SlideShare a Scribd company logo
1 of 10
Download to read offline
Deliver the ultimate network edge protection with
the ADVA FSP 150-XG118Pro (CSH)
May 2021
© 2021 ADVA. All rights reserved.
2
Emerging enterprise IT requirements
Cloud
connectivity
Enterprise sites
Private, public, or hybrid cloud
Hosting of data, appliances and VNFs
High availability for business continuity
Building trust with extensive security features
Cloud data centers
Offloading storage and general applications
Latency-sensitive IoT applications stay on site
Wireless on-site access using private mobile
Sensitive data over public cloud access links
Enterprise sites
Similar transformation with manufacturing, retail stores, finance, governments ...
Cloud
data
center
© 2021 ADVA. All rights reserved.
3
Emerging enterprise IT requirements
Cloud
connectivity
Agility and simplification
Automation and IoT
Cloud-centric
Software-defined networking,
virtualization
Precise synchronization,
virtualization, mobile access
Faster cloud access,
secure networking
Cloud
data
center
Enterprise sites
© 2021 ADVA. All rights reserved.
4
From function-specific hardware to software agility with NFV and secure NID
Simplifying connectivity with powerful demarcation
Ethernet
connectivity
service
CE
router
NID
Fire-
wall
Secure, encrypted IP connectivity with
demarcation featuring L3 capabilities
Virtual firewall/router collapsing site
hardware on single secure node
© 2021 ADVA. All rights reserved.
5
More value at the network edge
Automated
testing
Local data processing,
industrial automation
Performance
monitoring
Video
transcoding
Firewall
Encryption Virtual network
functions
Use plane function
/ MEC
FSP 150-XG118Pro (CSH)
Virtual network functions
• Hosing of VNFs at cell site
• Local processing of user
data for low latency and less
backhaul traffic
Physical network functions
• Tamper-protected design
• Accurate timestamping and
synchronization features
• Hardware acceleration and
performance assurance
10Gbit/s I-Temp CSGW (URLLC-ready)
© 2021 ADVA. All rights reserved.
6
• FPGA-based AES
encryption engine
• 80Gbit/s line rate
forwarding and
encryption
• MACsec transformation
with VLAN bypass on all
traffic ports
• Up to 128 secure flows
• IPSec-ready
MACsec with VLAN bypass
Hardware-based encryption engine
FSP 150-XG118Pro (CSH)
MACsec-enabled ports
(8x 1/10GbE)
80Gbit/s full-duplex
encryption engine
© 2021 ADVA. All rights reserved.
7
Benefits of a cross-product
crypto sub-module:
• Provides consistent
library of crypto services
to the host platforms
• Isolates sensitive
information from the
host’s CPU
• Offloads time-consuming
cryptographic operations
Isolation of sensitive information from the host’s CPU
Crypto sub-module (CSM) and physical security
FSP 150-XG118Pro (CSH)
Physical security with tamper
detection and response
Built-in CSM
Crypto boundary
© 2021 ADVA. All rights reserved.
8
Meeting demand of even the most mission-critical applications
FSP 150-XG118Pro (CSH)
Use case: making data-sensitive edge sites secure
Software appliances
Edge-NVF with
hardware-based MACsec
1/10G MACsec
Public Ethernet
service
Ultimate security
• Protecting connectivity at low
network layer
• Complementing protection
with virtual security appliances
Versatile multi-technology
solution
• IP/Ethernet demarcation
• Highly accurate
synchronization
• Hosting of virtual network
functions
© 2021 ADVA. All rights reserved.
9
Summary
The ultimate 10G demarcation device, combining NFV, security, synchronization and IP
In-service upgradable, powerful multi-layer
demarcation device
Pluggable server for edge hosting of VNFs
and end-customer appliances
Hardware-based encryption securing network
connection at line rate
Environmentally hardened design
High-performance, hardware-based
synchronization
Thank you
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation,
direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA.
www.adva.com | info@adva.com

