0% found this document useful (0 votes)
353 views24 pages

Allot Enterprise Network Solutions Overview

This introductory module provides an overview of Allot and its core technology. It discusses how Allot addresses the needs of enterprise customers through its DART technology, which is an enhanced form of deep packet inspection. The module also examines how Allot solutions are typically deployed in a network architecture and the key benefits they provide such as ensuring network and application availability, optimizing quality of experience, and protecting against security threats.

Uploaded by

Javier Javier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
353 views24 pages

Allot Enterprise Network Solutions Overview

This introductory module provides an overview of Allot and its core technology. It discusses how Allot addresses the needs of enterprise customers through its DART technology, which is an enhanced form of deep packet inspection. The module also examines how Allot solutions are typically deployed in a network architecture and the key benefits they provide such as ensuring network and application availability, optimizing quality of experience, and protecting against security threats.

Uploaded by

Javier Javier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Module 1: Introduction

Introduction
ACTE Training (Enterprise Track)

ACTE (Enterprise Track) 1


Module 1: Introduction

• About Allot

• Core Technology

• Placement in Network

• Allot Architecture

In this introductory module, we will begin with an overview of Allot and how we
address the needs of our Enterprise Customers. We will then review our core
technology – DART, which lies at the heart of Allot’s Smart solutions. We end this
introductory module by examining Allot’s typical solution architecture.

ACTE (Enterprise Track) 2


Module 1: Introduction

Allot is a provider of leading innovative


network intelligence and security solutions
for service providers and enterprises worldwide,
enhancing value to their customers.

IT’S YOUR NETWORK. KNOW IT. CONTROL IT. SECURE IT.

By deploying Allot’s solution, enterprises are able to run efficient networks that
satisfy users and increase productivity while ensuring business continuity.
With Allot, both enterprise customers and cloud providers can:
See – Analyze the network in order to be able to plan capacities in an accurate way,
identify degradation on time and comply with regulation requirements. The solution
can also provide analysis and business analytics on different aspects of the data, such
as user behavior, QoE scoring, Trend analysis and troubleshooting tools.
Control – Improve user quality of experience using multi-dimension QoS and multi-
tenant SLA. Allot’s solutions ensure network resource allocation matches business
priorities, control applications running in the network by bandwidth or by
connections. We can also control and mitigate network latency using the add-on TCP
optimization feature.
Secure – Secure the network from attacks and allow users to browse safely. Remove
risky applications and protect you network infrastructure from Ransomware, DDoS
attacks, Bot infection and other kinds of web threats. Security is achieved by adding
an Anomaly Detection engine for host and network anomaly traffic.

ACTE (Enterprise Track) 3


Module 1: Introduction

Allot at a Glance
Since 1996

600+
employees worldwide

Sales & Support Offices Regional Headquarters R&D Centers

• • •
• • •
• • •

Established in 1996, Allot is a leading global provider of innovative network


intelligence and security solutions for enterprises worldwide. Allot’s multi-service
platforms are deployed by over 1000 mobile, fixed and cloud service providers and
over 1000 enterprises around the world. Our sales, support and R&D centers are also
spread around the world to help us get as close as possible to our global customer
base.

ACTE (CSP Track) 4


Module 1: Introduction

Enterprises, Trends and Challenges

Enterprises have many IT challenges. Let’s look at 5 significant trends that are
creating challenges for Enterprises worldwide.
• Network Downtime is one of the main concerns of IT and Network Admins – Most
of the network downtimes and service interruptions are caused by either user or
application behavior. With the Allot solution, the IT manager can monitor and
control what is running in the network and overcome this challenge.
• As companies provide more and more online digital services to customers, their
digital experience (QoE) becomes critical to avoid revenue loss. Whether it is a
bank which provides access to customer data, a University which gets service to its
students or any other Enterprise business – they all need to provide a good QoE to
the network users to prevent revenue loss and maintain the business reputation.
• Networks becomes more complex as every year there are new applications, new
devices and new services to be deployed, maintained and administrated. It quickly
becomes very difficult to manage. Using the Allot solution the IT Manager can
assure the right QoS and QoE to the business-critical applications and services.
• Higher demand for strong connectivity and QoE of remote users at companies
(VPNs, Mobile, Cloud Apps) is becoming more popular than ever.
• Infrastructure changes such as transformation to SD-WAN, bandwidth upgrades,
adding new devices etc are common. Such projects are expensive and

ACTE (CSP Track) 5


Module 1: Introduction

overwhelming, but many times are not enough to solve the traffic issues in the
enterprise network.

ACTE (Enterprise Track) 5


Traffic Intelligence and Assurance for Enterprises

• Ensure network and application availability

• Provide real-time troubleshooting of


network & application issues

• Assure delivery of applications with one


centralized appliance

• Guarantee optimal QoE for remote users

• Protect business continuity through


Behavior Anomaly Detection

Allot’s Traffic Intelligence and Assurance solution for Enterprises helps to ensure
network and application availability.
The Allot platform can be deployed at the center of the network, so it sees the traffic
going from the LAN to the Internet and the public cloud, as well as traffic which is
coming from the outside going towards the private cloud. So with one centralized
solution we can control all traffic coming in and going out of the network and ensure
the availability of both the network and the applications that run over it.
Alternatively, the Allot platform can be deployed at the edge of each branch for
greater visibility of the network users.
The Allot solution can also provide real-time troubleshooting capabilities that can
help IT managers to understand in real-time how to optimize the network according
to patterns of usage.
Allot assures delivery of high-quality applications and digital experience of on-line
services with one centralized appliance and also guarantees optimal QoE for remote
users, which is very relevant when employees are working from home.
And finally Allot platform protects business continuity through Behavior Anomaly
Detection. It can identify both incoming DDoS attacks and outgoing anomalous traffic.

6
Module 1: Introduction

• About Allot

• Core Technology

• Placement in Network

• Allot Architecture

In this section we will introduce the core “DART” technology, that lies at the heart of
Allot’s solutions.

ACTE (Enterprise Track) 7


Module 1: Introduction

Core Technology

SPI - Shallow Packet Inspection

DPI - Deep Packet Inspection

DART - Dynamic Actionable Recognition Technology

“DART” stands for Dynamic Actionable Recognition Technology. It is Allot’s enhanced


version of Deep Packet Inspection, which itself evolved from the shortcomings of the
“shallow packet inspection” carried out by standard network equipment. We will
review these terms in more detail now.

ACTE (Enterprise Track) 8


Module 1: Introduction

The 7 Layer model (OSI)

(TCP/UDP Port)

(IP Address)

(MAC Address)

Lets go back to the basics. The OSI model provides a conceptual understanding of
networking. It is a reference model that characterizes and standardizes the
communication functions of a telecommunication or computing system. The model
partitions a communication system into several abstract layers. The original version of
the model defined seven layers.

Each layer adds its own header information. As the data travels down through the
layers, it is encapsulated with a new header. At the network access layer, a trailer is
also added.

ACTE (Enterprise Track) 9


Module 1: Introduction

Shallow Packet Inspection (SPI)

(TCP/UDP Port)

(IP Address)

(MAC Address)

Header info reveals 10


communication intent

Standard shallow packet inspection is performed by many different types of devices


in today’s networks.

This technique looks into the packet header to reveal communication intent.
Some applications can be detected simply by identifying the port over which
communication takes place (e.g: port 80 for HTTP).
Many others though, hide their identity in the payload itself. They may use a range of
different ports, and may “hijack” ports which are commonly associated with other
applications such as port 80.

ACTE (Enterprise Track) 10


Module 1: Introduction

Deep Packet Inspection (DPI)

(TCP/UDP Port)

(IP Address)

(MAC Address)

Header info reveals Payload info reveals 11


communication intent application signature

Deep packet inspection looks deep into the payload to search for application
signatures.
They may be spread over several packets or encrypted.

ACTE (Enterprise Track) 11


Module 1: Introduction

DPI Patterns Over Time

Signature found
in several packets

Information regarding connection state

12

Deep packet inspection uses sophisticated techniques of behavioral and temporal


analysis to look for recurring patterns over time.

