throbber
Product Specifications
`
`Interface Connections
`• Two 10/100 Mbps Half/Full Duplex Autosense Ethernet
`Interfaces with RJ-45 connectors
`
`Traffic Classification
`• Per flow by IP/MAC address (with IP range/subnet option),
`network protocols and TCP/UDP ports (with port range option)
`• Content inspection of HTTP header including: file type, URL,
`HTTP method and Host name
`• Protocol Authentication (HTTP)
`• TOS byte - DiffServ or IP Precedence bits
`• IP and non-IP (IP/MAC address) type traffic
`• Time of day/week/month/year
`
`QoS Enforcement
`• Hierarchy of policy rules with inbound/outbound traffic
`management
`• Minimum/maximum bandwidth enforcement per flow/VC/Pipe
`• Ten levels of priorities for VC/Pipe/connection
`• Per flow guaranteed bandwidth, burst rate, CBR (for connection)
`• Maximum number of connections per VC/Pipe
`• Priority per connection or per VC
`• Fairness between equal-level-priority traffic flows
`• Admission control with the following actions: accept by priority,
`reject, drop
`• ToS byte re-mark
`(in-profile bytes/out-of-profile bytes/admission control)
`• “Reserve-on-Demand” bandwidth for very high priority traffic
`
`Network Security
`• Access control - pass/reject/drop
`• Protection from Denial of Service (DoS) attacks
`
`Connection Control
`• Connection control including cache redirection and server load
`balancing (optional software packages)
`
`Configuration
`• Remote policy configuration via Web browser or Command
`Line Interface
`
`QoS Policy Management
`• Easy-to-manage, single-table view based on catalogs
`• Dynamic expansion of VCs/Pipes to multiple hosts
`• Host definition per LDAP query, DNS name, IP, MAC address
`• Policy distribution from primary NetEnforcer to other units
`
`Monitoring and Accounting
`• Monitoring - Top clients, top servers, top VCs, top Pipes and
`protocol distribution, VC/Pipe distribution, number of connections,
`utilization, dropped packets, bandwidth usage (inbound/outbound)
`with 30-second granularity and storage of historical data from
`the last 6 months
`• Accounting (via Optional NetAccountant) - In-box accounting
`of traffic per session for all sessions; accounting using RADIUS
`server; powerful report generator; ODBC interface for external
`applications
`• SNMP - support statistics collection per VC/Pipe using SNMP-
`based tools and presentation by MRTG and other graphic tools
`
`Fail-Safe Performance
`• Hardware bypass
`• Full redundancy support (dual configuration with hot-standby
`and policy distribution)
`
`Network Standards Support
`• COPS, LDAP, DiffServ/TOS (RFCs 2474, 2475, 2597, 2598),
`IP Precedence (RFC 791), SNMP, RADIUS, and ODBC
`
`Browser Support
`• MS Internet Explorer 5.01, 5.5
`• Netscape Navigator 4.5, 4.6, 4.7, 6.0
`
`Dimensions
`• Standard 1U by 19-inch, rack mountable
`• Height: 1.73 in. (43.3 mm), Width: 17.22 in. (437.5 mm),
`Depth: 11.5 in. (292.8 mm)
`
`Power Requirements
`• Power Supply: Input 100-240V AC, 50/60Hz, 2A
`
`Environmental Standards Compliance & Certification
`• EMC Directive 89/336/EEC, EN60950, ETS 300 019-2-2,
`ETS 300 019-2-3
`• FCC-Part 15 Class B
`• IEC-68
`• UL 60950
`
`Ordering Information
`
`Part No.
`
`Model
`
`Bandwidth
`
`Pipes
`
`Total VCs*
`
`Connections
`
`* Total VCs is the maximum
`number of VCs when all VCs
`will be conditioned based on IP
`addresses and will reside in the
`Default Pipe.
`
`K10202M
`
`AC-201/2M
`
`2 Mbps
`
`K102000
`
`K103000
`
`K104000
`
`AC-201/10M
`
`10 Mbps
`
`AC-301
`
`AC-401
`
`100 Mbps
`
`100 Mbps
`
`256
`
`256
`
`1024
`
`2048
`
`2048
`
`2048
`
`4096
`
`12000
`
`12000
`
`12000
`
`64000
`
`128000
`
`Copyright © 2001 Allot Communications Ltd. Allot Communications, NetEnforcer, CacheEnforcer, NetAccountant, NetBalancer and the Allot logo are trademarks of
`Allot Communications Ltd. All other brand or product names are trademarks of their respective holders. All information in this document is subject to change without
`notice. Allot Communications Ltd. assumes no responsibility for any errors that appear in this document. P/N D002106 10/01.