More Related Content

What's hot

Introducing G.metro
Introducing G.metroIntroducing G.metro
Introducing G.metroADVA
 
Transforming network operations with Ensemble Controller
Transforming network operations with Ensemble ControllerTransforming network operations with Ensemble Controller
Transforming network operations with Ensemble ControllerADVA
 
5G is more than a new radio - network slicing
5G is more than a new radio - network slicing5G is more than a new radio - network slicing
5G is more than a new radio - network slicingADVA
 
FSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell eraFSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell eraADVA
 
Transforming optical networking with AI
Transforming optical networking with AITransforming optical networking with AI
Transforming optical networking with AIADVA
 
Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...
Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...
Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...ADVA
 
New FSP 3000 TeraFlex™ capabilities dramatically boost network capacity
New FSP 3000 TeraFlex™ capabilities dramatically boost network capacityNew FSP 3000 TeraFlex™ capabilities dramatically boost network capacity
New FSP 3000 TeraFlex™ capabilities dramatically boost network capacityADVA
 
The 400G transition
The 400G transitionThe 400G transition
The 400G transitionADVA
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud ADVA
 
Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...ADVA
 
Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...
Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...
Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...ADVA
 
Back to the future with simple wholesale services now
Back to the future with simple wholesale services nowBack to the future with simple wholesale services now
Back to the future with simple wholesale services nowADVA
 
Introducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro SeriesIntroducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro SeriesADVA
 
ADVA Disaggregated NOS
ADVA Disaggregated NOSADVA Disaggregated NOS
ADVA Disaggregated NOSDan Dovolsky
 
OSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart citiesOSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart citiesADVA
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016Daniel Sproats
 
Taking MicroMux to the edge and the core
Taking MicroMux to the edge and the coreTaking MicroMux to the edge and the core
Taking MicroMux to the edge and the coreADVA
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services SecureADVA
 
Announcing Ensemble SmartWAN: Optimized secure networking solution
Announcing Ensemble SmartWAN: Optimized secure networking solutionAnnouncing Ensemble SmartWAN: Optimized secure networking solution
Announcing Ensemble SmartWAN: Optimized secure networking solutionADVA
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsADVA
 

What's hot (20)

Introducing G.metro
Introducing G.metroIntroducing G.metro
Introducing G.metro
 
Transforming network operations with Ensemble Controller
Transforming network operations with Ensemble ControllerTransforming network operations with Ensemble Controller
Transforming network operations with Ensemble Controller
 
5G is more than a new radio - network slicing
5G is more than a new radio - network slicing5G is more than a new radio - network slicing
5G is more than a new radio - network slicing
 
FSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell eraFSP 150-GO102Pro Series: Redefining demarcation for the small cell era
FSP 150-GO102Pro Series: Redefining demarcation for the small cell era
 
Transforming optical networking with AI
Transforming optical networking with AITransforming optical networking with AI
Transforming optical networking with AI
 
Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...
Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...
Introducing the industry’s first commercial 25Gbit/s Carrier Ethernet demarca...
 
New FSP 3000 TeraFlex™ capabilities dramatically boost network capacity
New FSP 3000 TeraFlex™ capabilities dramatically boost network capacityNew FSP 3000 TeraFlex™ capabilities dramatically boost network capacity
New FSP 3000 TeraFlex™ capabilities dramatically boost network capacity
 
The 400G transition
The 400G transitionThe 400G transition
The 400G transition
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...Automated and secure service activation at the network edge with zero touch p...
Automated and secure service activation at the network edge with zero touch p...
 
Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...
Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...
Live demo of low-latency and timing-accurate mobile x-haul based on SDN-enabl...
 
