

Add to Cart
5G Networks Bring Network Security and Data Leak Risk NetTAP Accelerate Threat Response
What 5G Network Bring us, the Opportunity and Challenge aslo Network Security Risk?
With its advantages of real-time, high-speed and multi-device
concurrent support, 5G has become a new key infrastructure for the
Internet of Everything. Industrial Internet, Internet of Vehicles,
Smart Grid, Smart City, and military networks will all develop on
5G networks.
At the same time, under the wave of 5G, network security faces
opportunities and challenges, and it has also become a difficult
problem.
5G, a new technological term, is all too familiar today. With the
three characteristics of large broadband (eMBB), high reliability
and low latency (uRLLC) and large-scale large connection (mMTC), it
has successively built three application scenarios:
EMBB: Download rates of 10GB per second enable high-traffic mobile
broadband services such as 3D and ultra-high-definition video.
URLLC: The theoretical delay of 5G is 1ms, so businesses such as
unmanned driving and industrial automation will not stop at movies;
MMTC: The theoretical value of the number of Internet of Things
terminals in a 5G single communication cell has reached millions.
According to IDC, by 2025, the number of IoT devices worldwide will
reach 41.6 billion. Industrial Internet, Internet of Vehicles,
Smart Grid, Smart City, and military networks will all develop on
5G networks. It can be said that from the interconnection of
people, to the interconnection of things, to the combination of
things, 5G technology will eventually build a world of intelligence
for us.
Challenges in the 5G wave: network security, traffic needs to be
managed, monitored and analyzed.
But while we are enjoying the great power brought by 5G, there are
also unprecedented security risks at the other end:
When 5G combines the characteristics of "low latency + high
reliability" with important vertical industries such as Internet of
Vehicles, telemedicine, industrial automation, and smart grid, the
targets and interests of cyber attacks will further expand.
When 5G supports "big connected business" and places more critical
infrastructure and important application architecture on top of it,
these high-value targets may attract a larger attack force-state
hackers.
When 5G breaks the network boundary and further integrates the
online world with the physical world, attacks on the virtual world
will become physical damage, and the impact of cyber attacks will
soar exponentially.
Just a few days ago, Li Huidi, vice president of China Mobile,
pointed out in a speech at the 2019 China Cyber Security Industry
Summit Forum that without 5G security, there would be no industrial
security. In particular, 5G will be widely used in key industries
such as electric energy, transportation, and industrial
manufacturing. Once the network is attacked or invaded, it will
seriously threaten the economic and social stability of a country
and the production and life of the people.
To cope with 5G security challenges, think tanks believe that security big data, threat intelligence, knowledge base, security experts and other resources should be integrated.Think holistically, not locally;Use active defense instead of static defense;To "visible, defensible" network security defense capabilities to actively respond.
Moreover, as the prosperity of 5G era needs efforts from the government, the operators and all walks of life, under my 5G safety ecology also need industry, network security companies and government departments work together, work together to deepen under 5G era of attack and defense of network security research and respond to, only then can we truly protect individuals, industry and even the national security.
What's the Matrix Modular Designed Plug-in Network Packet Broker to
do in 5G Networks?
With the acceleration of carrier broadband construction and the
rapid development of 3G, 4G, and 5G networks, and with the
popularity and development of big data and cloud computing
technologies, data traffic is growing, and the bandwidth
requirements for backbone networks and core networks are
increasing. Since 2013, the major operators have begun to gradually
upgrade the backbone network. The core backbone network
transmission link media starts to be expanded from 10GPOS and
40GPOS links to 100G Ethernet links. It will inevitably lead to the
continuous updating of big data collection and analysis technology.
In the face of 100GE link environment with high bandwidth capacity,
how to effectively meet the requirements of various national
security, network security monitoring, operator intelligent
pipeline DPI data collection and analysis will become a hot spot in
the field of data acquisition and analysis.
Chengdu Shuwei Communication is following the development direction
of the Internet and develop the MATRIX-TCA-CG Traffic
Acquisition(Traffic Capture) Visibility System, and dedicated to
the traffic collection and visual analysis application requirements
on 1GE, 10GE, 10G/40G POS, 40GE and 100GE links. The MATRIX-TCA-CG
integrates free-steering output functions such as network flow
collection/acquisition, aggregation, filtering,
forwarding/distribution, and load balancing and provides an
efficient solution for the flow analysis.
Matrix-TCA-CG is a network data visualization control device for
high density and large flow of 10G/40G/100G.
Matrix-TCA-CG is specially designed for the data collection of 10GE
40GE and 100GE links distributed intensively in operators mobile
Internet export, IDC export, provincial network and backbone.
Based on ATCA standard architecture, MATRIX-TCA-CG has high
carrier-level reliability and strong expansibility which can
smoothly configure the functional board CARDS to cope with port
demand scenarios of various specifications and sizes.
Military Data Distribution and Distribution System
In Element A, a total of one NT-FTAP-24XE, one NT-CFTAP-28XG-D, two
NT-iTAP-25FG, two NT-8P-24G, and one NetTAP-S191 appliance were
deployed to users. In the network environment, two NT-8P-24G and
one NetTAP-S191 are used as POS link access devices to collect all
POS links. Then, the protocol is converted to Ethernet data and
finally aggregated to the NT-FTAP-24XE device. NT-FTAP-24XE
uniformly distributes and regulates all traffic, and reserves 14
10GE (General Electric Compatible) ports as output interfaces for
users.
In Element B, a total of one NT-CFTAP-28XG-D and two NT-8P-24G
devices are deployed in the user network environment, and two NT-8
P-24G devices are used as POS link access devices . POS link, then
convert the protocol into Ethernet data, and finally aggregate to
NT-CFTAP-28XG-D equipment, NT-CFTAP-28XG-D equipment uniformly
distributes and regulates all traffic, leaving 19 GE and 4 10GE
(compatible with GE) port as output interface.
Large-capacity Network Visibility 10G/40G/100G Capture, Aggregation and Distribution Application for 3G, 4G, 5G Networks Security
The high-performance, high-capacity MATRIX-TCA-CG traffic acquisition visibility system can be deployed to perform large-scale acquisition of signaling or user data in any link of the operator's 3G/4G/5G network. Then, through the system, the data traffic size, structure, relationship, etc. are collated and analyzed. After the invisible data signal is converted into a visible entity, the user can copy, aggregate, and offload the required target data to the back-end signaling collection according to the system feedback information. Decoding system for advanced processing.
Network Packet Broker Specification and Module Type
Component type | Product Model | Basic Parameter | Remarks |
Chassis | NTCA-CHS-7U7S-DC | Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular | Must choose one |
NTCA-CHS-7U7S-AC | Height:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular | ||
Service card | NT-TCA-SCG10 | 100G exchange card,10*QSFP28 interface | Choose according to actual business needs |
NT-TCA-CG10 | 100G service card,10*QSFP28 interface | ||
NT-TCA-XG24 | 10G service card,24*SFP+ interface | ||
NT-TCA-RTM-CG10 | 100G RTM card,10*QSFP28 interface | ||
NT-TCA-RTM-EXG24 | 10G RTM card,24*SFP+ interface | ||
TCA Visibility Embedded software system | NT-TCA-SOFT-PKG | must |
Machine Specification
Items | Specifications |
Chassis size | NTCA-CHS-7U7S-DC:310.45mm(H) × 482.6mm(W)× 443.6mm(D) |
NTCA-CHS-7U7S-AC:310.45mm(H) × 482.6mm(W)× 443.6mm(D) | |
NTCA-CHS-16U14S-DC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D) | |
NTCA-CHS-16U14S-AC:708.35 mm(H) × 482.6mm(W)× 502.15mm(D) | |
Adapter chassis and power | Power supply |
NTCA-CHS-7U7S-DC:High voltage DC(240VDC~280VDC) | |
NTCA-CHS-7U7S-AC:220V AC | |
NTCA-CHS-16U14S-DC:High voltage DC(240VDC~280VDC) | |
NTCA-CHS-16U14S-AC:220V AC | |
Power: | |
NTCA-CHS-7U7S-DC:Full configuration maximum power consumption < 3000W | |
NTCA-CHS-7U7S-AC:Full configuration maximum power consumption < 3000W | |
NTCA-CHS-16U14S-DC:Full configuration maximum power consumption < 5000W | |
NTCA-CHS-16U14S-AC:Full configuration maximum power consumption < 5000W | |
Environment requirement | Working temperature:0℃~50℃ |
Storage temperature:-20℃~80℃ | |
Working humidity:5%~95%,Non-condensation | |
Standard Certification | Advanced®specification PICMG® 3.0 R2.0 |
RoHs,Designed for CE,FCC,NEBS Level 3 |