ACTE (Enterprise Track) 12


Module 1: Introduction

Next Generation DPI Engine

Advanced Data Classification


Inline Encrypted traffic
• >1100 applications
Analysis • Dedicated data science
• Powered by Allot’s core researchers - constant updates
technology – 20+ years Dynamic • Detection logic based on
technology development & heuristics, rules per multiple
enhancements Application data-set
• Customized application
Recognition recognition

Technology
Always up-to-date (DART) ML & AI Technology
• Periodic definition files update • Next generation DPI
• Assure up-to-date powered by ML
apps/protocol classifications algorithm
• Supervised and
Unsupervised Learning
models

13

Allot’s Dynamic Application Recognition Technology (DART) is a mature in-line


technology, which uses the Deep Packet Inspection techniques described earlier to
analyze and detect traffic as it runs through the network in real-time. As this traffic is
often encrypted, Allot’s DART engine uses detection logic based on heuristics, and
rules based on multiple data-sets. It also employs next-generation machine learning
algorithms to ensure both supervised and unsupervised learning models.
The DART engine recognizes over 1100 applications today, with definition files
constantly being updated to ensure that the classification of apps and protocols is
constantly up to date.

ACTE (Enterprise Track) 13


Module 1: Introduction

DART - Dynamic Actionable Recognition Technology


See, Control, Secure

See Control
Constantly see, record and understand
Not just inspect. Act!
your network Apply QoS policies via NetXplorer Management Module
Viewed via ClearSee Management Module

User Application QoE Shape Steer Expedite Block

Allot’s DART Engine Embedded in Allot Platform

14

See refers to the ability to see, record, understand and share information about the
traffic on your network, as well as your users and their needs and habits. Allot’s DPI
Engine gathers and processes information on your users, the applications and devices
they use and the Quality of Experience they are enjoying. This information is then
used by ClearSee to create meaningful, clear and insightful graphs and reports to
explain and impart that data in a useful way.

Control refers to the different types of action one can choose to apply to a traffic flow
once it has been seen, using Allot NetXplorer.
You choose the action that most fits your network’s needs. You can shape traffic by
assigning it a designated Quality of Service (QoS), you can steer traffic to a network or
subscriber service, optimize video traffic to offer a better quality of experience,
expedite important and sensitive traffic or you can choose to drop a particular type of
traffic altogether. The control over your network is in your hands.

ACTE (Enterprise Track) 14


Module 1: Introduction

DART - Dynamic Actionable Recognition Technology


See, Control, Secure

Secure
Protect your users and customers as well as your valuable data.
Add security options and protection of your network by using NetworkSecure and DDoS Secure products

Content Anti Anti DDoS Botnet


Filter Phishing Virus Mitigation Containment

Enabled by Allot Secure Enabled by DDoS Secure

* Covered in in AWSE course * Covered in in CDSA course

15

Secure refers to the ability to protect your users and customers as well as your
valuable data.
You can filter traffic to block or restrict harmful content as well as stopping phishing
attempts and viruses by including Allot Secure in your solution. You can also add
protection from DDoS attacks and Botnet infections to your network. This capability is
enabled by the DDoS Secure product.

ACTE (CSP Track) 15


Module 1: Introduction

• About Allot

• Core Technology

• Placement in Network

• Allot Architecture

16

In this section we will see where you should place the Allot System in the network.

ACTE (Enterprise Track) 16


Module 2: Allot Enterprise Platforms

Enterprise Network Diagram Example


Internet Apps
Private Cloud / DC
Campus / Branch

SAP,
Paris
Video VDI
Oracle

WAN/MPLS Users/Clients
Web, Email VoIP GW
Citrix Servers Network

Madrid

Fax Phone PBX

Users/Clients
HQ LAN

Users/Clients

At the LAN
LAN, WAN & Internet Junction 17

The location of the Allot Enterprise Platform will depend upon the traffic you want to
be able to analyze and manage. Here we see a typical network diagram of an
enterprise. The powerful and versatile SSG/SG can be placed at three different points
depending on your unique requirements:
• Placing the Allot at the edge of the private cloud and data center gives the IT
manager the ability to see and manage the campus (HQ employees) and all access
to essential applications.
• Placing the Allot before the primary Internet router gives the IT manager the ability
to see and manage the entire internet access to public cloud applications
(including business crucial applications) and other internet application, based on
the organization needs.
• Placing an Allot at each branch office gives the IT manager the ability to see and
manage the access to the internet for each branch, as well as traffic between the
different branches.

ACTE (Enterprise Track) 17


Module 1: Introduction

• About Allot

• Core Technology

• Placement in Network

• Allot Architecture

18

We will end this introductory module by introducing Allot’s typical solution


architecture for Enterprise customers.

ACTE (Enterprise Track) 18


Allot Enterprise Product Series

SSG Series
• The Allot Enterprise product series • For Medium and large
consists of: Enterprises
• 1Gbps – 40Gbps Throughput
• Centralized Mgm & HA
• ACG series • Virtual Edition
• SSG series
• SG series

ACG Series SG Series


• For SMB and SME
• For Large Enterprises
• 50Mbps – 2Gbps Throughput
• 50Gbps – 250Gbps
• Management Layer & Control
Throughput
Layer in one appliance
• Centralized
Mgm & HA

19

The Allot Enterprise product series consists of:


- ACG series is intended for Small/Medium Businesses (SMB) or Small/Medium
Enterprises (SME). The ACG covers throughput starting from 50Mbps up to 2Gbps.
The management components are embedded together with the inline platform in
a single 1U server.
- SSG series which starts from 1Gbps with SSG-200 and can go up to 40Gbps with
the SSG-600. This line of products are intended for medium and large enterprises.
The SSG is an inline platform and requires additional installation of the Centralized
Management which either can be installed on a virtual environment or on another
dedicated server.
- SG series completes the Allots offering for large enterprises with big data centers.
Covering throughput of 50Gbps with SG-9100 and up to 250Gbps with SG-9700.
This series is also deployed as an in-line appliance which, like the SSG, requires
additional installation of the centralized management on a virtual installation or on
another dedicated server.

19
Module 1: Architecture Overview

Allot Architecture for Enterprise


Medium and Large Enterprises SMB, SME

User Interface
Layer

Management
Server Layer

DART Layer

20

The Allot architecture for Enterprise market consists of three layers:


The DART layer. This is where you will find the platforms that have DPI capabilities
embedded. There may be several inline platforms (such as SG and SSG) in a single
deployment. These platforms implement the network management policies and
collect network usage data, directly from the physical lines.
The Management Server Layer. This incorporates the various Management Modules,
which can be housed in a single Allot Centralized Manager server or can be installed
separately on physical or virtualized hardware. The Allot Gateway Manager includes
compulsory management modules (NetXplorer, ClearSee, Data Mediator) and
optional management modules (SMP, NetworkSecure CM and DDoS Secure
Controller) depending on the use case required.
The Application Control Gateway (ACG) solutions combine all DART and Management
modules into a single appliance.
User Interface Layer. The user interface layer consists of the various clients used to
access the different management servers. The ClearSee and NetXplorer clients are
both compulsory. Depending on the use case, you may also have a NetworkSecure
and a DDoS Secure client.

ACPP Training 20
Module 1: Introduction

Review Question

Allot’s core technology is known as “DART”.


What does “DART” stand for?

Data Access Run Time

Disaster Assistance Response


Team
DART
Daily Average Revenue Trades

Dynamic Actionable
Recognition Technology

21

Allot’s core technology is known as “DART”. What does “DART” stand for?

ACTE (CSP Track) 21


Module 1: Introduction

Review Question
Match the Allot Enterprise Platform
with its Throughput

SSG 1Gbps – 40Gbps

ACG 40Gbps – 250Gbps

SG 50Mbps – 2Gbps

22

Match the Allot Enterprise Platform with its throughput.

ACTE (Enterprise Track) 22


Module 1: Introduction

Thank You

23

ACTE (Enterprise Track) 23

You might also like