Back to the future with simple wholesale services now
Back to the future with simple wholesale services nowBack to the future with simple wholesale services now
Back to the future with simple wholesale services now
 
Introducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro SeriesIntroducing the ADVA FSP 150-GE110 Pro Series
Introducing the ADVA FSP 150-GE110 Pro Series
 
ADVA Disaggregated NOS
ADVA Disaggregated NOSADVA Disaggregated NOS
ADVA Disaggregated NOS
 
OSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart citiesOSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart cities
 
5G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 20165G: Why Wait? - 5G Observatory 2016
5G: Why Wait? - 5G Observatory 2016
 
Taking MicroMux to the edge and the core
Taking MicroMux to the edge and the coreTaking MicroMux to the edge and the core
Taking MicroMux to the edge and the core
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services Secure
 
Announcing Ensemble SmartWAN: Optimized secure networking solution
Announcing Ensemble SmartWAN: Optimized secure networking solutionAnnouncing Ensemble SmartWAN: Optimized secure networking solution
Announcing Ensemble SmartWAN: Optimized secure networking solution
 
Mitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE SolutionsMitigating Security Risk in Practical vCPE Solutions
Mitigating Security Risk in Practical vCPE Solutions
 

Similar to Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (CSH)

Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
EarthLink Next Generation Cloud Brochure
EarthLink Next Generation Cloud BrochureEarthLink Next Generation Cloud Brochure
EarthLink Next Generation Cloud BrochureEarthLink Business
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G NetworksPaul Bradley
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalablePallavi Vyas
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANNetworkCollaborators
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceADVA
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
LCU13: Networking Summit Keynote
LCU13: Networking Summit KeynoteLCU13: Networking Summit Keynote
LCU13: Networking Summit KeynoteLinaro
 
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...NetworkCollaborators
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_finalLan & Wan Solutions
 
Military Edge Computing with Vault and Consul
Military Edge Computing with Vault and ConsulMilitary Edge Computing with Vault and Consul
Military Edge Computing with Vault and ConsulMitchell Pronschinske
 
IoT Tech Expo 2023_Marcelo Pasin presentation
IoT Tech Expo 2023_Marcelo Pasin presentationIoT Tech Expo 2023_Marcelo Pasin presentation
IoT Tech Expo 2023_Marcelo Pasin presentationVEDLIoT Project
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
 
How 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTHow 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTQualcomm Research
 

Similar to Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (CSH) (20)

Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
EarthLink Next Generation Cloud Brochure
EarthLink Next Generation Cloud BrochureEarthLink Next Generation Cloud Brochure
EarthLink Next Generation Cloud Brochure
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G Networks
 
FlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely ScalableFlexiCloud: Infinitely Scalable
FlexiCloud: Infinitely Scalable
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Our Portfolio
Our PortfolioOur Portfolio
Our Portfolio
 
Our Portfoli GF
Our Portfoli GFOur Portfoli GF
Our Portfoli GF
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
LCU13: Networking Summit Keynote
LCU13: Networking Summit KeynoteLCU13: Networking Summit Keynote
LCU13: Networking Summit Keynote
 
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
Cisco Connect 2018 Thailand - Cisco SD-WAN next generation wan to power your ...
 
Software defined security-framework_final
Software defined security-framework_finalSoftware defined security-framework_final
Software defined security-framework_final
 
Military Edge Computing with Vault and Consul
Military Edge Computing with Vault and ConsulMilitary Edge Computing with Vault and Consul
Military Edge Computing with Vault and Consul
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
IoT Tech Expo 2023_Marcelo Pasin presentation
IoT Tech Expo 2023_Marcelo Pasin presentationIoT Tech Expo 2023_Marcelo Pasin presentation
IoT Tech Expo 2023_Marcelo Pasin presentation
 
FortiGate_600E(2).pdf
FortiGate_600E(2).pdfFortiGate_600E(2).pdf
FortiGate_600E(2).pdf
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
 
How 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoTHow 5G Will Transform Industrial IoT
How 5G Will Transform Industrial IoT
 

