Keysight ixia BreakingPoint Storm User manual

BreakingPoint Storm
Installation Guide

Notices
Copyright Notice
© Keysight Technologies 2005–2018
No part of this document may be
reproduced in any form or by any means
(including electronic storage and retrieval
or translation into a foreign language)
without prior agreement and written
consent from Keysight Technologies, Inc.
as governed by United States and
international copyright laws.
Warranty
The material contained in this document
is provided “as is,” and is subject to being
changed, without notice, in future
editions. Further, to the maximum extent
permitted by applicable law, Keysight
disclaims all warranties, either express or
implied, with regard to this manual and
any information contained herein,
including but not limited to the implied
warranties of merchantability and fitness
for a particular purpose. Keysight shall not
be liable for errors or for incidental or
consequential damages in connection
with the furnishing, use, or performance
of this document or of any information
contained herein. Should Keysight and the
user have a separate written agreement
with warranty terms covering the
material in this document that conflict
with these terms, the warranty terms in
the separate agreement shall control.
Technology Licenses
The hardware and/or software described
in this document are furnished under a
license and may be used or copied only in
accordance with the terms of such
license.
U.S. Government Rights
The Software is "commercial computer
software," as defined by Federal
Acquisition Regulation ("FAR") 2.101.
Pursuant to FAR 12.212 and 27.405-3 and
Department of Defense FAR Supplement
("DFARS") 227.7202, the U.S. government
acquires commercial computer software
under the same terms by which the
software is customarily provided to the
public. Accordingly, Keysight provides the
Software to U.S. government customers
under its standard commercial license,
which is embodied in its End User License
Agreement (EULA), a copy of which can
be found at
http://www.keysight.com/find/sweula or
https://support.ixiacom.com/support-
services/warranty-license-agreements.
The license set forth in the EULA
represents the exclusive authority by
which the U.S. government may use,
modify, distribute, or disclose the
Software. The EULA and the license set
forth therein, does not require or permit,
among other things, that Keysight: (1)
Furnish technical information related to
commercial computer software or
commercial computer software
documentation that is not customarily
provided to the public; or (2) Relinquish
to, or otherwise provide, the government
rights in excess of these rights
customarily provided to the public to use,
modify, reproduce, release, perform,
display, or disclose commercial computer
software or commercial computer
software documentation. No additional
government requirements beyond those
set forth in the EULA shall apply, except to
the extent that those terms, rights, or
licenses are explicitly required from all
providers of commercial computer
software pursuant to the FAR and the
DFARS and are set forth specifically in
writing elsewhere in the EULA. Keysight
shall be under no obligation to update,
revise or otherwise modify the Software.
With respect to any technical data as
defined by FAR 2.101, pursuant to FAR
12.211 and 27.404.2 and DFARS 227.7102,
the U.S. government acquires no greater
than Limited Rights as defined in FAR
27.401 or DFAR 227.7103-5 (c), as
applicable in any technical data. 52.227-
14 (June 1987) or DFAR 252.227-7015 (b)
(2) (November 1995), as applicable in any
technical data.
Safety Information
ACAUTION notice denotes a hazardous
situation that, if not avoided, could result
in minor or moderate injury.
AWARNING notice denotes a hazardous
situation that, if not avoided, could result
in death or serious injury.
– ii –

Contact Us
Ixia headquarters
26601 West Agoura Road
Calabasas, California 91302
+1877 367 4942 – Toll-free North America
+1 818 871 1800 – Outside North America
+1.818.871.1805 – Fax
www.ixiacom.com/contact/info
Support
Global Support +1 818 595 2599 support@ixiacom.com
APAC Support +91 80 4939 6410 support-asiapac@ixiacom.com
EMEA Support +40 21 301 5699 support-emea@ixiacom.com
Greater ChinaRegion +400 898 0598 support-china@ixiacom.com
Hong Kong +86 10 5732 3932 support-china@ixiacom.com
India Office +91 80 4939 6410 support-india@ixiacom.com
Japan Head Office +81 3 5326 1980 support-japan@ixiacom.com
Korea Office +82 2 3461 0095 support-korea@ixiacom.com
Singapore Office +656 494 8910 support-asiapac@ixiacom.com
– iii –

CONTENTS
Contact Us iii
Product Safety Information v
Chapter 1 About This Guide 1
Chapter 2 Product Overview 3
Chapter 3 Getting Started 11
Chapter 4 Site and Safety Regulations 29
Chapter 5 Installation Guide 33
Chapter 6 System Configuration 39
Chapter 7 Accessing the Control Center 43
Chapter 8 Frequently Asked Questions 45
Appendix A Hardware Specifications 51
Appendix B Safety Instructions 55
INDEX 63
– iv –

