Affirmed Networks* virtualized Evolved Packet Core (vEPC)

May 5, 2019

A virtualized Evolved Packet Core (vEPC) enables Communication Service Providers to reduce cost by moving core network components of the Long-Term Evolution (LTE) network from high-cost dedicated hardware to low-cost commercial off-the-shelf (COTS) servers. This document illustrates the high performance of the Affirmed Networks virtualized Evolved Packet Core (vEPC) solution on 2nd Generation Intel® Xeon® Platinum 8280L processors (formerly codenamed Cascade Lake). The test results achieved a throughput of up to 168 Gbps and a packet rate of up to 29 Mpps on dual-socket servers powered by these Intel® Xeon® Platinum 8280L processors, using Intel® XXV710 25G NICs.

Spotlight

Login Consultants

Login Consultants is the IT workspace specialist in virtualization, migration, support, desktop deployment and application delivery. We are experts in these areas for the technologies of Microsoft, Citrix and VMware. Login Consultants offers consultancy, implementation and support services, to help its customers maximize the benefits from technical innovations for traditional and hosted desktops, application virtualization and server virtualization.

OTHER WHITEPAPERS
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 12, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 3, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. The following trends are making organizations reassess their approach to security:

Read More
news image

IPsec VPN User Guide

whitePaper | September 15, 2022

For each VPN tunnel, both AH and ESP tunnel sessions are installed on Services Processing Units (SPUs) and the control plane. Tunnel sessions are updated with the 7 protocol on is completed. For SRX5400, SRX5600, and SRX5800 devices, tunnel sessions on anchor SPUs are updated with the protocol while non-anchor SPUs retain ESP and AH tunnel sessions. ESP and AH tunnel sessions are displayed in the outputs.

Read More
news image

Zero Trust Network Access (ZTNA) and its Adoption

whitePaper | June 14, 2022

The complexity and cost of ensuring network security and remote access for employees and key business partners can overwhelm smaller businesses. Higher cloud adoption, a distributed workforce, mobile employees, the proliferation of Internet of Things (IoT) devices, and increasingly sophisticated cyberattacks make traditional methods of ensuring secure communications across your organization overly complex and expensive. Zero Trust Network Access (ZTNA) reduces the surface area for attack by following zero trust tenets to provide access to applications. ZTNA from OpenVPN Cloud creates a private, secure overlay network for businesses, which connects all of their applications, private networks, workforce, and IoT devices together without needing to own and manage a multitude of complex and hard-to-scale security and data networking gear.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | March 23, 2023

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

New Data Sources and Innovative AI Are Redefining the Business of Lending

whitePaper | December 5, 2022

The business of lending money is rapidly changing. Innovative technology, fueled by expanding data and artificial intelligence (AI), is redefining borrowing. Traditional lenders, as well as alternative sources such as nonbank and "buy now, pay later" (BNPL) providers, are reimagining how

Read More

Spotlight

Login Consultants

Login Consultants is the IT workspace specialist in virtualization, migration, support, desktop deployment and application delivery. We are experts in these areas for the technologies of Microsoft, Citrix and VMware. Login Consultants offers consultancy, implementation and support services, to help its customers maximize the benefits from technical innovations for traditional and hosted desktops, application virtualization and server virtualization.

Events