This is an old revision of the document!
In order to follow requirements of Federal laws 139 and 114, an operator has to block WEB pages that contain illegal information. These pages are defined by lists formed by Federal Supervision Agency for Information Technologies and Communications and Department of Justice.
Our solution helps operator to save on development and support of his own solution. Our solution has several advantages compared to proxy server. Additionally, the operator gets the platform that enables him to save resources and get an income by providing new additional services.
Required components:
- Deep Traffic Analysis Platform (DPI)
Advantages:
- Easy to use:
- all rules are applied at one place: on DPI platform;
- the platform loads and applies rules from lists by itself.
- Productivity:
- the list includes up to 4 billion URL. Its representation in memory is compressed;
- provides filtering of up to 2 million URL per second on one CPU kernel;
- traffic capacity up to 40 Gb per second per one CPU;
- unlimited scaling by simple installation of additional servers;
- propagation delay is less than 30 μs.
- Functionality:
- http and https support. Other protocols can be added;
- filtering for HTTP proxy is supported (including Opera Turbo/Mini);
- the software can consider or ignore the port number (i.e. block http://www.example.com и http://www.example.com:8080 together or separately);
- does not depend on IP address changes;
- redirection instead of blocking is supported for http;
- incapsulation of VLAN, QinQ, MPLS is supported;
- support of asymmetric traffic routes, including processing of outbound traffic only;
- support of mirrored traffic;
- provides many other useful capabilities, unlike dedicated filtering solutions.
- "Four nine's" reliability:
- works 24×7 with no breaks and service delays;
- uptime of the systems already installed is many months;
- the Bypass mode is supported to calm the operator.
- Cost saving:
- DPI runs on a general purpose computer;
- support costs are almost zero - everything is automated;
- no need to waste money and time to develop and support own solution;
- a proxy hardware would cost much more to achieve the similar traffic capacity.