`
`Americas
`250 Prairie Center Drive, #335
`Eden Prairie, MN 55344
`USA
`Tel:
`Fax:
`
`(952) 944-3100
`(952) 944-3555
`
`Western Europe
`World Trade Center
`1300 Route Des Cretes
`BP255
`Sophia Antipolis Cedex
`France 06905
`Tel: 33 (0)4 92 38 80 27
`Fax: 33 (0)4 92 38 80 33
`
`Asia Pacific
`9 Raffles Place
`Republic Plaza #27-01
`Singapore 048619
`Tel: 65 832 5663
`Fax: 65 832 5662
`
`Japan
`Nishi Ginza Bldg. 2F
`5-5-9 Ginza Chuo-ku
`Tokyo 104-0061
`Tel: 81 (0)3 5537 7114
`Fax: 81 (0)3 5537 5281
`
`Eastern Europe,
`Middle East, Africa
`5 Hanagar Street
`Industrial Zone
`Hod Hasharon 45800
`Israel
`Tel: 972 (0)9 761 9200
`Fax: 972 (0)9 744 3626
`
`www.allot.com
`info@allot.com
`
`NetEnforcer™
`
`QoS/SLA Enforcement for Service Providers
`
`w i r e l e s s
`
`DoS protection
`
`s a t e l l i t e
`I S P s
`b r o a d b a n d
`W e b h o s t i n g
`
`S
`
`ervice providers have a varied subscriber base, including homes, small
`offices/home offices (SOHOs), branch offices and enterprise networks.
`Since each subscriber group has different networking needs—and not all
`subscribers will be online at any one instant—Internet service providers,
`web hosting facilities, ASPs and data centers use over-subscription to
`maximize return on investment (ROI). More importantly, enterprise
`customers are willing to pay additional fees in order to receive premium
`tiered services such as “Gold”, “Silver”, or “Bronze”, or classes of service
`that deliver the bandwidth to support specific business-critical applications
`such as VoIP, SAP and Citrix.
`
`• Maximize ROI on network
`infrastructure
`
`• Enforce Service Level
`Agreements
`
`• Rapidly provision new
`subscribers
`
`• Monitoring and IP-based
`accounting
`
`0001
`
`Cloudflare - Exhibit 1016, page 1
`
`

`

`NetEnforcer
`
`Policy-Powered Networking
`
`Features and Benefits
`
`Allot Communications NetEnforcer™ policy enforcement devices
`offer service providers a complete suite of tools for better managing
`over-subscription and enforcing Service Level Agreements (SLAs).
`The NetEnforcer lets service providers immediately identify, and
`then cap or limit excessive bandwidth consumers.
`
`The NetEnforcer is an ideal platform for rapidly provisioning new
`subscribers, creating and enforcing multiple tiers of service, and
`collecting usage-based billing information for export to an external
`database.
`
`Smart
`Building
`
`Regional
`Office 1
`
`Regional
`Office 2
`
`Cache, Email
`FTP Servers
`
`Web Far
`Web Farm
`
`CCM, Billing
`
`Switch
`
`NetEnforcer
`
`Router
`
`Internet
`
`NetEnforcer on a Broadband
`Wireless Service Provider
`Network
`
`Three Steps to Policy-Powered Networking
`
`Policy-Powered Networking lets you efficiently manage subscriber
`traffic accessing the service provider network. The process of
`implementing a Policy-Powered Networking solution on a service
`provider network includes three steps:
`
`1. Provision new subscribers
`Use the NetEnforcer to retrieve customer information from your
`Customer Care and Billing system (CCB) or text-based customer
`list. This automatic process retrieves the subscriber’s Service Level
`Agreement type and defines the guaranteed minimum bandwidth as
`well as maximum usage limits on the NetEnforcer.
`2. Enforce the rules
`NetEnforcer examines subscriber usage parameters that have been
`defined. Upon matching a traffic session with a customer or subscriber,
`NetEnforcer forwards the packets according to the bandwidth
`parameters outlined in the SLA. Active management and enforcement
`of the Service Level Agreement (SLA) ensures that your customers
`receive exactly the bandwidth for which they are paying.
