contents

products
 
Force10 Networks' Line-Rate 10 Gigabit Intrusion Prevention System

Force10 Networks has introduced the industry’s first security appliance that inspects, monitors, captures and blocks traffic at line-rate 10 Gigabit speeds. Based on a patented architecture that is optimized for high speed monitoring and traffic capture, the Force10 P-Series family of security appliances supports unprecedented deep packet inspection scalability, ensuring the highest level of security without compromising network performance.

The Force10 P-Series family brings line-rate Gigabit and 10 Gigabit security to the network in a compact, one rack unit form factor. With two line-rate 10 Gigabit ports, the Force10 P10 has an aggregate inspection throughput of 20 Gigabits per second and is the industry’s first intrusion prevention system that can secure 10 Gigabit Ethernet networks at line-rate speeds, eliminating costly bottlenecks. As a complement to the P10, the two-port Force10 P1 delivers inspection at line-rate Gigabit speeds.

At the foundation of the Force10 P-Series is the patented Dynamic Parallel Inspection (DPI) technology, a fundamentally new architecture for signature processing that delivers the flexibility and scalability required to secure high performance networks. The Force10 DPI technology employs multiple hardware-based engines to simultaneously process thousands of rules on a single packet. The P-Series directly embeds security rules and signatures into hardware to ensure line-rate processing, inspection and monitoring of traffic on the network. The ability to write new signatures directly to hardware in real time provides IT managers with deterministic, predictable performance regardless of traffic conditions.

To provide further flexibility, the Force10 P-Series supports open source network security applications, enabling customers to specify policies from public domain signatures or standard network monitoring libraries. An open application program interface also allows IT managers to develop custom signatures for firewalling, denial of service attacks and packet and flow analysis applications.



write your comments about the article :: © 2006 Networking News :: home page