More from ADVA

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureADVA
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ADVA
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareADVA
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingADVA
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkADVA
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)ADVA
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networksADVA
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorADVA
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceADVA
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™ADVA
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environmentsADVA
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networksADVA
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum servicesADVA
 

More from ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (CSH)

  • 1. Deliver the ultimate network edge protection with the ADVA FSP 150-XG118Pro (CSH) May 2021
  • 2. © 2021 ADVA. All rights reserved. 2 Emerging enterprise IT requirements Cloud connectivity Enterprise sites Private, public, or hybrid cloud Hosting of data, appliances and VNFs High availability for business continuity Building trust with extensive security features Cloud data centers Offloading storage and general applications Latency-sensitive IoT applications stay on site Wireless on-site access using private mobile Sensitive data over public cloud access links Enterprise sites Similar transformation with manufacturing, retail stores, finance, governments ... Cloud data center
  • 3. © 2021 ADVA. All rights reserved. 3 Emerging enterprise IT requirements Cloud connectivity Agility and simplification Automation and IoT Cloud-centric Software-defined networking, virtualization Precise synchronization, virtualization, mobile access Faster cloud access, secure networking Cloud data center Enterprise sites
  • 4. © 2021 ADVA. All rights reserved. 4 From function-specific hardware to software agility with NFV and secure NID Simplifying connectivity with powerful demarcation Ethernet connectivity service CE router NID Fire- wall Secure, encrypted IP connectivity with demarcation featuring L3 capabilities Virtual firewall/router collapsing site hardware on single secure node
  • 5. © 2021 ADVA. All rights reserved. 5 More value at the network edge Automated testing Local data processing, industrial automation Performance monitoring Video transcoding Firewall Encryption Virtual network functions Use plane function / MEC FSP 150-XG118Pro (CSH) Virtual network functions • Hosing of VNFs at cell site • Local processing of user data for low latency and less backhaul traffic Physical network functions • Tamper-protected design • Accurate timestamping and synchronization features • Hardware acceleration and performance assurance 10Gbit/s I-Temp CSGW (URLLC-ready)
  • 6. © 2021 ADVA. All rights reserved. 6 • FPGA-based AES encryption engine • 80Gbit/s line rate forwarding and encryption • MACsec transformation with VLAN bypass on all traffic ports • Up to 128 secure flows • IPSec-ready MACsec with VLAN bypass Hardware-based encryption engine FSP 150-XG118Pro (CSH) MACsec-enabled ports (8x 1/10GbE) 80Gbit/s full-duplex encryption engine
  • 7. © 2021 ADVA. All rights reserved. 7 Benefits of a cross-product crypto sub-module: • Provides consistent library of crypto services to the host platforms • Isolates sensitive information from the host’s CPU • Offloads time-consuming cryptographic operations Isolation of sensitive information from the host’s CPU Crypto sub-module (CSM) and physical security FSP 150-XG118Pro (CSH) Physical security with tamper detection and response Built-in CSM Crypto boundary
  • 8. © 2021 ADVA. All rights reserved. 8 Meeting demand of even the most mission-critical applications FSP 150-XG118Pro (CSH) Use case: making data-sensitive edge sites secure Software appliances Edge-NVF with hardware-based MACsec 1/10G MACsec Public Ethernet service Ultimate security • Protecting connectivity at low network layer • Complementing protection with virtual security appliances Versatile multi-technology solution • IP/Ethernet demarcation • Highly accurate synchronization • Hosting of virtual network functions
  • 9. © 2021 ADVA. All rights reserved. 9 Summary The ultimate 10G demarcation device, combining NFV, security, synchronization and IP In-service upgradable, powerful multi-layer demarcation device Pluggable server for edge hosting of VNFs and end-customer appliances Hardware-based encryption securing network connection at line rate Environmentally hardened design High-performance, hardware-based synchronization
  • 10. Thank you IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. www.adva.com | info@adva.com