`3. Verify/Bill
`The NetEnforcer sends detailed traffic information to the
`billing/reporting systems, including addresses, applications used,
`service applied and traffic sent. This allows you to create advanced
`invoicing schemes such as usage-based billing, in which subscribers
`are charged based on the amount and type of network services that
`they actually use.
`
`Web-accessible reports can also be made available to the customers,
`so they can monitor their usage and the level of service that
`they receive.
`
`Maximize ROI on Network Infrastructure
`The NetEnforcer allows service providers to
`maximize ROI by effectively managing “bandwidth
`contention” and over-subscription. On many
`networks as little as 5% of the subscribers use
`up to 80% of the bandwidth. Use NetEnforcer
`to discover—and limit—these bandwidth abusers
`that negatively impact your network’s
`performance. By effectively limiting excessive
`network consumers and maximizing network
`performance, you can successfully over-subscribe
`your services as well as attract lucrative enterprise
`customers. They seek premium services that
`guarantee bandwidth for business-critical
`applications such as VoIP, SAP and Citrix.
`
`Increased Revenue Through SLA Enforcement
`Offering Service Level Agreements (SLAs) allows
`you to charge a premium for your IP services.
`The NetEnforcer enables you to enforce SLAs
`by assigning fixed minimum and maximum
`amounts of bandwidth to your customers so
`that they receive exactly the bandwidth they
`pay for—no more and no less. No longer do
`they pay for 256 Kbps and receive 1 Mbps. This
`“extra” bandwidth can be sold to additional
`paying customers, increasing your bottom line.
`
`Rapidly Provision New Subscribers
`NetEnforcer enables rapid customer provisioning
`with its superior GUIs for policy setting and
`integration with CCB systems. Save time by
`defining each customer only once in your
`customer care directory, and NetEnforcer will
`automatically retrieve the subscriber’s SLA type
`(such as “Gold” “Sliver” and “Bronze”) and apply
`the guaranteed minimum and maximum
`bandwidth limits.
`
`Pipe Policy Hierarchy
`The NetEnforcer’s “Pipe” policy hierarchy was
`especially designed for the quality of service
`(QoS) needs of services providers. You can
`create a “Pipe” to define a customer and then
`define policies called “Virtual Channels” that
`enable QoS for their traffic.
`
`Pipes also enable you to dynamically allocate
`bandwidth and automatically apply the relevant
`QoS policies. Only after matching a session to
`a rule (such as a subscriber‘s IP address), does
`the NetEnforcer enable a VC. This allows you
`to define more VCs than are actively handled at
`any one time. With this feature, a NetEnforcer
`that supports 8,000 VCs can, for example, provide
`QoS for up to 20,000 subscribers.
`
`Policy Editor
`
`The Policy Editor is used to set up QoS. Double-clicks conveniently
`launch editors for defining tiered services and Hosts.
`
`Policy Editor
`The Policy Editor is used to define Virtual
`Channels and Pipes that specify network actions
`and enable QoS. Special emphasis has been
`placed on ease-of-use and ergonomics to speed
`policy creation, enable rapid provisioning of
`subscribers, and ease maintenance tasks that
`enforce multiple tiers of service. The Policy
`Editor offers advanced features such as drag-
`and-drop creation of policies and rules, and
`right-clicks to launch relevant monitoring views.
`
`Monitoring and IP-Based Accounting
`The NetEnforcer Traffic Monitor presents macro
`and micro views of traffic and performance from
`a single, easy-to-read GUI, enabling you to
`immediately identify, and then cap or limit
`excessive bandwidth consumers. NetEnforcer
`lets you view traffic per users, sessions and
`applications. Special emphasis has been placed
`on ease-of-use and ergonomics, with such
`features as mouse-overs with tool tips; the ability
`to save frequently used monitoring views as “My
`Favorite”; and extensive navigational shortcuts
`using right mouse-clicks. Exporting the
`NetEnforcer Accounting data to solutions of
`Allot partners such as Portal, RODOPI,
`TeleKnowledge, Bridgewater and XACCT enables
`usage-based billing.
`
`The NetHistory utility allows you to monitor
`and store application and resource usage data
`for up to six months. Through analysis of historical
`data, you can set more accurate traffic policies,
`proactively plan network capacity, and more
`effectively over-subscribe your services.
`
`Per-Flow Queuing
`The NetEnforcer uses a unique approach to
`queuing called Per-Flow Queuing (PFQ) in which
`each new connection flow gets its own queue.
