Stingray Service Gateway
Determining over 6000 protocols.
Support for the following operation modes: in-line, using routing asymmetry in outgoing traffic, and traffic mirroring mode.
Subscriber management with dynamic IP-addressing and with multiple IP addresses.
Possibility to scale the solution to provide traffic handling up to 3.84 Tbit/s.
It is also possible to implement other operation modes. For more detailed information, please submit a request on our website.
In-line mode implies the platform to be connected between the border router and termination device (BNG/BRAS). Fault tolerance is provided by the bypass function supported by Silicom networking bypass adapters.
Mode using routing asymmetry in outgoing traffic is used when facing challenges of filtering only web traffic based on policy-based routing.
Traffic mirroring mode using SPAN ports or optical splitters.
Independent software platform
Standard hardware powered by Intel Xeon is used as a hardware platform to install the Stingray SG. It makes ISP independent from a particular equipment supplier, helps to reduce the value of capital costs, and to scale flexibly the solution power depending on the business requirements.
Broad scope of application
The Stingray platform can be used by telecom operators, Internet service providers, marketing agencies, user behavior study centers, search engines, and contextual advertising services.
Large set of features
Besides traffic inspection and classification, the platform allows to implement additional functions:
- Real time analytics
- Сhannel allocation between subscribers and the total bandwidth management (QoS)
- Informing subscribers, advertising
- Protection against DOS and DDoS attacks.
Advanced technology of traffic analysis and filtration
Stingray platform parses all the packets passing through it up to the 7th level of the OSI model, instead of just using information about standard port numbers.
By performing behavioral (heuristic) traffic analysis, Stingray recognizes applications that do not use previously known headers and data structures to exchange data.
As an example the p2p (Bittorrent) protocol can be considered: a packet sequence analysis based on their similarities as well as a set of signatures matching to similar applications are used to identify traffic.