Отправить запрос

Scat SCAT "THE SYSTEM OF TRAFFIC CONTROL AND ANALYSIS"

Functionality of SCAT is shared between 3 licenses:

OPTIONS

ENTRY

BASE

COMPLETE

Bypass support

Filtering according to the register of blacklisted sites

Collection and analysis of statistics on protocols and destinations


Marking the traffic priority based on protocol


Optimization of the use of external access channels


Notification of subscribers


Lawful interception


Distribution of the band between subscribers



Blocking and replacement of advertising



White list and Captive Portal



Protection against DOS and DDOS attacks



Caching

Licensed separately

Basic SCAT work schemes:

SCAT work scheme - in break

SCAT work scheme - asymmetric

SCAT work scheme - mirroring

The use of other work schemes is also possible, for further details, please, register on our website

SCAT options:

Bypass support

Supported functionality of cards with integrated bypass, which ensures the network functioning in case of installation of the system "in break" or asymmetrically in the following situations:

  • hardware malfunction
  • the absence of power
  • software errors
  • maintenance works

Filtering according to the register of blacklisted sites

Features

Uploading the register of Roskomnadzor (FZ-139, FZ-187, FZ-398)

Possibility of using the request signed by personal electronic signature

Uploading the federal list of extremist materials of the Ministry of Justice of the Russian Federation (FZ-114)

Filtering according to the own list of operator

Support of the centralized own list of operator for server cluster

Support of connection schemes

Possibility to control filtering according to specific users

Blocking of traffic http/https

Support for http redirect to the information page

Possibility of collecting statistics of the blocked pages

Possibility of monitoring download lists and filtering

The maximum volume of the list

Description

centralized, cloud service

Yes, located on the cloud

centralized, cloud service

Yes

Yes

in break, asymmetric, mirroring

Yes

Yes

Yes

Yes

Yes

to 4bn. URL

According to independent tests, the lock mode is defined as "full dpi" and includes blocking of unencrypted proxy, ssl on CN certificate, which makes it impossible to bypass blocking by using CDN.

Collection and analysis of statistics on protocols and destinations

Collection and analysis of statistics on protocols and destinations

Provided analytical information under the protocol Netflow, for the following characteristics:

  • Band allocation according to application protocols
  • Band allocation according to autonomous systems (AS)
  • Uploading of the total information into the billing by classes for each subscriber
  • Uploading of the full netflow by subscribers

All specified modes can operate simultaneously. Use of the summary information for billing by classes for each subscriber allows to tariff separately sip, skype, and bittorrent traffic.

Marking the traffic priority based on protocol

SCAT DPI alllows to change the priority field in packets passed through it, depending on the detected DPI protocol.

The following fields are supported:

  • DSCP / TOS in IP packet header
  • priority in the header of VLAN and QinQ packets
  • traffic class in header of MPLS packets

Router or shaper can use marking in the priority field to ensure the required QOS for specific protocols, even without having the own DPI features.

Optimization of the use of external access channels

Optimization of the use of external access channels

SCAT DPI allows to limit the size of the occupied band by protocol groups. This mechanism is often applied for limiting torrents.

Доступны два механизма на выбор:

  • Band limitation with burst support in the style of classical token bucket
  • Band limitation with borrowing in Linux HTB style

Notification of subscribers

This option allows to notify subscribers about new offers of the operatoror or to alert about planned works in the network.

At service activation by the operator, the subscriber moving to an arbitrary start page gets the operator's information page instead, where the operator can place the necessary information, the order service button, a chat window, or support call button and a link to move to the site requested by the user. Information about the made transition is stored in SCAT DPI, which ensures absence of "molestation" of showing this information page to the subscriber.

Use of subscriber notification option allows to significantly increase the penetration of the existing services of the operator and thereby increase ARPU.

Lawful interception

This option allows:

  • to transmit clickstream in a real time mode to analytical system under IPFIX  protocol, or to save locally as a file
  • to save traffic dump as PCAP file according to protocols for the selected IP or  fully

Distribution of the band between subscribers

This option allows:

  • to limit the traffic bandwidth in accordance with subscriber's tariff plan
  • to control the rules on per-subscriber's level, to prioritize traffic according to the classes to improve QoS, to limit the torrent traffic
  • to prescribe the uniform rules for corporate subscribers with a group of IP addresses
  • for operators having subscriber access technology PPPoE, the use of this option eliminates the need for BRAS.

Blocking and replacement of advertising

Replacement or blocking of advertising content option provides a mechanism of functionality implementation allowing to selectively modify the contents of WWW pages of sites that contain banner ads, and manage provision of this service at the level of individual subscribers.

Possible application areas:

  • Provision of advertising content blocking services to subscribers
  • Monetizing free WiFi points
  • Social Internet

White list and Captive Portal

The white list allows to limit the available for the subscriber websites and pages and performs forwarding of subscriber to the predetermined page when attempting to go beyond this list.

Application areas:

  • Blocking of subscriber at zero balance account, with the ability to pay debts through the authorized payment systems
  • Organizing the user identification in WiFi networks, provision of defined user actions in WiFi network for access
  • Work on the white list of sites at the same time is combined with restriction of work on the list of protocols on the level of subscriber

Caching

Cache server connection diagram

It provides up to 30% savings on uplink channels, and fast delivery of video/audio content to the end user without the annoying lags, increasingQoE.

Automatic connection of media player browser to high-definition video for popular services.

Supported caching for such Internet services as vKontakte, Youtube, rutube, and Windows updates.

Protection against DOS and DDOS attacks

SCAT DPI provides the following mechanisms to counter DoS and DDoS:

  • Protection against TCP SYN Flood
  • Protection against fragmented UDP Flood
  • Protection against DDoS ( LOIC etc.) based on the Turing Test (Human Detection)
  • Dynamic bandwidth management, from common and to the individual IP
  • Prioritization according to protocols of the common band and individual IP

WANT TO LEARN MORE ABOUT OUR PRODUCTS?
SEND YOUR REQUEST!