Product Safety Information
Before installing the unit, read all product safety instructions contained in this document.
These instructions contain specific safety messages that will alert you to any hazards
associated with the installation and proper operations of the equipment. Failure to follow
those instructions can result in serious injury or death.
– v –

This page intentionally left blank.
– vi –

CHAPTER 1About This Guide
This section explains the purpose, audience, and organization of this guide. It also defines conventions
used to present instructions and information throughout this guide and includes information on how to
get support for issues encountered while you use your BreakingPoint device.
Purpose
The purpose of this guide is to provide safety regulations, site requirements, and installation
instructions for BreakingPoint Storm.
Target Audience
The intended audience is users of all skill levels.
Organization
This guide is organized into the following sections:
lAbout This Guide
lProduct Overview
lGetting Started
lSite and Safety Regulations
lHardware Installation
lSystem Configuration
lAccessing the Control Center
lFrequently Asked Questions
lAppendix
lIndex
Conventions
This guide uses the conventions listed in the following table:
Convention Description Example
Bolded text Commands, keywords, or
buttons
Press the Enter key.
Courier New
font
User input Type GET in the Method Request box.
–1–

Note: Helpful suggestion or
reference to
additional information
Note: Racks must meet standard EIA-310-C
requirements.
Related Documentation
The following table lists all the documentation related to BreakingPoint Storm. You can access all
documentation through the Documentation area of Strike Center.
Documentation Description
BreakingPoint Storm
Installation Guide
Provides installation instructions and information for BreakingPoint Storm.
BreakingPoint Storm
User Guide
Provides information on how to use the Control Center to set up,
customize, and run traffic through devices under test.
BreakingPoint Online
Help
Online documentation for all BreakingPoint products. Requires Internet
Explorer 10.0 or Firefox 18.0 for proper viewing.
Strike Center
Strike Center is an online portal for security and firmware updates as well as industry information. You
can use Strike Center to do the following:
lObtain the latest firmware releases for BreakingPoint Storm.
lDownload the most up-to-date ATI Updates (formerly known as StrikePacks), which includes the
latest strikes, test capabilities, and application protocols.
lDownload PDFs of documentation.
lFind contact information for customer support, sales, and corporate facilities.
lAccess blogs and technical articles related to vulnerabilities, exploits, and recent updates to any
BPS product.
Documentation Feedback
Please send any feedback or suggestions regarding this documentation to
techpub@breakingpoint.com.
Chapter 1 About This Guide
–2–

CHAPTER 2Product Overview
This section covers the following:
lBreakingPoint Storm Overview
lHardware Overview
lControl Center Overview
BreakingPoint Storm Overview
BreakingPoint Systems has developed a product that measures and hardens the resiliency of every
component of your critical infrastructure against potentially crippling attacks and peak application
traffic: the BreakingPoint Storm. It is a 4 RU rack-mountable, modular product that can accurately
recreate a live network environment.
BreakingPoint Storm consists of the chassis and the user interface called the Control Center. Both
components work together to create a comprehensive and user-friendly test solution for all network
devices. BreakingPoint Storm can concurrently simulate TCP sessions, application traffic, and live
security attacks, and ultimately, identify 'breaking points' in your network devices.
Hardware Overview
BreakingPoint Storm is comprised of five modules. The following image highlights these modules with
callouts:
Callout 1 refers to the removable fan tray that is vertically mounted on the right-side of the chassis.
–3–

Callout 2 and Callout 3 refer to the modules dedicated to high-speed data plane processors, or the
blades, for the computer. When you initially receive BreakingPoint Storm, these modules will not
contain any blades, so you will need to install the blade(s) into the chassis. For more information on
installing the blades, see Installing the Blade.
If you are using 10 Gb blades, you will have four fiber-optic data ports that support up to 10 Gbps. If
you are using 1 Gb blades, you will have eight copper data ports that support up to 1 Gbps. If you are
using 4-Port 1 GigE blades, you will have either four copper or four fiber-optic data ports that support
up to 1 Gbps. The fiber-optic connections and copper connections between the ports on your device
under test to the test ports on the chassis establish the transmitting and receiving interfaces for your
tests. For more information on connecting your device under test to BreakingPoint Storm, see
Connecting a Device Under Test to BreakingPoint Storm.
Depending on the number of blades purchased for BreakingPoint Storm, your chassis may have either
one or two blades. The number of tests that you can run concurrently depends on the number of
available ports that BreakingPoint Storm has. For example, a single-blade BreakingPoint Storm with
four available ports can only run four tests at a time. A two-blade chassis with 16 total available ports
can run 16 tests simultaneously. However, to run all 16 tests concurrently, you will need to assign
each available port to a different Active Group. For more information, see the BreakingPoint Storm User
Guide.
Callout 4 points to the computer controller, which holds the BPS management ports, target control
ports, and reset button. There is an eSATA port as well.
The computer controller will not be installed when you initially receive BreakingPoint Storm. For more
information on installing the computer controller, see Installing the Computer Controller.
The BPS management ports (serial and ethernet), located on the computer controller, allow you to
connect your computer to a network and access it through an IP address. The target control ports allow
you to automate testing for the device under test. The reset button restores your computer to the
default factory settings.
Callout 5 refers to the power tray, which contains the power supply for the computer.
Front-view
The following image illustrates the front of BreakingPoint Storm. Locate the corresponding callout in
the following table for more information about each component.
Chapter 2 Product Overview
–4–

