Tel: +44 (0)1296 678510
E-Learning
 
The UK's Leading Telecoms, Datacoms Test & Management solutions.
Ixia Logo
 
Ixia Breaking Pointfor Application and Security Testing
 
Product

IP Networks

Ixia BreakingPoint

Application Performance and Security Resilience Solutions to validate, secure, and optimize physical and virtual networks. Threat Inteligence Testing , IP testing, LTE Testing, Network Traffic Emulation

In today's world of crippling cyber-attacks and dynamic applications, you need to know that your networks are secure and high-performing enough to handle the worst from cyber criminals and extreme-traffic anomalies. Complex system interactions make it difficult for you to optimize security performance and network resiliency. Any approach that fails to fully-validate network security and performance with realistic application load and attack techniques is insufficient and risky.

With Ixia’s BreakingPoint® application and security test solution, enterprises, service providers, and equipment manufacturers validate the stability, accuracy, and quality of networks and network devices. BreakingPoint’s unique design enables the creation of real-world legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing at the same time and from the same port. Combined with full control of the load capacity and detailed per-simulated host reporting, this makes BreakingPoint the ideal simple-to-use and repeatable testing eco-system for modern network testing.

BreakingPoint provides test solutions ensure:

  • Network security
  • Maximize security investments with onsite network-specific proof-of-concept (PoC) validation
  • Optimize next-generation firewalls (NGFWs), intrusion prevention systems (IPS), and other security devices
  • Validate DDoS defenses
  • Build networks and cloud infrastructures that are resilient to attacks
  • Network performance
  • Ensure the always-on user experience in the midst of complexity and exploding traffic volume
  • Validate and optimize 3G and 4G/LTE networks under the most realistic conditions, using real mobile applications over mobile tunneling and roaming, and get per-user equipment (UE) statistics

Now, with the new BreakingPoint Virtual Edition (VE), enterprise IT departments have the same high-fidelity, real-world testing that security vendors and leading service providers use to ensure network security resilience – now in an elastic deployment model that makes sense for their business.

With the PerfectStorm™ load modules and XGS12™ chassis, BreakingPoint offers an all-in-one security and performance testing platform for massive-scale, stateful layer 4-7 application and security testing. It provides near Terabit levels of mixed application and malicious traffic to test all elements of today’s complex data centers. For a powerful yet portable form factor, PerfectStorm ONE 1GE/10GE and 10/40GE appliances scale from 4Gbps to 80Gbps of application traffic.

With PerfectStorm, Ixia delivers the first platform to seamlessly unify the IxLoad® and BreakingPoint software applications into a single, more powerful system to ensure the secure delivery of mission-critical applications.

The ATI program provides offers a simple way to create test flows of the malicious and user traffic your network must withstand. It provides updates every 2 weeks to ensure delivery of the industry's most up to date application and threat intelligence, and includes 290+ stateful application protocols and 36,000+ live malware samples.

BreakingPoint is designed for ease of use and rapid configuration in a variety of network environments. Ixia’s exclusive Application and Threat Intelligence (ATI) service ensures that your test system will evolve along with the frequent changes in the landscape for applications, attacks, and standards. BreakingPoint key features include:

  • Real-world application protocols: Simulates over 300 application protocols, each can be modified to simulate specific application flows
  • Protocol dynamics and realism: Able to customize and manipulate any protocol, including raw data, to simulate legitimate or negative traffic
  • Real-world application mix: Designed to generate a mix of protocols at high speed with realistic protocol weight
  •  Real-world attacks: Supports over 36,000 attacks and malwares and the attacks can be obfuscated by over 100 evasion techniques
  • Legit/malicious traffic from the same port: BreakingPoint’s hardware design allows sending all types of traffic simultaneously from a single port, with full control of the weight/mix of legitimate traffic, DDoS and other attacks, malware, and fuzzing
  • Always current: Bi-monthly updates from the BreakingPoint ATI research team, to keep you current with the latest applications and threats
  • Broad range of use cases: Designed for performance, security, and stability validation, and for cyber range simulation for training and network architecture design validation
  • Enterprise-wide networks to continent-scale mobile: Reaches a staggering performance per fully-populated chassis of 960Gbps / 720 million sessions and 24 million connections per second
  • Simple user interface: Configure simulations in just minutes through a single user-friendly interface that features fully integrated reporting, even across multiple BreakingPoint modules
  • Pre-configured application/language traffic mixes: Leverage extensive automation and wizard-like labs that address many use-case scenarios, including validation of lawful intercept and data loss prevention (DLP) solutions, with a digital storm of content in multiple languages
  • Conduct wrap-around tests, with BreakingPoint acting as both the client and server (2-arm testing)


    Ixia Breaking Point Network under Test Diagram.

