Differentiation in an IP Services World - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Differentiation in an IP Services World

Description:

This is intended for CloudShield employees and ... BitTorrent. eDonkey. Etc. Groups. www. VoIP. P2P. Context. ALDE Probe. CS-2000. DPPM. DPPM. CS-2000 ... – PowerPoint PPT presentation

Number of Views:143
Avg rating:3.0/5.0
Slides: 16
Provided by: danmc8
Category:

less

Transcript and Presenter's Notes

Title: Differentiation in an IP Services World


1
Alcatel-Lucent Application (First Look) Internal
Training
2
Notice
  • This is intended for CloudShield employees and
    contractors only.
  • What we present is the preliminary versionin
    development
  • Features may change
  • Look/feel may change
  • How they choose to market/sell the product may
    change
  • How they choose to integrate the product may
    change
  • This doesnt show how to sell the solutionjust a
    first look

3
What is the ALU application?
  • Agya (a-jya) is an integrated management system
    that
  • Monitors traffic
  • Rate limits traffic
  • Provides DDoS protection

4
Problems in the Marketplace
  • Customers do not have an accurate view into the
    types of traffic found on their network
  • P2P traffic is consuming valuable bandwidth
  • Network attacks are increasing

5
Where it Fits in the Network
Internet
Carrier
Agya
www User
InMon
6
Key Agya Functions
  • Monitors traffic via InMon (rrd-like collection
    tool)
  • Sets policies on the CS-2000 to rate limit
    protocols
  • Sets ACLs on the CS-2000 to block attacks

7
Policies
  • Rules describing when and how to rate-limit/block
    protocols
  • Schedules
  • Start/stop times
  • Protocols
  • Limits
  • Example
  • You build a policy for your network where, on
    weekdays, you rate-limit P2P and VoIP traffic. On
    weekends you do relax your P2P and VoIP limits.

8
How it WorksPolicies
Internet
Carrier
Policy
Agya
www User
View Traffic
InMon
9
ACLs
  • ALDE generates alerts
  • Operators manually determine if they take action
  • Packets matching ACL can be blocked or shaped
    (partially blocked)
  • Example
  • The ALDE alerts Agya of a possible attack.
    The operator determines the alert is an actual
    attack and shapes the packets matching the ACL
    entry by dropping 45 of them.

10
Where it Fits in the Network
Internet
Carrier
ACLs
Alerts
Agya
www User
InMon
11
Features and Benefits
12
Agya Structure
Context ALDE Probe CS-2000
DPPM DPPM CS-2000
DPPM DPPM
Protocols www Skype SIP BitTorrent eDonkey Etc.
Groups www VoIP P2P
Policy 1 Days Nights Weekends Policy
2 BusHours RecHours
13
Demonstration
14
Thank You!
15
Links
  • AAA
  • DDoS
  • InMon
  • Agya came from Pagya
  • P2P
  • sFlow
Write a Comment
User Comments (0)
About PowerShow.com