SlideShare a Scribd company logo
BreakingPoint LTE At-A-Glance




Test LTE/4G Network Performance, Security, and
Stability at Massive Scale
BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE
Network Infrastructure


Telecom carriers rolling out Long Term Evolution (LTE) and 4G              With a BreakingPoint CTM, you can:
networks must test mobile infrastructures efficiently and accurately
                                                                              • Measure and harden the performance, security, and stability
under punishing real-world conditions, without spending a fortune
                                                                                of load balancers, firewalls, IPS devices, and other equipment
to do so. BreakingPoint CTM products answer this challenge with
                                                                                with up to 120 gigabits per second of application, attack, and
the industry’s most sophisticated and cost-effective Internet-scale
                                                                                malformed traffic.
LTE emulation.
                                                                              • Validate network and data center performance by re-creating
These products allow carriers to test their networks and the devices            more than 150 application protocols, including Twitter Mobile,
within them against the behavior of millions of simulated users                 AOLÂŽ IM, Yahoo!ÂŽ Mail and Messenger, GoogleÂŽ Gmail, SkypeÂŽ,
downloading rich media content, placing calls, purchasing music,                BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL,
browsing the Web, or unknowingly sharing the latest malware. A                  FacebookÂŽ, YouTubeÂŽ, and AppleÂŽ FaceTimeÂŽ, as well as other
BreakingPoint CTM replaces racks of equipment and complicated                   mobile, social, and gaming protocols—with Multicast support.
setup processes with a single-chassis device and a single user                • Stress network infrastructures with more than 4,500 security
interface (shown below).                                                        attacks and 28,000 pieces of malware—including more
                                                                                than 100 pieces of mobile malware—plus obfuscations and
Unprecedented Performance and Massive Scale in a Cost-
                                                                                evasions.
Effective Device
                                                                              • Find network problem areas sooner and prepare for the
Based on a patented breakthrough in network processor
                                                                                unexpected with the industry’s fastest protocol fuzzing
technology and backed by a team of network performance and
                                                                                capabilities.
security experts, only a BreakingPoint CTM produces the city-scale
LTE network conditions needed to harden carrier-grade network                 • Emulate sophisticated, large-scale DDoS and mobile-initiated
resiliency.                                                                     botnet attacks to uncover previously hidden weaknesses.




          BreakingPoint CTM™ Products Enable Configuration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
BreakingPoint LTE At-A-Glance


  The Solution for Simulating Multi-Million-User LTE Networks,
  with Additional 3G Capability
  The unique architecture of BreakingPoint CTM products delivers the
  huge performance numbers necessary to validate and harden even
  the largest LTE networks under the most realistic conditions, all from
  a turnkey solution, including:

     • Up to 90 million concurrent TCP sessions, allowing emulation
         of thousands of eNodeBs connecting to millions of devices
         such as smartphones, tablet computers, and netbooks.
     • Interactions among all the network elements involved in LTE
         communications, including user equipment (UE), eNodeBs,                               BreakingPoint FireStorm CTM Specifications
         Service Gateways (SGWs), Packet Data Network Gateways                                 A single BreakingPoint FireStorm CTM provides the equivalent
         (PGWs), and Mobility Management Entities (MMEs).                                      performance of many racks of servers from a 4U chassis, including:
     • A full Dynamic Host Control Protocol (DHCP) network, with                                   • 120 gigabits per second of blended stateful application traffic
         support for both DHCP Client and DHCP Server processes.                                   • 90 million concurrent TCP sessions
     • Support for both 3G and LTE environments with GTPv1 and                                     • 4 million TCP sessions per second
         GTPv2.
                                                                                                   • 1.5 million steady-state complete TCP sessions per second
  Technological Breakthroughs from an Easy-to-Use Product                                          • 120,000+ SSL sessions per second
  That Is Always Current                                                                           • 150+ stateful application protocols
  BreakingPoint CTMs are designed for ease of use and rapid                                        • 4,500+ live security attacks
  configuration in a variety of network environments. Because of their
                                                                                                   • 28,000+ pieces of malware
  exclusive design, they evolve along with the frequent changes in
                                                                                                   • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces
  the landscape for applications, attacks, and telecom standards. With
  a BreakingPoint CTM, you will:                                                               To learn more about all BreakingPoint products and services, visit
                                                                                               www.breakingpoint.com/products.
     • Receive frequent updates from the BreakingPoint Application
         and Threat Intelligence (ATI) research team, which is dedicated                       Schedule a Demonstration Today
         to keeping applications and attacks current and providing                             Find out why the world’s largest service providers rely on
         frequent feature and performance enhancements.                                        BreakingPoint to measure and harden the resiliency of their LTE
     • Employ built-in network traffic profiles—created using                                  infrastructures. Visit
         data collected from top global telecom carriers—or easily                             www.breakingpoint.com/LTE.
         customize these profiles to fit your own network’s unique
                                                                                               1.866.352.6691 U.S. Toll-Free
         conditions.
                                                                                               www.breakingpoint.com
     • Configure simulations in just minutes through a single user-
         friendly interface that features fully integrated reporting, even
         across multiple BreakingPoint CTMs.
     • Leverage extensive automation and wizard-like labs that
         address many use-case scenarios, including validation of
         Lawful Intercept and Data Loss Prevention solutions with a
         digital storm of content in multiple languages.
  Eliminate the complexity of conventional testing approaches
  and replace it with the simplicity, power, and precision of the
  BreakingPoint CTM.




www.breakingpoint.com
Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Technical Specifications                                                                         • North American Wireless Carrier Weeknight
                                                                                                   • North American Wireless Carrier Weeknight with iPhone
                                                                                                   • Sandvine Mobile Internet Report – Caribbean / Latin America
  Devices Emulated:                                                                                • Sandvine Mobile Internet Report – Europe
      • eNodeBs + UEs
                                                                                                   • Sandvine Mobile Internet Report – North America
      • PDN
                                                                                               Wireless Reporting Statistics:
      • MME
                                                                                                   • UE Attach Requests Sent / Accepted / Failed
      • SGW + PGW + PDN
                                                                                                   • UE Detach Requests Sent / Successes
      • eNodeBs + UEs + MME, SGW + PGW + PDN
                                                                                                   • S1AP Setup Requests / Successes
      • SGSN + UEs
                                                                                                   • S1AP Reset Requests Received / Reset ACKs Sent
      • GGSN + PDN
                                                                                                   • SCTP Open Requests / Open Successes
  Interfaces Supported:                                                                            • SCTP Close Requests / SCTP Close Successes
      • S1-U (eNodeB and SGW sides)
                                                                                                   • GTP Create Requests Processed
      • S1-MME (eNodeB side)
                                                                                                   • GTP Create Responses Processed
      • SGi (PDN side)
                                                                                                   • GTP Delete Requests Processed
      • S11 (MME and SGW sides)
                                                                                                   • GTP Delete Responses Processed
      • Gn (SSGN and GGSN sides)
                                                                                                   • GTP Client Side Tunnels
  Wireless Protocols Supported:                                                                    • GTP Client Side Sent / Received Data
      • S1AP                                                                                       • GTP Server Side Tunnels
      • GTP-C v1, GTP-C v2, GTP-U v1                                                               • GTP Server Side Sent / Received Data
      • SCTP (over UDP or IP)
                                                                                               Other Features:
  Performance (per FireStorm blade):                                                               • LTE specification supported: v9
      • Up to 4,000 eNodeBs                                                                        • All security strikes and live malware supported over LTE and 3G
      • Up to 3,000,000 UEs                                                                        • Specific mobile malware support
      • Up to 3,000,000 concurrent GTP tunnels                                                     • All application protocols supported
      • Up to 1,800 UE registrations/sec on the S1 interface                                       • Can emulate multiple device instances concurrently (MME,
      • Up to 225,000 UE registrations/sec on the S11 interface                                       SGW, GGSN, SSGN)
      • Up to 13 Gbps GTP-encapsulated application traffic                                         • Automatic generation of IMSI, MSISDN, and UE secret keys
      • Up to 11 (1 default + 10 dedicated) bearers / UE

  Predefined Mobility Application Profiles:
      • Mobile User
      • European Wireless Carrier Daytime
      • European Wireless Carrier Daytime with iPhone
      • European Wireless Carrier Weekday
      • European Wireless Carrier Weeknight
      • European Wireless Carrier Weeknight with iPhone
      • North American Wireless Carrier Weekday
      • North American Wireless Carrier Weekday Daytime
      • North American Wireless Carrier Weekday Daytime with
         iPhone
      • North American Wireless Carrier Weekday with iPhone

www.breakingpoint.com
Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.
BreakingPoint LTE At-A-Glance



  Emulation Modes:




www.breakingpoint.com
Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc.
All other trademarks are the property of their respective owners.

More Related Content

PDF
BreakingPoint Resiliency Score Data Sheet
Ixia
 
PDF
White Paper: Six-Step Competitive Device Evaluation
Ixia
 
PDF
Load Test Methodology: Server Load Testing
Ixia
 
PDF
IPv6 Test Methodology
Ixia
 
PDF
Open Programmable Architecture for Java-enabled Network Devices
Tal Lavian Ph.D.
 
PDF
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
Ali Kafel
 
PDF
Juniper Services and Support
MarketingArrowECS_CZ
 
PDF
S series presentation
Sergey Marunich
 
BreakingPoint Resiliency Score Data Sheet
Ixia
 
White Paper: Six-Step Competitive Device Evaluation
Ixia
 
Load Test Methodology: Server Load Testing
Ixia
 
IPv6 Test Methodology
Ixia
 
Open Programmable Architecture for Java-enabled Network Devices
Tal Lavian Ph.D.
 
Stratus Fault-Tolerant Cloud Infrastructure Software for NFV using OpenStack
Ali Kafel
 
Juniper Services and Support
MarketingArrowECS_CZ
 
S series presentation
Sergey Marunich
 

What's hot (20)

PDF
Fedramp developing-system-security-plan-slides
Tuan Phan
 
PDF
Hp nni installation guide
najeeb625
 
PDF
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
Ali Kafel
 
PPTX
Aruba Rightsizing Your Network
hypknight
 
PPTX
IntelÂŽ Select Solutions for the Network
Liz Warner
 
PDF
DevicePro Flyer English
cynapspro GmbH
 
PPTX
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
PPTX
Network Troubleshooting - Part 1
SolarWinds
 
PPT
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM System Networking
 
PDF
Veryx Services Catalog
Veryx Technologies
 
PPTX
Platform Observability and Infrastructure Closed Loops
Liz Warner
 
PDF
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
Ali Kafel
 
PDF
Floorvision Brochure
Fides Sales
 
PDF
Floor Vision Brochure
John O'Donnell
 
DOCX
Pankaj_Joshi_Resume
Pankaj Chandra Joshi
 
PDF
Take the guesswork out of video surveillance with pre-validated Milestone s...
Principled Technologies
 
PDF
Accelerating Virtual Machine Access with the Storage Performance Development ...
Michelle Holley
 
PDF
Usage Based Metering in the Cloud (Subscribed13)
Zuora, Inc.
 
PDF
Dell EMC validates your virtualized Genetec video management system before it...
Principled Technologies
 
PDF
Shunra app cloud_whitepaper
Accenture
 
Fedramp developing-system-security-plan-slides
Tuan Phan
 
Hp nni installation guide
najeeb625
 
NFV resiliency whitepaper - Ali Kafel, Stratus Technologies
Ali Kafel
 
Aruba Rightsizing Your Network
hypknight
 
IntelÂŽ Select Solutions for the Network
Liz Warner
 
DevicePro Flyer English
cynapspro GmbH
 
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Network Troubleshooting - Part 1
SolarWinds
 
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM System Networking
 
Veryx Services Catalog
Veryx Technologies
 
Platform Observability and Infrastructure Closed Loops
Liz Warner
 
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratus
Ali Kafel
 
Floorvision Brochure
Fides Sales
 
Floor Vision Brochure
John O'Donnell
 
Pankaj_Joshi_Resume
Pankaj Chandra Joshi
 
Take the guesswork out of video surveillance with pre-validated Milestone s...
Principled Technologies
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Michelle Holley
 
Usage Based Metering in the Cloud (Subscribed13)
Zuora, Inc.
 
Dell EMC validates your virtualized Genetec video management system before it...
Principled Technologies
 
Shunra app cloud_whitepaper
Accenture
 
Ad

Similar to LTE Testing - Network Performance, Security, and Stability at Massive Scale (20)

PDF
LTE Testing
Ixia
 
PDF
BreakingPoint 3G Testing Data Sheet
Ixia
 
PDF
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
 
PDF
BreakingPoint Cloud and Virtualization Data Sheet
Ixia
 
PDF
BreakingPoint Custom Application Toolkit
Ixia
 
PDF
BreakingPoint FireStorm CTM Datasheet
Ixia
 
PDF
Breakingpoint Application Threat and Intelligence (ATI) Program
Ixia
 
PDF
The NGN Test Centre Infrastructure & Services - Shane Dempsey (NGN Test Centre)
NGN Test Centre
 
PDF
BreakingPoint от Ixia
BAKOTECH
 
PPTX
April2010 Sales Presentation
toddpruner
 
PDF
Municipal Wireless - State of the Industry
dunksalot
 
PDF
Ds nsa series_us_10_april10
Yustinus Malawau
 
PPT
Network Vision Sprint Direct Connect
udiazdeleon
 
PDF
Lahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir
 
PPTX
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
PDF
2 roberto - mining - presentation-v3
GE_Energy
 
PPTX
Measure Network Performance, Security, and Stability
Scott Register
 
PPTX
Measure Network Performance, Security and Stability
Ixia
 
PDF
IEEE 1588 Timing for Mobile Backhaul_Webinar
SymmetricomSYMM
 
PDF
Firewall Testing Methodology
Ixia
 
LTE Testing
Ixia
 
BreakingPoint 3G Testing Data Sheet
Ixia
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
 
BreakingPoint Cloud and Virtualization Data Sheet
Ixia
 
BreakingPoint Custom Application Toolkit
Ixia
 
BreakingPoint FireStorm CTM Datasheet
Ixia
 
Breakingpoint Application Threat and Intelligence (ATI) Program
Ixia
 
The NGN Test Centre Infrastructure & Services - Shane Dempsey (NGN Test Centre)
NGN Test Centre
 
BreakingPoint от Ixia
BAKOTECH
 
April2010 Sales Presentation
toddpruner
 
Municipal Wireless - State of the Industry
dunksalot
 
Ds nsa series_us_10_april10
Yustinus Malawau
 
Network Vision Sprint Direct Connect
udiazdeleon
 
Lahav Savir - Massively Scaleable Mobile Gateways
Lahav Savir
 
Sophos utm-roadshow-south africa-2012
dvanwyk30
 
2 roberto - mining - presentation-v3
GE_Energy
 
Measure Network Performance, Security, and Stability
Scott Register
 
Measure Network Performance, Security and Stability
Ixia
 
IEEE 1588 Timing for Mobile Backhaul_Webinar
SymmetricomSYMM
 
Firewall Testing Methodology
Ixia
 
Ad

More from Ixia (16)

PDF
Measuring Private Cloud Resiliency
Ixia
 
PDF
LTE Testing | 4G Testing
Ixia
 
PDF
IPS Test Methodology
Ixia
 
PDF
Deep Packet Inspection (DPI) Test Methodology
Ixia
 
PDF
Server Load Balancer Test Methodology
Ixia
 
PPTX
How to Test High-Performance Next-Generation Firewalls
Ixia
 
PPTX
Catalyst 6500 ASA Service Module
Ixia
 
PPTX
Testing High Performance Firewalls
Ixia
 
PDF
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
Ixia
 
PDF
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Ixia
 
PDF
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
Ixia
 
PDF
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
Ixia
 
PDF
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
Ixia
 
PDF
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
Ixia
 
PDF
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Ixia
 
PPTX
Harden Security Devices Against Increasingly Sophisticated Evasions
Ixia
 
Measuring Private Cloud Resiliency
Ixia
 
LTE Testing | 4G Testing
Ixia
 
IPS Test Methodology
Ixia
 
Deep Packet Inspection (DPI) Test Methodology
Ixia
 
Server Load Balancer Test Methodology
Ixia
 
How to Test High-Performance Next-Generation Firewalls
Ixia
 
Catalyst 6500 ASA Service Module
Ixia
 
Testing High Performance Firewalls
Ixia
 
BreakingPoint & Fortinet RSA Conference 2011 Presentation: Evaluating Enterpr...
Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
Ixia
 
BreakingPoint & Stonesoft RSA Conference 2011 Presentation: Evaluating IPS
Ixia
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Evaluating The Juni...
Ixia
 
BreakingPoint & Crossbeam RSA Conference 2011 Presentation: Evaluating High P...
Ixia
 
BreakingPoint & McAfee RSA Conference 2011 Presentation: Data Sheets Lie
Ixia
 
Cybersecurity: Arm and Train US Warriors to Win Cyber War
Ixia
 
Harden Security Devices Against Increasingly Sophisticated Evasions
Ixia
 

Recently uploaded (20)

PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Software Development Methodologies in 2025
KodekX
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 

LTE Testing - Network Performance, Security, and Stability at Massive Scale

  • 1. BreakingPoint LTE At-A-Glance Test LTE/4G Network Performance, Security, and Stability at Massive Scale BreakingPoint CTM™ Products Emulate Millions of Users to Reduce Cost and Complexity of Validating LTE Network Infrastructure Telecom carriers rolling out Long Term Evolution (LTE) and 4G With a BreakingPoint CTM, you can: networks must test mobile infrastructures efficiently and accurately • Measure and harden the performance, security, and stability under punishing real-world conditions, without spending a fortune of load balancers, firewalls, IPS devices, and other equipment to do so. BreakingPoint CTM products answer this challenge with with up to 120 gigabits per second of application, attack, and the industry’s most sophisticated and cost-effective Internet-scale malformed traffic. LTE emulation. • Validate network and data center performance by re-creating These products allow carriers to test their networks and the devices more than 150 application protocols, including Twitter Mobile, within them against the behavior of millions of simulated users AOLÂŽ IM, Yahoo!ÂŽ Mail and Messenger, GoogleÂŽ Gmail, SkypeÂŽ, downloading rich media content, placing calls, purchasing music, BitTorrent™, eDonkey, RADIUS, SIP, RTSP, RTP, HTTP, SSL, browsing the Web, or unknowingly sharing the latest malware. A FacebookÂŽ, YouTubeÂŽ, and AppleÂŽ FaceTimeÂŽ, as well as other BreakingPoint CTM replaces racks of equipment and complicated mobile, social, and gaming protocols—with Multicast support. setup processes with a single-chassis device and a single user • Stress network infrastructures with more than 4,500 security interface (shown below). attacks and 28,000 pieces of malware—including more than 100 pieces of mobile malware—plus obfuscations and Unprecedented Performance and Massive Scale in a Cost- evasions. Effective Device • Find network problem areas sooner and prepare for the Based on a patented breakthrough in network processor unexpected with the industry’s fastest protocol fuzzing technology and backed by a team of network performance and capabilities. security experts, only a BreakingPoint CTM produces the city-scale LTE network conditions needed to harden carrier-grade network • Emulate sophisticated, large-scale DDoS and mobile-initiated resiliency. botnet attacks to uncover previously hidden weaknesses. BreakingPoint CTM™ Products Enable Configuration of Multi-Million-User LTE Infrastructure Tests from a Single-Screen Interface.
  • 2. BreakingPoint LTE At-A-Glance The Solution for Simulating Multi-Million-User LTE Networks, with Additional 3G Capability The unique architecture of BreakingPoint CTM products delivers the huge performance numbers necessary to validate and harden even the largest LTE networks under the most realistic conditions, all from a turnkey solution, including: • Up to 90 million concurrent TCP sessions, allowing emulation of thousands of eNodeBs connecting to millions of devices such as smartphones, tablet computers, and netbooks. • Interactions among all the network elements involved in LTE communications, including user equipment (UE), eNodeBs, BreakingPoint FireStorm CTM Specifications Service Gateways (SGWs), Packet Data Network Gateways A single BreakingPoint FireStorm CTM provides the equivalent (PGWs), and Mobility Management Entities (MMEs). performance of many racks of servers from a 4U chassis, including: • A full Dynamic Host Control Protocol (DHCP) network, with • 120 gigabits per second of blended stateful application traffic support for both DHCP Client and DHCP Server processes. • 90 million concurrent TCP sessions • Support for both 3G and LTE environments with GTPv1 and • 4 million TCP sessions per second GTPv2. • 1.5 million steady-state complete TCP sessions per second Technological Breakthroughs from an Easy-to-Use Product • 120,000+ SSL sessions per second That Is Always Current • 150+ stateful application protocols BreakingPoint CTMs are designed for ease of use and rapid • 4,500+ live security attacks configuration in a variety of network environments. Because of their • 28,000+ pieces of malware exclusive design, they evolve along with the frequent changes in • 1 Gigabit Ethernet and 10 Gigabit Ethernet interfaces the landscape for applications, attacks, and telecom standards. With a BreakingPoint CTM, you will: To learn more about all BreakingPoint products and services, visit www.breakingpoint.com/products. • Receive frequent updates from the BreakingPoint Application and Threat Intelligence (ATI) research team, which is dedicated Schedule a Demonstration Today to keeping applications and attacks current and providing Find out why the world’s largest service providers rely on frequent feature and performance enhancements. BreakingPoint to measure and harden the resiliency of their LTE • Employ built-in network traffic profiles—created using infrastructures. Visit data collected from top global telecom carriers—or easily www.breakingpoint.com/LTE. customize these profiles to fit your own network’s unique 1.866.352.6691 U.S. Toll-Free conditions. www.breakingpoint.com • Configure simulations in just minutes through a single user- friendly interface that features fully integrated reporting, even across multiple BreakingPoint CTMs. • Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of Lawful Intercept and Data Loss Prevention solutions with a digital storm of content in multiple languages. Eliminate the complexity of conventional testing approaches and replace it with the simplicity, power, and precision of the BreakingPoint CTM. www.breakingpoint.com Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 3. BreakingPoint LTE At-A-Glance Technical Specifications • North American Wireless Carrier Weeknight • North American Wireless Carrier Weeknight with iPhone • Sandvine Mobile Internet Report – Caribbean / Latin America Devices Emulated: • Sandvine Mobile Internet Report – Europe • eNodeBs + UEs • Sandvine Mobile Internet Report – North America • PDN Wireless Reporting Statistics: • MME • UE Attach Requests Sent / Accepted / Failed • SGW + PGW + PDN • UE Detach Requests Sent / Successes • eNodeBs + UEs + MME, SGW + PGW + PDN • S1AP Setup Requests / Successes • SGSN + UEs • S1AP Reset Requests Received / Reset ACKs Sent • GGSN + PDN • SCTP Open Requests / Open Successes Interfaces Supported: • SCTP Close Requests / SCTP Close Successes • S1-U (eNodeB and SGW sides) • GTP Create Requests Processed • S1-MME (eNodeB side) • GTP Create Responses Processed • SGi (PDN side) • GTP Delete Requests Processed • S11 (MME and SGW sides) • GTP Delete Responses Processed • Gn (SSGN and GGSN sides) • GTP Client Side Tunnels Wireless Protocols Supported: • GTP Client Side Sent / Received Data • S1AP • GTP Server Side Tunnels • GTP-C v1, GTP-C v2, GTP-U v1 • GTP Server Side Sent / Received Data • SCTP (over UDP or IP) Other Features: Performance (per FireStorm blade): • LTE specification supported: v9 • Up to 4,000 eNodeBs • All security strikes and live malware supported over LTE and 3G • Up to 3,000,000 UEs • Specific mobile malware support • Up to 3,000,000 concurrent GTP tunnels • All application protocols supported • Up to 1,800 UE registrations/sec on the S1 interface • Can emulate multiple device instances concurrently (MME, • Up to 225,000 UE registrations/sec on the S11 interface SGW, GGSN, SSGN) • Up to 13 Gbps GTP-encapsulated application traffic • Automatic generation of IMSI, MSISDN, and UE secret keys • Up to 11 (1 default + 10 dedicated) bearers / UE Predefined Mobility Application Profiles: • Mobile User • European Wireless Carrier Daytime • European Wireless Carrier Daytime with iPhone • European Wireless Carrier Weekday • European Wireless Carrier Weeknight • European Wireless Carrier Weeknight with iPhone • North American Wireless Carrier Weekday • North American Wireless Carrier Weekday Daytime • North American Wireless Carrier Weekday Daytime with iPhone • North American Wireless Carrier Weekday with iPhone www.breakingpoint.com Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 4. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.
  • 5. BreakingPoint LTE At-A-Glance Emulation Modes: www.breakingpoint.com Š 2005 - 2011. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. All other trademarks are the property of their respective owners.