Test servers or full networks (1-arm testing), with BreakingPoint acting as just the client


Ixia Breaking Point Network under Test Diagram

 

  • -Network Support
  • -IPV4/IPv6
    -IPv4 and IPv6 hosts and virtual routers
    -IPv6 SLAAC and Stateless DHCPv6 hosts
    -DHCPv4 and DHCPv6
    -DHCP-PD
    -DNS and DNSv6

-DS-Lite B4 and AFTR, 6rd CE Encryption
-IPsec IKEv1 and IKEv2 (Remote Access and Site to Site)

  • -All applications and attacks can run through the encrypted tunnels simultaneously
  • -Mobility Support

 

  • -The unique architecture of BreakingPoint products delivers the huge performance numbers necessary to validate and harden the largest mobile networks under the most realistic conditions, including:
  • -Support for both 3G and LTE environments with GPRS Tunneling Protocol (GTPv1) and GTPv2
  • -Roaming security testing for S5/8, SGSN, S6a Diameter over SCTP
  • -Test using real mobile applications over mobile tunneling and roaming

BreakingPoint Hardware Platforms

PerfectStorm ONE Appliance Compact, Enterprise-Wide Layers 4-7 Application and Security Testing

Ixia Breaking Point and PerfectStorm ONE for Application and Security Testing

Ixia's PerfectStorm ONE network test and assessment solutions are developed specifically to make BreakingPoint solutions available in a compact form-factor for enterprise IT, operations, and security personnel. PerfectStorm ONE condenses Ixia's PerfectStorm massive-scale, stateful layer 4-7 testing platform to now support the enterprise. Scaling from 4Gbps to 80Gbps of application traffic simulation, PerfectStorm ONE supports a buy-only-what-you-need business model to align with enterprise budgets and future-proof your growing test


PerfectStorm™ Load Modules and XGS12 Chassis Massive-Scale, Stateful Layers 4-7 Application and Security Testing

/Ixia Breaking Point and PerfectStorm Module for Application and Security Testing

With Ixia’s PerfectStorm™ load modules and XGS12™ chassis, BreakingPoint offers an all-in-one security and performance testing platform for massive-scale, stateful layer 4-7 application and security testing. It provides near Terabit levels of mixed application and malicious traffic to test all elements of today’s complex data centers.

With PerfectStorm, Ixia delivers the first platform to seamlessly unify the IxLoad® and BreakingPoint software applications into a single, more powerful system to ensure the secure delivery of mission-critical applications.

PerfectStorm blades are powered by the XGS12™ Rackmount Chassis. The 12-slot modular chassis is the industry’s highest port density Ethernet test system available. It is the flexible platform that delivers the most comprehensive solution for performance, functional, and conformance testing of network equipment and network applications.

Specification

Protocols

Applications

300+ stateful application protocols supported

Wireless Interfaces

  • S1-U (eNodeB and SGW sides)
  • S1-MME (eNodeB side)
  • SGi (PDN side)
  • S5/8 (SGW and PGW sides)
  • S11 (MME and SGW sides)
  • Gn (SSGN and GGSN sides)
  • Wireless Protocols Supported:
  • S1AP
  • GTP-C v1, GTP-C v2, GTP-U v1
  • SCTP (over UDP or IP) 

Wireless Operational Modes

  • User Equipment
  • 3G GGSN
  • 3G SGSN
  • eNodeB/MME (GTPv2)
  • eNodeB/MME/SGW (GTPv2)
  • eNodeB (S1AP/ GTPv1)
  • SGW/PGW
  • MME/SGW/PGW
  • PGW