`The new queue is treated equally with other
`flows having the same priority policy class
`(“fairness”). New connections wait a fair,
`proportionate amount of time relative to all
`other connections and are not sent to the back
`of the queue.
`
`To control the flow of connections between
`different priority classes, the NetEnforcer will
`perform a superset of traditional weighted-fair
`and class-based queuing algorithms.
`
`Customizable, Java-based Traffic Monitor
`
`LDAP Directory and Backend Support
`The NetEnforcer interfaces to standard LDAP-
`based directories. This enables service providers
`to integrate their network policies with their
`customer care and billing database (CCB). This
`feature enables the solutions provider to assign
`minimum and maximum service level guarantees
`for each customer via the database.
`
`Complete Fault Tolerance
`The NetEnforcer offers one hundred percent
`uptime, with a two-tier approach to fault-tolerant
`operation:
`1.
`If any software or hardware component fails,
`the NetEnforcer will switch over to a
`hardware bypass mode and transparently
`pass all traffic through the box.
`2. Two NetEnforcers can be placed in parallel,
`with the primary unit acting as the active
`system and the other as a hot-backup system.
`
`End-to-End QoS Delivery
`To achieve end-to-end QoS, NetEnforcer uses
`industry-standard Type of Service (ToS) and
`Differentiated Services (DiffServ) protocols.
`Based on its classification results, the NetEnforcer
`can mark the outgoing packets with DiffServ
`values such as “Assured” or “Best Effort” to
`signal the entire network (i.e., the backbone
`routers) of the desired QoS.
`
`Traffic Redirection Control (Optional)
`The CacheEnforcer™ lets network managers
`seamlessly add servers and distribute traffic
`according to the individual capabilities of each
`server. It simplifies caching administration by
`giving network managers a single point to manage
`multiple cache servers and frees additional
`resources for over-subscription.
`
`The NetBalancer™ allows you to control and
`balance traffic to server farms. It goes beyond
`traditional load balancing equipment by allowing
`you to define single policies that control both
`the prioritization of applications on the network
`and the distribution of those applications
`to servers.
`
`0002
`
`Cloudflare - Exhibit 1016, page 2
`
`

`

`NetEnforcer
`
`Policy-Powered Networking
`
`Features and Benefits
`
`Allot Communications NetEnforcer™ policy enforcement devices
`offer service providers a complete suite of tools for better managing
`over-subscription and enforcing Service Level Agreements (SLAs).
`The NetEnforcer lets service providers immediately identify, and
`then cap or limit excessive bandwidth consumers.
`
`The NetEnforcer is an ideal platform for rapidly provisioning new
`subscribers, creating and enforcing multiple tiers of service, and
`collecting usage-based billing information for export to an external
`database.
`
`Smart
`Building
`
`Regional
`Office 1
`
`Regional
`Office 2
`
`Cache, Email
`FTP Servers
`
`Web Far
`Web Farm
`
`CCM, Billing
`
`Switch
`
`NetEnforcer
`
`Router
`
`Internet
`
`NetEnforcer on a Broadband
`Wireless Service Provider
`Network
`
`Three Steps to Policy-Powered Networking
`
`Policy-Powered Networking lets you efficiently manage subscriber
`traffic accessing the service provider network. The process of
`implementing a Policy-Powered Networking solution on a service
`provider network includes three steps:
`
`1. Provision new subscribers
`Use the NetEnforcer to retrieve customer information from your
`Customer Care and Billing system (CCB) or text-based customer
`list. This automatic process retrieves the subscriber’s Service Level
`Agreement type and defines the guaranteed minimum bandwidth as
`well as maximum usage limits on the NetEnforcer.
`2. Enforce the rules
`NetEnforcer examines subscriber usage parameters that have been
`defined. Upon matching a traffic session with a customer or subscriber,
`NetEnforcer forwards the packets according to the bandwidth
`parameters outlined in the SLA. Active management and enforcement
`of the Service Level Agreement (SLA) ensures that your customers
`receive exactly the bandwidth for which they are paying.
`3. Verify/Bill
`The NetEnforcer sends detailed traffic information to the
`billing/reporting systems, including addresses, applications used,
`service applied and traffic sent. This allows you to create advanced
`invoicing schemes such as usage-based billing, in which subscribers
`are charged based on the amount and type of network services that
`they actually use.
`
`Web-accessible reports can also be made available to the customers,
`so they can monitor their usage and the level of service that
`they receive.
`
`Maximize ROI on Network Infrastructure
`The NetEnforcer allows service providers to
`maximize ROI by effectively managing “bandwidth
`contention” and over-subscription. On many
`networks as little as 5% of the subscribers use
`up to 80% of the bandwidth. Use NetEnforcer
`to discover—and limit—these bandwidth abusers
`that negatively impact your network’s
`performance. By effectively limiting excessive
`network consumers and maximizing network
`performance, you can successfully over-subscribe
`your services as well as attract lucrative enterprise
`customers. They seek premium services that
`guarantee bandwidth for business-critical
`applications such as VoIP, SAP and Citrix.
`
`Increased Revenue Through SLA Enforcement
`Offering Service Level Agreements (SLAs) allows
`you to charge a premium for your IP services.
`The NetEnforcer enables you to enforce SLAs
`by assigning fixed minimum and maximum
`amounts of bandwidth to your customers so
`that they receive exactly the bandwidth they
`pay for—no more and no less. No longer do
`they pay for 256 Kbps and receive 1 Mbps. This
`“extra” bandwidth can be sold to additional
`paying customers, increasing your bottom line.
`
`Rapidly Provision New Subscribers
`NetEnforcer enables rapid customer provisioning
`with its superior GUIs for policy setting and
`integration with CCB systems. Save time by
`defining each customer only once in your
`customer care directory, and NetEnforcer will
`automatically retrieve the subscriber’s SLA type
`(such as “Gold” “Sliver” and “Bronze”) and apply
`the guaranteed minimum and maximum
`bandwidth limits.
`
`Pipe Policy Hierarchy
`The NetEnforcer’s “Pipe” policy hierarchy was
`especially designed for the quality of service
`(QoS) needs of services providers. You can
`create a “Pipe” to define a customer and then
`define policies called “Virtual Channels” that
`enable QoS for their traffic.
`
`Pipes also enable you to dynamically allocate
`bandwidth and automatically apply the relevant
`QoS policies. Only after matching a session to
`a rule (such as a subscriber‘s IP address), does
`the NetEnforcer enable a VC. This allows you
`to define more VCs than are actively handled at
`any one time. With this feature, a NetEnforcer
`that supports 8,000 VCs can, for example, provide
`QoS for up to 20,000 subscribers.
`
`Policy Editor
`
`The Policy Editor is used to set up QoS. Double-clicks conveniently
`launch editors for defining tiered services and Hosts.
`
`Policy Editor
`The Policy Editor is used to define Virtual
`Channels and Pipes that specify network actions
`and enable QoS. Special emphasis has been
`placed on ease-of-use and ergonomics to speed
`policy creation, enable rapid provisioning of
`subscribers, and ease maintenance tasks that
`enforce multiple tiers of service. The Policy
`Editor offers advanced features such as drag-
`and-drop creation of policies and rules, and
`right-clicks to launch relevant monitoring views.
`
`Monitoring and IP-Based Accounting
`The NetEnforcer Traffic Monitor presents macro
`and micro views of traffic and performance from
`a single, easy-to-read GUI, enabling you to
`immediately identify, and then cap or limit
`excessive bandwidth consumers. NetEnforcer
`lets you view traffic per users, sessions and
`applications. Special emphasis has been placed
`on ease-of-use and ergonomics, with such
`features as mouse-overs with tool tips; the ability
`to save frequently used monitoring views as “My
`Favorite”; and extensive navigational shortcuts
`using right mouse-clicks. Exporting the
`NetEnforcer Accounting data to solutions of
`Allot partners such as Portal, RODOPI,
`TeleKnowledge, Bridgewater and XACCT enables
`usage-based billing.
`
`The NetHistory utility allows you to monitor
`and store application and resource usage data
`for up to six months. Through analysis of historical
`data, you can set more accurate traffic policies,
`proactively plan network capacity, and more
`effectively over-subscribe your services.
`
`Per-Flow Queuing
`The NetEnforcer uses a unique approach to
`queuing called Per-Flow Queuing (PFQ) in which
`each new connection flow gets its own queue.
`The new queue is treated equally with other
`flows having the same priority policy class
`(“fairness”). New connections wait a fair,
`proportionate amount of time relative to all
`other connections and are not sent to the back
`of the queue.
`
`To control the flow of connections between
`different priority classes, the NetEnforcer will
`perform a superset of traditional weighted-fair
`and class-based queuing algorithms.
