METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MONITORING ENCRYPTED PACKET FLOWS WITHIN A VIRTUAL NETWORK ENVIRONMENT

    公开(公告)号:US20180351970A1

    公开(公告)日:2018-12-06

    申请号:US15608369

    申请日:2017-05-30

    申请人: Ixia

    IPC分类号: H04L29/06

    摘要: Methods, systems, and computer readable media for packet monitoring in a virtual environment are disclosed. According to one method executed at a virtual tap element residing in between a first virtual machine and a second virtual machine in a virtual network environment, the method includes obtaining cryptographic key information from either the first virtual machine or the second virtual machine and detecting an encrypted packet flow being communicated in the virtual network environment between the first virtual machine and the second virtual machine via the virtual tap element. The method further includes decrypting the encrypted packet flow using the cryptographic key information, generating a decrypted packet flow set comprising at least a portion of the decrypted packet flow, and sending the decrypted packet flow set to a packet analyzer.

    TCP connections resiliency system for testing networks in unstable environments

    公开(公告)号:US10116541B2

    公开(公告)日:2018-10-30

    申请号:US15046419

    申请日:2016-02-17

    申请人: Ixia

    IPC分类号: H04L12/26 H04L29/06 H04L29/08

    摘要: The subject matter described herein relates to methods, systems, and computer readable media for test system connection resiliency. In some examples, a method for testing a network device under test (DUT) includes exchanging a sequence of data packages over a transmission control protocol (TCP) connection between a client and a server and through the network DUT. The method includes storing client sequence identifiers and server sequence identifiers. The method includes synchronizing, in response to detecting an error on the TCP connection, the client and the server to a last data package exchanged prior to the error using the client sequence identifiers and the server sequence identifiers and resuming a test script at a next data package after the last data package exchanged prior to the error in the sequence of data packages.

    Methods, systems, and computer readable media for initiating and executing performance tests of a private network and/or components thereof

    公开(公告)号:US10110556B2

    公开(公告)日:2018-10-23

    申请号:US14574359

    申请日:2014-12-17

    申请人: Ixia

    摘要: Methods, systems, and computer readable media for initiating and executing a performance test of a private network and/or components thereof are disclosed. Methods and systems include a receiver endpoint in a private network, and a sender endpoint in a public network. The receiver endpoint initiates a transport layer connection with the sender endpoint. The sender endpoint allocates a port, binds to the port, and sends an Internet Protocol (IP) address and a port number over the transport layer connection. The receiver endpoint then sends a hole punch datagram from the private network to the public network to create a hole in a firewall that is separating the public and private networks. The sender endpoint receives the hole punch datagram and uses IP address and port information in the hole punch datagram to send test traffic through the hole in the firewall.

    In-Session Splitting Of Network Traffic Sessions For Server Traffic Monitoring

    公开(公告)号:US20180176189A1

    公开(公告)日:2018-06-21

    申请号:US15380143

    申请日:2016-12-15

    申请人: IXIA

    IPC分类号: H04L29/06 H04L12/26 H04L29/08

    摘要: Methods and systems are disclosed that provide in-session splitting of network traffic sessions for monitoring of traffic between network clients and network servers. This in-session splitting is based upon monitoring traffic sessions for one or more events and then initiating a proxied session based upon detection of the one or more events. For further embodiments, the creation of the proxied session is implemented based upon detection of a request for a secure link within the session traffic, and the proxied session is then implemented such that original session participants are not aware of the proxied session. The encrypted secure communications between the network client and the network server are split into two connections that decrypted and re-encrypted so that the contents of the secure link can be analyzed to identify network threats and/or other desired network related activities.

    Packet copy management for service chain processing within virtual processing systems

    公开(公告)号:US09838277B2

    公开(公告)日:2017-12-05

    申请号:US14750248

    申请日:2015-06-25

    申请人: IXIA

    发明人: Kristopher Raney

    摘要: Systems and methods are disclosed to provide packet copy management for service chain processing within virtual processing systems. A packet manager virtual machine (VM) controls access to shared memory that stores packet data for packets being processed by service chain VMs operating within a virtual processing environment. For certain embodiments, the packet manager VM is configured to appear as a destination NIC (network interface controller), and virtual NICs (vNICs) within the service chain VMs are configured to process packet data using pointers to access the packet data within the shared memory. Once packet data is processed by one service chain VM, the next service chain VM within the service chain is able to access the processed packet data within the shared memory through the packet manager VM. Once all service chain processing has completed, the resulting packet data is available from the shared memory for further use or processing.

    Latency-Based Timeouts For Concurrent Security Processing Of Network Packets By Multiple In-Line Network Security Tools

    公开(公告)号:US20170324778A1

    公开(公告)日:2017-11-09

    申请号:US15147125

    申请日:2016-05-05

    申请人: IXIA

    IPC分类号: H04L29/06 H04L12/26

    摘要: Latency-based timeouts are used for concurrent security processing by multiple in-line network security tools. A network system forwards secure network packets to the tools and uses latency-based timeouts with respect to the return of processed packets from the tools. Initially, the network system measures processing latencies for the tools and sets at least one timeout threshold based upon the processing latencies. The network system then receives an input packet from a network source, generates a timestamp, concurrently sends an output packet to the tools based upon the input packet, tracks return packets from the tools, and determines whether a timeout has occurred with respect to the timeout threshold based upon a difference between the timestamp and a current timestamp. If a timeout does not occur, a secure packet is forwarded to a network destination. If a timeout does occur, return packet tracking for the input packet is ended.