Network Access

  • IPv4/IPv6 Static Hosts
  • IPv4/IPv6 External Hosts
  • IPv4/IPv6 DHCP Hosts
  • IPv4/IPv6 DHCP Server
  • IPv6 SLAAC + Stateless DHCPv6 Hosts
  • DHCP-PD
  • VLAN
  • IPv4/IPv6 Router
  • 6rd CE Routers
  • DS-Lite B4 and AFTR
  • IPv4/IPv6 DNS
  • IPsec IKEv1/IKEv2

Test Methodologies/Labs

  • RFC 2544 Lab
  • Multicast Lab
  • Lawful Intercept Lab
  • Session Sender Lab
  • LTE Lab
  • Device Validation Lab
  • MultiBox testing
  • Resiliency Score*
  • Data Center Resiliency
  • LTE Lab

Security: Exploits/Malware

  • 36,000+ attacks
  • 6,000+ exploits
  • 30,000+ malware
  • 100+ evasion classes
  • Multi-layer evasions

Security: Dos/DDos

Attacks include: 

  • IP-based DoS attack types:
  • ICMP flood test case
  • ICMP fragmentation test case
  • Ping flood test case
  • UDP-based DoS attack types:
  • UDP flood test case
  • UDP fragmentation test case
  • Non-spoofed UDP flood test case
  • TCP-based DoS attack types:
  • Syn flood test case
  • Syn-ack flood test case
  • Data ack and push flood test case
  • Fragmented ack test case
  • Session attack test case
  • Application-layer attack types:
  • DNS flood attack case
  • Excessive verb attack case
  • Recursive GET Floods
  • Slow POSTs
  • Botnets:
  • Zeus
  • SpyEye
  • BlackEnergy
  • Duqu
  • Pushdo Cutwail 



Ixia BreakingPoint Application and Security Testing Platform - Data Sheet
Products in this range...
Ixia BreakingPoint
Ixia BreakingPoint In today's world of crippling cyber-attacks and dynamic applications, you need to know that your networks are secure ... Read More
 
Ixia BreakingPoint™ Virtual Edition (VE)
Ixia BreakingPoint™ Virtual Edition (VE) In today's world of crippling cyber attacks and dynamic applications, organizations need to know that their networks ar... Read More
 
Ixia IxChariot
Ixia IxChariot Applications only perform as well as the networks upon which they run. Challenging real-time business services such as ... Read More
 
Ixia IxNetwork
Ixia IxNetwork Network Topology Testing and Traffic Analysis As networks converge into a single network infrastructure that is used ... Read More
 
Ixia Network Test Solutions
Ixia Network Test Solutions Test with the Best Today's networking environment is increasingly complex. Data center convergence, enterprise exp... Read More
 
Ixia PerfectStorm One
Ixia PerfectStorm One Enterprise-Wide Application and Security Testing — Anywhere, Anytime Enterprises and government organizatio... Read More
 
NG40
NG40 ng4T offers test solutions together with world class consulting services to enable the building and testing... Read More
 
nGenius Test Lab Automation Infrastructure
nGenius Test Lab Automation Infrastructure Improving Efficiency, Speed, and Performance in Network and Application Test Labs. The need to optimize test lab op... Read More
 
nGenius TestStream Management Software
nGenius TestStream Management Software Meet the demands of complex test lab environments Meet the demands of complex test lab environments Today’s ra... Read More
 
VeEX Digital Lightwave MPA Multi-Protocol Analyzer
VeEX Digital Lightwave MPA Multi-Protocol Analyzer Simultaneous Independent Testing   -   | Multi-Port | Multi-Protocol | Multi-User Ben... Read More
 
VeEX MTTplus
VeEX MTTplus The MTTplus platform builds on the legacy of the legendary MTT , providing a compact, powerful and cost-effective mo... Read More
 
VeEX Sunrise RXT-1200 Test Platform
VeEX Sunrise RXT-1200 Test Platform The new and completely redesigned RXT-1200™ addresses the challenges of communication service providers to increa... Read More
 
VeEX Sunrise SSMTT-50 Dual Port Ethernet Module
VeEX Sunrise SSMTT-50 Dual Port Ethernet Module Sunrise Telecom (now VeEX) products & solutions are only available in the UK from Frame Communications Ltd. A ... Read More