`
`Customizable, Java-based Traffic Monitor
`
`LDAP Directory and Backend Support
`The NetEnforcer interfaces to standard LDAP-
`based directories. This enables service providers
`to integrate their network policies with their
`customer care and billing database (CCB). This
`feature enables the solutions provider to assign
`minimum and maximum service level guarantees
`for each customer via the database.
`
`Complete Fault Tolerance
`The NetEnforcer offers one hundred percent
`uptime, with a two-tier approach to fault-tolerant
`operation:
`1.
`If any software or hardware component fails,
`the NetEnforcer will switch over to a
`hardware bypass mode and transparently
`pass all traffic through the box.
`2. Two NetEnforcers can be placed in parallel,
`with the primary unit acting as the active
`system and the other as a hot-backup system.
`
`End-to-End QoS Delivery
`To achieve end-to-end QoS, NetEnforcer uses
`industry-standard Type of Service (ToS) and
`Differentiated Services (DiffServ) protocols.
`Based on its classification results, the NetEnforcer
`can mark the outgoing packets with DiffServ
`values such as “Assured” or “Best Effort” to
`signal the entire network (i.e., the backbone
`routers) of the desired QoS.
`
`Traffic Redirection Control (Optional)
`The CacheEnforcer™ lets network managers
`seamlessly add servers and distribute traffic
`according to the individual capabilities of each
`server. It simplifies caching administration by
`giving network managers a single point to manage
`multiple cache servers and frees additional
`resources for over-subscription.
`
`The NetBalancer™ allows you to control and
`balance traffic to server farms. It goes beyond
`traditional load balancing equipment by allowing
`you to define single policies that control both
`the prioritization of applications on the network
`and the distribution of those applications
`to servers.
`
`0003
`
`Cloudflare - Exhibit 1016, page 3
`
`

`

`Product Specifications
`
`Interface Connections
`• Two 10/100 Mbps Half/Full Duplex Autosense Ethernet
`Interfaces with RJ-45 connectors
`
`Traffic Classification
`• Per flow by IP/MAC address (with IP range/subnet option),
`network protocols and TCP/UDP ports (with port range option)
`• Content inspection of HTTP header including: file type, URL,
`HTTP method and Host name
`• Protocol Authentication (HTTP)
`• TOS byte - DiffServ or IP Precedence bits
`• IP and non-IP (IP/MAC address) type traffic
`• Time of day/week/month/year
`
`QoS Enforcement
`• Hierarchy of policy rules with inbound/outbound traffic
`management
`• Minimum/maximum bandwidth enforcement per flow/VC/Pipe
`• Ten levels of priorities for VC/Pipe/connection
`• Per flow guaranteed bandwidth, burst rate, CBR (for connection)
`• Maximum number of connections per VC/Pipe
`• Priority per connection or per VC
`• Fairness between equal-level-priority traffic flows
`• Admission control with the following actions: accept by priority,
`reject, drop
`• ToS byte re-mark
`(in-profile bytes/out-of-profile bytes/admission control)
`• “Reserve-on-Demand” bandwidth for very high priority traffic
`
`Network Security
`• Access control - pass/reject/drop
`• Protection from Denial of Service (DoS) attacks
`
`Connection Control
`• Connection control including cache redirection and server load
`balancing (optional software packages)
`
`Configuration
`• Remote policy configuration via Web browser or Command
`Line Interface
`
`QoS Policy Management
`• Easy-to-manage, single-table view based on catalogs
`• Dynamic expansion of VCs/Pipes to multiple hosts
`• Host definition per LDAP query, DNS name, IP, MAC address
`• Policy distribution from primary NetEnforcer to other units
`
`Monitoring and Accounting
`• Monitoring - Top clients, top servers, top VCs, top Pipes and
`protocol distribution, VC/Pipe distribution, number of connections,
`utilization, dropped packets, bandwidth usage (inbound/outbound)
`with 30-second granularity and storage of historical data from
`the last 6 months
`• Accounting (via Optional NetAccountant) - In-box accounting
`of traffic per session for all sessions; accounting using RADIUS
`server; powerful report generator; ODBC interface for external
`applications
`• SNMP - support statistics collection per VC/Pipe using SNMP-
`based tools and presentation by MRTG and other graphic tools
`
`Fail-Safe Performance
`• Hardware bypass
`• Full redundancy support (dual configuration with hot-standby
`and policy distribution)
`
`Network Standards Support
`• COPS, LDAP, DiffServ/TOS (RFCs 2474, 2475, 2597, 2598),
`IP Precedence (RFC 791), SNMP, RADIUS, and ODBC
`
`Browser Support
`• MS Internet Explorer 5.01, 5.5
`• Netscape Navigator 4.5, 4.6, 4.7, 6.0
`
`Dimensions
`• Standard 1U by 19-inch, rack mountable
`• Height: 1.73 in. (43.3 mm), Width: 17.22 in. (437.5 mm),
`Depth: 11.5 in. (292.8 mm)
`
`Power Requirements
`• Power Supply: Input 100-240V AC, 50/60Hz, 2A
`
`Environmental Standards Compliance & Certification
`• EMC Directive 89/336/EEC, EN60950, ETS 300 019-2-2,
`ETS 300 019-2-3
`• FCC-Part 15 Class B
`• IEC-68
`• UL 60950
`
`Ordering Information
`
`Part No.
