AppStack

Specifications

General Specifications

Performance

  • 48 ports of 10GbE/1GbE SFP+
  • All ports are bidirectional and fully non-blocking
  • Full line-rate across all ports with filtering enabled
  • Extensive packet filtering capability
  • Supported encryption ciphers
    • 3DES
    • RC4
    • AES
    • SHA1/521/384/256/224
    • MD5
    • RSA and Diffie-Helman Key Exchange

Management

  • SNMP v1, v2, v3 support
  • Local, RADIUS, and TACACS+ support (members and groups)
  • Granular access control features
  • Event monitoring and logging
  • Syslog
  • IT Automation control with web-based API

Physical Specifications

ATI Processor Size and Weight

  • 1U high interface card for 19” chassis
  • Dimensions: 17.5W x 15L x 1.75H (inches)
  • Weight: 17.0lb (7.7 kg)

1 RU ATI Processor Size and Weight

  • 1U high 19” rack mounted interface card
  • Dimensions: 17.5W x 28.5L x 1.75H (inches)
  • Weight (chassis + ATI Proc.): 33.7lb (7.7 kg)

Power for Vision ONE

  • Operating input voltage: 40 to 60VDC
  • Nom. Current: 12.5A @ 53VDC
  • Max. operating input current: 19.25A @ 40VDC

Power for NTO 7300 Option (DC)

  • Operating input voltage: -40 to -60VDC
  • Nominal current: 4.15A @ -53VDC, 220W
  • Maximum operating input current: 5.5A @ 40VDC, 220W max
  • Heat/power dissipation for module at 100% traffic load: maximum 220W / 751 BTU/hour

 

Operating Specifications

Environmental

  • Temperature
    • Operating: 5°C to 40°C
    • Short-term*: -5°C to 55°C (*not to exceed 96 consecutive hours)
    • Short-term* with fan failure: -5°C to 40°C (*not to exceed 96 consecutive hours)
  • Humidity
    • Operating: 5% to 85%, (non-condensing)
    • Short-term*: 5% to 90% (non-condensing, *not to exceed 96 hours)

Ixia offers an extensive set of visibility intelligence feature stacks so you can get the most out of your visibility and security platform – our capabilities allow filtering based on L2 through L7. Moreover, we provide industry-specific, specialized capabilities. Each stack of features is executed with a purpose-built design to ensure you get the best performance whether in a physical data-center or a private, hybrid or public cloud.

See how we stack up!

AppStack Features

  • Application Filtering
  • Geolocation & Tagging
  • Optional RegEx
  • Netflow & Ixflow
  • Data Masking Plus
  • Packet Capture
  • Application Filtering

    App Filtering Icon Application Filtering

    Easily exclude YouTube and Netflix traffic from security inspection - reducing bandwidth to your tools. Ixia's AppStack detects applications through signatures: static, dynamic or even customized with a patent pending technology. With Ixia doing the heavy lifting of figuring out application signature and maintaining a database, you or your team don’t have to become RegEx experts or track changing applications.

    Ixia regularly updates its application database, tracking leading and new applications, as well as developing signatures for unknown applications. 

    • Application identification and filtering based on signature, browser, OS, IP address, and geolocation and forwarding to the right security tools
    • Quickly separate traffic flow by application type – video, email, web or other –device, OS, browser, carrier, BGP AS#
    • Ability to detect unknown applications and add mainstream applications by request
    • Monitor and report top applications’  and countries’ bandwidth consumption
    • No RegEx needed!

    Resources:

    1. Context - Aware Data Processing
    2. WhitePaper: Supercharge your Monitoring Tools
  • Geolocation & Tagging

    Geolocation and Tagging Geolocation & Tagging

    Separate traffic by location – Pre-defined parameters and signature detection allows for application filtering based on geography so tools can zoom in for close-range visibility. Quickly troubleshoot application issues for a specific remote site by pinpointing  a location and application (like VoIP problems from your UK office). If you want to block traffic from specific locations, check out ThreatARMOR. It uses the same information feed and geolocation database as Ixia's ATI Research Center to let you block all traffic to and from untrusted countries, dramatically reducing your attack surface. 

    • Forward application session traffic based on region, country,  city, and in many cases latitude/longitude to the correct tools in your portfolio
    • Quickly configure filters, no manual scripting needed
    • Support custom locations, such as private IP addresses
  • Optional RegEx Filtering

    RegEx Filtering RegEx Filtering

    Though we make life easy for users by detecting application types, geographies and more to simplify for our users, we understand that sometimes customization is needed for corporate specific needs. Though not required, RegEx can be used for additional control and customization. More importantly, it can be used in conjunction with all the other smart filters to offer both ease of use and preciseness of criteria.

    • Layer RegEx over the truly intelligent application filtering, geolocation & tagging features.
    • Predefined matches for Taxpayer ID, phone numbers, and common credit cards
    • Isolate emails from potentially compromised accounts
  • NetFlow & IxFlow

    NetFlow NetFlow

    Let Ixia generate the NetFlow without burdening routers and other network devices.

    • Simultaneous NetFlow generation, SSL decryption and Application forwarding
    • Rich NetFlow stats including drop counts when the CPU reaches its peak.
    • High performing mode – can produce NetFlow records for over 300K TCP sessions/second
    • Supports generation of NetFlow v9  and v10/IPFIX data
    • Supports up to 10 NetFlow collectors
    • Device emulation for router offload, while reporting original device’s ODID and Interface ID

    IxFlow IxFlow

    Ixia allows you to enrich NetFlow records with value-add extensions. You can determine what additional information to send to your tools.

    • Include geographical information such as region IP, latitude and city name. Application ID or name, device, browser and even SSL cipher as part of extra information send to tools.
    • Subscriber-aware reporting provides detail on application and handset (device) type for mobile users
    • HTTP URL and hostname for web activity tracking
    • HTTP and DNS metadata for rapid breach detection
    • Transaction Latency for application performance tracking
  • Data Masking Plus

    Data masking plus Data Masking Plus

    Achieve Payment Card Industry Data Security Standard (PCI-DSS), HIPAA and other regulatory compliance by leveraging pre-defined data patterns. With personally identifiable information traversing the network, security is key to keeping your consumers and your organization safe.

    • Pre-defined patterns to mask – including major credit card, SSN and email addresses
    • Reduce false positives with the built-in credit card number validation using the Luhn algorithm

    Leverage in addition to standard data masking at the packet level using a user configurable offset with any number of bytes.

    Resources:

    1. Blog Post: Data Masking with Ixia's ATI Processor
  • Packet Capture

    PCAP Packet Capture (PCAP)

    Troubleshooting VoIP connections from your office in Germany? Have a repeat issue you need to get to the bottom of? Quickly capture those connection and analyze. With the Packet Capture capability, it is quick and easy to setup a filter and get any slice of traffic you need – from a specific country, application, browser, device, and more – right your fingertips.

     
    • Quickly verify filter configuration by capturing and validating data
    • Capture up to 10 samples with 100MB sampling window each
    • Easily download to a laptop/workstation for analysis
    • Packet capture capability at 30GE line rate

    Resources:

    1. Blog Post: PCAP in a Snap

Raise your visibility IQ

Stack on:

True intelligence. Application filtering that that does NOT require any RegEx! Ixia ties capabilities back to a threat intelligence powerhouse that ensures up to date information on applications, geographies and more. We leverage a patented technology to create and update application signatures; we allow you to pinpoint where in the world traffic is coming and going from and even capture data for traffic analysis. Beyond that, forward NetFlow traffic with the option to add custom metadata.

 

Since we added true intelligence, we added a real-time dashboard so you can get actionable insights to mitigate threats and identify trends. View your network application traffic distribution: top counties, top filters, top service providers, top browsers, top device OS types. Graphs and charts show application traffic sources and breakdowns – allowing you to easily see and manage

Real Time Dashboard