Application and Threat Intelligence Processor


General Specifications


  • 48 ports of 10GbE/1GbE SFP+
  • All ports are bidirectional and fully non-blocking
  • Full line-rate across all ports with filtering enabled
  • Extensive packet filtering capability
  • Supported encryption ciphers
    • 3DES
    • RC4
    • AES
    • SHA1/521/384/256/224
    • MD5
    • RSA and Diffie-Helman Key Exchange


  • SNMP v1, v2, v3 support
  • Local, RADIUS, and TACACS+ support (members and groups)
  • Granular access control features
  • Event monitoring and logging
  • Syslog
  • IT Automation control with web-based API

Physical Specifications

ATI Processor Size and Weight

  • 1U high interface card for 19” chassis
  • Dimensions: 17.5W x 15L x 1.75H (inches)
  • Weight: 17.0lb (7.7 kg)

1 RU ATI Processor Size and Weight

  • 1U high 19” rack mounted interface card
  • Dimensions: 17.5W x 28.5L x 1.75H (inches)
  • Weight (chassis + ATI Proc.): 33.7lb (7.7 kg)

Power for Vision ONE

  • Operating input voltage: 40 to 60VDC
  • Nom. Current: 12.5A @ 53VDC
  • Max. operating input current: 19.25A @ 40VDC

Power for NTO 7300 Option (DC)

  • Operating input voltage: -40 to -60VDC
  • Nominal current: 4.15A @ -53VDC, 220W
  • Maximum operating input current: 5.5A @ 40VDC, 220W max
  • Heat/power dissipation for module at 100% traffic load: maximum 220W / 751 BTU/hour


Operating Specifications


  • Temperature
    • Operating: 5°C to 40°C
    • Short-term*: -5°C to 55°C (*not to exceed 96 consecutive hours)
    • Short-term* with fan failure: -5°C to 40°C (*not to exceed 96 consecutive hours)
  • Humidity
    • Operating: 5% to 85%, (non-condensing)
    • Short-term*: 5% to 90% (non-condensing, *not to exceed 96 hours)
Key Features
  • Offers a built-in deep packet inspection (DPI) engine for application classification, including custom applications and geographies
  • Enables high-speed processing of encrypted traffic with hardware-assisted security socket layer (SSL) decryption
  • Adds a growing set of IxFlow™ extensions to standard Netflow, including geolocation, cryptographic information, handset type, and OS and browser type
  • Enables users to easily target traffic by application, handset type, application type, and geography
  • Ensures quick troubleshooting and understanding of network activity with built-in real-time web dashboard
  • Allows sensitive data to be isolated and partially overwritten before forwarding on to recording tools using UI-based data masking

Intelligent Visibility for Enhanced Network Security and Troubleshooting


It is up to network administrators to secure, monitor, and troubleshoot their networks. But properly protecting a network requires application-level visibility into network traffic—a critical enabler many network infrastructures are lacking.

Applications running over HTTP, cloud computing, encrypted tunnels, and high traffic are all factors that can obscure complete network visibility. To gain actionable insight into enterprise networks, administrators need a solution that will move them beyond the packet level to achieve maximum visibility into network performance and bandwidth.

Ixia Application and Threat Intelligence Processor


Ixia’s Application and Threat Intelligence Processor (ATIP) delivers actionable application-level insight into a wide array of network activities. By providing rich data on application behavior and the location of users, ATIP easily identifies unknown network applications, mitigates security threats, and identifies trends in application usage.

Network administrators simply specify what traffic to find and how it should be presented. ATIP takes care of the heavy lifting—deciphering, filtering, decrypting, forwarding, and applying advanced processing to any application on the network. Better still: the solution’s cryptographic hardware quickly decrypts application traffic with zero impact on throughput or performance.