`
`Model
`
`Bandwidth
`
`Pipes
`
`Total VCs*
`
`Connections
`
`* Total VCs is the maximum
`number of VCs when all VCs
`will be conditioned based on IP
`addresses and will reside in the
`Default Pipe.
`
`K10202M
`
`AC-201/2M
`
`2 Mbps
`
`K102000
`
`K103000
`
`K104000
`
`AC-201/10M
`
`10 Mbps
`
`AC-301
`
`AC-401
`
`100 Mbps
`
`100 Mbps
`
`256
`
`256
`
`1024
`
`2048
`
`2048
`
`2048
`
`4096
`
`12000
`
`12000
`
`12000
`
`64000
`
`128000
`
`Copyright © 2001 Allot Communications Ltd. Allot Communications, NetEnforcer, CacheEnforcer, NetAccountant, NetBalancer and the Allot logo are trademarks of
`Allot Communications Ltd. All other brand or product names are trademarks of their respective holders. All information in this document is subject to change without
`notice. Allot Communications Ltd. assumes no responsibility for any errors that appear in this document. P/N D002106 10/01.
`
`Americas
`250 Prairie Center Drive, #335
`Eden Prairie, MN 55344
`USA
`Tel:
`Fax:
`
`(952) 944-3100
`(952) 944-3555
`
`Western Europe
`World Trade Center
`1300 Route Des Cretes
`BP255
`Sophia Antipolis Cedex
`France 06905
`Tel: 33 (0)4 92 38 80 27
`Fax: 33 (0)4 92 38 80 33
`
`Asia Pacific
`9 Raffles Place
`Republic Plaza #27-01
`Singapore 048619
`Tel: 65 832 5663
`Fax: 65 832 5662
`
`Japan
`Nishi Ginza Bldg. 2F
`5-5-9 Ginza Chuo-ku
`Tokyo 104-0061
`Tel: 81 (0)3 5537 7114
`Fax: 81 (0)3 5537 5281
`
`Eastern Europe,
`Middle East, Africa
`5 Hanagar Street
`Industrial Zone
`Hod Hasharon 45800
`Israel
`Tel: 972 (0)9 761 9200
`Fax: 972 (0)9 744 3626
`
`www.allot.com
`info@allot.com
`
`NetEnforcer™
`
`QoS/SLA Enforcement for Service Providers
`
`w i r e l e s s
`
`DoS protection
`
`s a t e l l i t e
`I S P s
`b r o a d b a n d
`W e b h o s t i n g
`
`S
`
`ervice providers have a varied subscriber base, including homes, small
`offices/home offices (SOHOs), branch offices and enterprise networks.
`Since each subscriber group has different networking needs—and not all
`subscribers will be online at any one instant—Internet service providers,
`web hosting facilities, ASPs and data centers use over-subscription to
`maximize return on investment (ROI). More importantly, enterprise
`customers are willing to pay additional fees in order to receive premium
`tiered services such as “Gold”, “Silver”, or “Bronze”, or classes of service
`that deliver the bandwidth to support specific business-critical applications
`such as VoIP, SAP and Citrix.
`
`• Maximize ROI on network
`infrastructure
`
`• Enforce Service Level
`Agreements
`
`• Rapidly provision new
`subscribers
`
`• Monitoring and IP-based
`accounting
`
`0004
`
`Cloudflare - Exhibit 1016, page 4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket