Sunday, December 4, 2005

Reef Point Adds UMA Test Tools for its Security Gateway

Reef Point Systems, which supplies a massively scalable security gateway for the fixed mobile convergence market, introduced a suite of Unlicensed Mobile Access (UMA) test tools for production-scale implementations of UMA based on the IKEv2 protocol.

Reef Point said it developed the iQ UMA Test Suite to fully stress and validate UMA implementations including simulating hundreds of thousands of mobile station endpoints and exercising the entire authentication infrastructure at scale.

Reef Point's control and data plane test suite, which runs on its security gateway platform, tests IPsec tunnel scalability and IKEv2 negotiation rate, simulates IKEv2 DoS attacks and performs line rate traffic forwarding across IPsec tunnels. Service providers can test deployment-specific scenarios with a variety of configuration options including rate-configurable tunnel setups and teardowns. Formatted reporting enables fast and accurate interpretation of results. The new suite supports the complete UMA/GSM infrastructure including authentication with RADIUS servers, accessing the GSM databases Visitor's Location Register (VLR) and Home Location Register (HLR) as well as load testing access to UNC services over secure IPsec tunnels.

  • Reef Point Systems' UMA Security Gateway scales to as many as half a million simultaneous connections. The gateway provides secure WiFi roaming and provides subscribers with confidentiality by encapsulating the call and signaling data in secure IPSec tunnels. It provides robust threat defense including stateful firewalls with Denial of Service attack prevention, intrusion detection services, custom firewall filtering, dynamic virtual routing with Network Address Translation, and session limiting to protect against external threats. The Multiservice Security Gateway supports Internet Key Exchange v2 (IKEv2) and Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM) to provide scalable mutual authentication, encryption and data integrity safeguards for signaling, voice, and data.

See also