Sunday, July 19, 2009

Breaking Point System

==================================================================

Feature:

# Generates blended Layer 4-7 traffic at up to 20 Gigabits per second per blade without performance degradation.
# Generates 40 Gigabits per second and faster of Layer 2-3 traffic per blade. Q1: multicast

# 75+ application protocols are available, including HTTP, SMTP, AOL® IM, FIX, IBM DB2, VMware® VMotion™, Microsoft® CIFS/SMB, MAPI, Oracle, Encrypted BitTorrent™, eDonkey, RADIUS, SIP, Windows Live Messenger, World of Warcraft®, Yahoo!® Messenger and many others.

=================================================================
Performance

* 15 million concurrent TCP sessions Q2: per blade? one pair port
* 1.5 million TCP sessions per second Q3: concureent? 15M stream?
* 40 Gigabits per second of Layer 4-7 traffic in a 3-slot chassis
* 80 Gigabits per second Layer 2-3 traffic in a 3-slot chassis
* Scales easily with multiple BreakingPoint Elite's to generate an unlimited amount of Layer 2-7 traffic while retaining a single interface, test configuration and reporting

===============================================================
Application

# More than 75 application protocols are available including HTTP, SMTP, AOL® IM, FIX, IBM DB2, VMware® VMotionTM, Microsoft® CIFS/SMB, MAPI, Oracle, Encrypted BitTorrent™, eDonkey, RADIUS, SIP, Windows Live Messenger, World of Warcraft®, Yahoo!® Messenger, and many others.
# New application protocols and security strikes released each week and

==============================================================
Security

Proper network equipment testing must include realistic enterprise network traffic including live security strikes. BreakingPoint products allow you to modify and create difficult-to-detect network security attacks to expose vulnerabilities.

* 4,000+ security strikes and 80+ evasion techniques
* Most comprehensive Microsoft® Tuesday coverage
* SYN Flood attacks with up to 1,000,000 false and valid connections
* Target external servers with security attacks
* Application layer fuzzing for Zero-day detection

No comments: