packets
11© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
Bypass Switches
Bypass Switches
DIFFICULT TO SCALE CAPACITY
12© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
SIMPLE CAPACITY SCALABILITY
Bypass Switch
Bypass Switch
Network Packet
Broker (NPB)
• Aggregate security tool
capacity
• Selectively route traffic
to security tools
• Load balance traffic
across security tools
13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Switch
Server
Switch
Server
Switch Switch
SINGLE POINT OF FAILURE
Bypass Switch
Bypass Switch
Network Packet
Broker (NPB)
14© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Inline
Security
Tool Farm
Switch
Server
Switch
Server
Switch Switch
Bypass Switch
Bypass Switch
High-Availability (HA)
Network Packet Brokers
HIGH AVAILABILITY IXIA SECURITY FABRICTM
15© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Inline
Security
Tool Farm
Switch
Server
Switch
Server
Switch Switch
Bypass switch
Bypass switch
Out-of-band
sandboxing
CONNECT OUT-OF-BAND SECURITY TOOLS
High-Availability (HA)
Network Packet Brokers
16© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
Reduce Network Downtime
• Failsafe inline security deployments
• HA configuration with no single points of failure
Increase Tool Efficiency
• Intelligent routing of traffic based on content
• Load balancing reduces congestion and extends tool life
Improve Inspection and Security Monitoring
• Increase monitored network segments
• Improve security resilience with HA configuration
SUMMARY
Benefits of Deploying Ixia Security Fabric
17© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
CYBER RANGE SCENARIO EXAMPLE
18© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
18
BREAKINGPOINT PERFORMANCE #S (BANDWIDTH PER
CHASSIS)
960Gbps
Apps Throughput
Applications
24Million
TCP CPS
Connection Rate
720
Capacity
Million
HTTP CC
12M
SSL Capacity
Concurrent
SSL Flows
2.4M
SSL CPS
SSL
Connection Rate
240
SSL Throughput
Gbps
SSL Throughput
Performance in two-arm mode,
With clients and servers simulated on same blade
19© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
20© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
THANK YOU

More Related Content

PDF
Cyber Security Governance
PPTX
Intelligence-based computer network defence: Understanding the cyber kill cha...
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Anatomy of the Compromised Insider
PDF
Addressing the cyber kill chain
PPTX
Rise of Ransomware
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
PDF
Pactera - Cloud, Application, Cyber Security Trend 2016
Cyber Security Governance
Intelligence-based computer network defence: Understanding the cyber kill cha...
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Anatomy of the Compromised Insider
Addressing the cyber kill chain
Rise of Ransomware
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Pactera - Cloud, Application, Cyber Security Trend 2016

What's hot (20)

PPTX
kill-chain-presentation-v3
PPTX
Cyber Security 101
PPTX
The Internal Signs of Compromise
PDF
Cyber Kill Chain Deck for General Audience
PPTX
Ivan dragas get ahead of cybercrime
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PPTX
Ransomware Has Evolved And So Should Your Company
PDF
Advanced threat security - Cyber Security For The Real World
PDF
The Anatomy of Comment Spam
PDF
What Happens Before the Kill Chain
PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PDF
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
PDF
Next Generation Security
PDF
Cisco Security Presentation
PPTX
Network Security Trends for 2016: Taking Security to the Next Level
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
eSentinel™ – 360° Cybersecurity Platform Simplified
PDF
Web Application Attack Report (Edition #1 - July 2011)
PPTX
Sourcefire Webinar - NEW GENERATION IPS
kill-chain-presentation-v3
Cyber Security 101
The Internal Signs of Compromise
Cyber Kill Chain Deck for General Audience
Ivan dragas get ahead of cybercrime
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Ransomware Has Evolved And So Should Your Company
Advanced threat security - Cyber Security For The Real World
The Anatomy of Comment Spam
What Happens Before the Kill Chain
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Next Generation Security
Cisco Security Presentation
Network Security Trends for 2016: Taking Security to the Next Level
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Combating Insider Threats – Protecting Your Agency from the Inside Out
eSentinel™ – 360° Cybersecurity Platform Simplified
Web Application Attack Report (Edition #1 - July 2011)
Sourcefire Webinar - NEW GENERATION IPS
Ad

Viewers also liked (20)

