Blog

Automating BRAS configuration using Ansible
In recent years, automation has become an integral part of effective network infrastructure management. One of the key elements of such infrastructure is the BNG (Broadband Network Gateway), responsible for subscriber connection management, traffic routing, and other critical functions. However, configuring and maintaining a BNG can be a complex and time-consuming task, especially when managing scalable or constantly changing networks.

The BNG Solutions Market: Prospects for Internet Service Providers and Telecom Operators
In this article, we dive into a deeper analysis of a key element of telecommunications networks — server-level equipment, specifically BNG (Broadband Network Gateway). We will explore what BNG is, its functions, and the features of modern solutions available on the market for internet providers and telecom operators.

How to replace Sandvine and ensure secure network management with DPI
Following Sandvine’s withdrawal from several markets, telecom operators have been forced to seek alternative Deep Packet Inspection (DPI) solutions. Sandvine’s solutions were widely used for traffic filtering, network security, and regulatory compliance. Now, operators must quickly and seamlessly transition to alternative DPI solutions that can perform the same functions effectively.

Implementation of EPDG from VAS Experts in MVNO Miatel
The collaboration between Miatel and VAS Experts has been ongoing for several years. As part of this partnership, the mobile operator Miatel already utilizes VAS Experts' solutions, including NAT, DPI, and LBS. In early 2025, Miatel became the first operator to commercially launch WiFi Calling based on VAS Experts’ EPDG.

VAS Experts introduces solutions for Mobile operators: EPDG, LBS, and PCEF
VAS Experts, a company specializing in developing solutions for broadband operators, has expanded its product range with offerings for mobile networks. The new lineup includes EPDG, LBS, and PCEF.

2024 Year-End Summary
The year has come to an end, which means it's time to reflect on our achievements. We are excited to share our milestones for 2024, a year that marked a significant phase in our growth and development.

Why IPv6 is Faster and How to Implement It: X-COM's Experience
IPv4 and IPv6 are essential components of the Internet, enabling data transfer between devices on a network. IPv4 became the primary addressing standard for the Internet during its time. However, with the increasing number of connected devices, its 32-bit address space proved insufficient to meet modern demands. To address this limitation, IPv6 was introduced, providing a significantly larger address space (128-bit addresses) and new features such as built-in security support, improved Quality of Service (QoS), auto-configuration, and many others.

From classical methods to neural networks: Exploring the potential of Deep Learning in identifying obfuscated traffic
Network traffic analysis and classification have become essential for maintaining the resilience and security of contemporary computer networks. With the rapid increase in data volumes and the growing complexity of encryption methods, the need for effective network flow classification continues to rise. By identifying, categorizing, and analyzing network traffic accurately, organizations can detect potential threats, optimize network performance, and ensure compliance with security protocols.

Digest July-September 2024
The summer and early fall brought interesting news and updates. In this digest, we've compiled the most important events and helpful articles to keep you informed about our latest developments.

Solutions for data centers and Autonomous System Numbers (ASN) from VAS experts
Protecting against cyberattacks and maintaining a stable network infrastructure are critical for data centers. Data centers face many threats, including DDoS attacks such as TCP SYN floods that can overload servers and disrupt services. In this article, we will examine how VAS Experts' Stingray Service Gateway (SSG) effectively handles such attacks based on real-world examples of its use.