PPTX
Get the Basics Right
PPTX
Is Cyber Security the Elephant in the Boardroom?
PPTX
State of the Internet: Mirai, IOT and History of Botnets
PPTX
ABC of Infosec
PPT
Cyber Crime Management
PDF
Security Incident Response Readiness Survey
PDF
Cybersecurity: Mock Cyberwar Game
PPTX
Sumit dhar
PDF
Where Do We Go From Here / Qualisystems - IXIA in a joint presentation
PPTX
Summit x480
PPTX
IXIA IxChariot
PPTX
Summit x870
PPTX
Summit x670 g2
PPTX
Summit x620
PPTX
IXIA NVS Vision one
PPTX
Connected Car Platform (CC-p)
PPTX
Hawkeye proactive-monitoring-ru-new
PDF
Q3'16 investor-deck 20161111
PPTX
The ROI for Early Testing 120816 (Ixia)
PPTX
the age of cryptocurrency at Devoxx Morocco
Get the Basics Right
Is Cyber Security the Elephant in the Boardroom?
State of the Internet: Mirai, IOT and History of Botnets
ABC of Infosec
Cyber Crime Management
Security Incident Response Readiness Survey
Cybersecurity: Mock Cyberwar Game
Sumit dhar
Where Do We Go From Here / Qualisystems - IXIA in a joint presentation
Summit x480
IXIA IxChariot
Summit x870
Summit x670 g2
Summit x620
IXIA NVS Vision one
Connected Car Platform (CC-p)
Hawkeye proactive-monitoring-ru-new
Q3'16 investor-deck 20161111
The ROI for Early Testing 120816 (Ixia)
the age of cryptocurrency at Devoxx Morocco
Ad

Similar to Upgrading Your Firewall? Its Time for an Inline Security Fabric (20)

PPTX
Analytical Driven Security - Chip Copper
PPTX
Splunk for Enterprise Security Featuring UBA
PDF
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
PPTX
Security crawl walk run presentation mckay v1 2017
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PDF
Scalar Security Roadshow - Toronto Presentation
PPTX
Episode IV: A New Scope
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PPTX
Best Practices For Sharing Data Across The Enteprrise
PDF
What’s the State of Your Endpoint Security?
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
PDF
Splunk Webinar Best Practices für Incident Investigation
PDF
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
PPTX
Splunk for Enterprise Security Featuring User Behavior Analytics
PDF
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
PDF
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Securing Beyond the Cloud Generation
PPTX
Are you putting your organization at risk?
PPTX
How to Select a Security Visibility Solution
Analytical Driven Security - Chip Copper
Splunk for Enterprise Security Featuring UBA
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Security crawl walk run presentation mckay v1 2017
Webinar: Neues zur Splunk App for Enterprise Security
Scalar Security Roadshow - Toronto Presentation
Episode IV: A New Scope
Splunk for Enterprise Security featuring UBA Breakout Session
Best Practices For Sharing Data Across The Enteprrise
What’s the State of Your Endpoint Security?
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk Webinar Best Practices für Incident Investigation
QualysGuard InfoDay 2014 - QualysGuard Web Application Security a Web Applica...
Splunk for Enterprise Security Featuring User Behavior Analytics
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Tech Talk: Leverage the combined power of CA Unified Infrastructure Managemen...
Splunk Discovery Day Dubai 2017 - Security Keynote
Securing Beyond the Cloud Generation
Are you putting your organization at risk?
How to Select a Security Visibility Solution

More from Rahul Neel Mani (20)

PPTX
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
PPTX
TweetChat - A Grey Head Digital Initiative
PPTX
Cybersecurity: Glimpses from the 2017
PPTX
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
PPTX
CIO Productivity Conclave 2017
PPTX
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
PPTX
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
PDF
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
PDF
CIO Productivity Conclave 2016
PPT
Take Control of Your Imaging and Printing: Siva Kumar
PDF
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
PDF
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
PPTX
Mobile First Healthcare: Chris Kozup Aruba (HPE)
PPTX
IT to IoT: The Journey to Nextgen - By Rajesh Batra
PPTX
Enabling the Future of Healthcare Through Integration and Interoperability: V...
ODP
Can India Really Achieve the Stiff Target of Digital Healthcare?
PPTX
Becoming Future Ready: Building New Capabilities to Thrive
PPTX
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
PPTX
Preventing Social Engineering Attacks: The Critical Elements
PPTX
Threat Exposure Management - Reduce your Risk of a Breach
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
TweetChat - A Grey Head Digital Initiative
Cybersecurity: Glimpses from the 2017
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
CIO Productivity Conclave 2017
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
CIO Productivity Conclave 2016
Take Control of Your Imaging and Printing: Siva Kumar
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Mobile First Healthcare: Chris Kozup Aruba (HPE)
IT to IoT: The Journey to Nextgen - By Rajesh Batra
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Can India Really Achieve the Stiff Target of Digital Healthcare?
Becoming Future Ready: Building New Capabilities to Thrive
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Preventing Social Engineering Attacks: The Critical Elements
Threat Exposure Management - Reduce your Risk of a Breach

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf

Upgrading Your Firewall? Its Time for an Inline Security Fabric

  • 1. 1© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | UPGRADING YOUR FIREWALL? IT’S TIME FOR AN INLINE SECURITY FABRIC Ajay Pandey, MS(Boston), LL.B, CCIE #14792 (R&S/Sec), CISSP, CISA Enterprise Solutions Architect - APAC
  • 2. 2© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 106 / hour 66%Growth in information-based security incidents from 2014 to 20152 25%Chance that your organization will be breached over next 24 months3 $550kAverage cost of unplanned outage for enterprises, growing 15% annually2 Average number of malware hits1 1 ZK Research Study for Ixia, April 2016 ATTACKS CONTINUE TO RISE 2 Kaspersky Lab, Cost of Security Breaches, September 2015 3 Ponemon Institute, Data Breach Study, May 2015
  • 3. 3© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Server Switch Switch Switch  Single points of failure  Administrative tension  Tools not used efficiently  Difficult to scale INLINE SECURITY IS EXPANDING
  • 4. 4© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | • Increased risk of downtime • Upgrade disruption • Inefficient use of budget and limit on ROI • Difficult to scale • Incomplete security monitoring DISADVANTAGES OF CURRENT PRACTICES
  • 5. 5© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch INCREASED RISK OF DOWNTIME
  • 6. 6© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches ELIMINATE DOWNTIME FROM TOOL FAILURES Monitored Tool Links via Heartbeat Packets
  • 7. 7© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch UPGRADE & MAINTENANCE DISRUPTIONS
  • 8. 8© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches ELIMINATE UPGRADE / MAINTENANCE DISRUPTION Monitored Tool Links via Heartbeat Packets
  • 9. 9© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches INEFFICIENT CAPACITY UTILIZATION
  • 10. 10© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch MAXIMIZE CAPACITY USAGE Bypass Switch Bypass Switch Network Packet Broker (NPB) • Aggregate security tool capacity • Selectively route traffic to security tools Monitored Tool Links via Heartbeat Packets
  • 11. 11© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch Bypass Switches Bypass Switches DIFFICULT TO SCALE CAPACITY
  • 12. 12© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch SIMPLE CAPACITY SCALABILITY Bypass Switch Bypass Switch Network Packet Broker (NPB) • Aggregate security tool capacity • Selectively route traffic to security tools • Load balance traffic across security tools
  • 13. 13© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Switch Server Switch Server Switch Switch SINGLE POINT OF FAILURE Bypass Switch Bypass Switch Network Packet Broker (NPB)
  • 14. 14© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Inline Security Tool Farm Switch Server Switch Server Switch Switch Bypass Switch Bypass Switch High-Availability (HA) Network Packet Brokers HIGH AVAILABILITY IXIA SECURITY FABRICTM
  • 15. 15© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Inline Security Tool Farm Switch Server Switch Server Switch Switch Bypass switch Bypass switch Out-of-band sandboxing CONNECT OUT-OF-BAND SECURITY TOOLS High-Availability (HA) Network Packet Brokers
  • 16. 16© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | Reduce Network Downtime • Failsafe inline security deployments • HA configuration with no single points of failure Increase Tool Efficiency • Intelligent routing of traffic based on content • Load balancing reduces congestion and extends tool life Improve Inspection and Security Monitoring • Increase monitored network segments • Improve security resilience with HA configuration SUMMARY Benefits of Deploying Ixia Security Fabric
  • 17. 17© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | CYBER RANGE SCENARIO EXAMPLE
  • 18. 18© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | 18 BREAKINGPOINT PERFORMANCE #S (BANDWIDTH PER CHASSIS) 960Gbps Apps Throughput Applications 24Million TCP CPS Connection Rate 720 Capacity Million HTTP CC 12M SSL Capacity Concurrent SSL Flows 2.4M SSL CPS SSL Connection Rate 240 SSL Throughput Gbps SSL Throughput Performance in two-arm mode, With clients and servers simulated on same blade
  • 19. 19© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
  • 20. 20© 2016 IXIA AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. | THANK YOU