Callout Component Description
1 System Fan
Tray
Holds the fan tray for the computer.
2 Data Ports Transmits and receives traffic to and from the DUT.
3 Target
Control
Serial Port
Used to manage and configure settings for the DUT.
4 Target
Control
Ethernet Port
Used to manage and configure settings for the DUT.
5 BPS
Management
Serial Port
Manages the BreakingPoint Storm configuration through a serial
connection.
6 BPS
Management
Ethernet Port
Manages the BreakingPoint Storm configuration through an ethernet
connection.
7 eSATA Port Provides an eSATA connection for an external memory device.
8 Reset button Restores the computer to factory settings. This process is irreversible and
all tests, imported data, and configurations are permanently removed from
the computer.
Chapter 2 Product Overview
–5–

Back-view
The power inlet and power switch are located on the back of the chassis, as shown in the following
image. Additionally, there are BNC interfaces that you can use in future releases to link together
multiple chassis. As of the 1.3 Release, you can only use one chassis at time.
Callout Component Description
1 BNC
Interfaces
Interfaces that are used to connect multiple chassis together (for clock I/O
and trigger I/O).
2 Power
Switch
Power breaker switch for BreakingPoint Storm.
3 Power Inlet Power inlet for BreakingPoint Storm.
Control Center Overview
The Control Center is a web-based user interface where you can create the testing environment, run
tests, and view reports. The Control Center is accessible through a Flash-enabled web browser, such as
Internet Explorer, Mozilla Firefox, Safari, and Opera. You must also have JavaScript turned on to view
the Control Center.
Note: Safari 6.0.2 on Mac OS 10.8.2 and Safari for Windows are not supported. Mac users with
OS 10.8.2 can use Firefox or Chrome as their browser.
Note: We recommend that users of Internet Explorer use IE 10. IE 9 and earlier versions are not
supported.
Enabling JavaScript
You must have JavaScript turned on to view the Control Center.
To turn on JavaScript for Internet Explorer, do the following:
Chapter 2 Product Overview
–6–

1. Open an Internet Explorer browser window.
2. Click Tools >Internet Options from the menu bar.
3. Click the Security tab.
4. Click Custom Level.
5. Scroll down to the Scripting section.
6. Find the category called Active Scripting.
7. Click Enable for this category.
8. Click Yes when the confirmation window appears.
9. Click OK to close the Internet Options window.
To turn on JavaScript for Mozilla Firefox, do the following:
1. Open a Mozilla Firefox browser window.
2. Click Tools >Options from the menu bar.
3. Click Content located at the top of the window.
4. Click Enable JavaScript.
5. Click OK to close the Options window.
To turn on JavaScript for Safari, do the following:
1. Open a Safari browser window.
2. Click Preferences from the Safari menu.
3. Click Security from the top of the window.
4. Click Enable JavaScript located under the Web Content section.
5. Close the Security window.
Accessing the Control Center
To access the Control Center, you must have a web browser with the following items turned on or
installed:
lAdobe Flash Player (version 11.6.602.171)
lPop-ups
lJavaScript
Additionally, you must have the host address that has been set for the BPS Management Port and the
Control Center login information.
Note: The chassis must already be installed and configured before the Control Center can be
accessed.
Chapter 2 Product Overview
–7–

To access the Control Center, do the following:
1. Open a Web browser.
Note: After upgrading or reverting to any release of the BreakingPoint Firmware, clear
your cache and refresh your browser.
Note: The default address is http://10.10.10.10, however, the host address may have
changed during the initial configuration of the computer. Contact the System Administrator
for the current host address.
2. Type the host address for the BPS Management port in the Address bar.
3. Click Launch BreakingPoint Systems Control Center in the Start page.
Note: The first time you attempt to log on to the computer, your browser will require you
to verify a security exception to login. Follow the steps required by your browser to accept
and verify the security exception. After the security exception has been accepted and
verified, you will be allowed to continue with the login process. A new window opens and
shows the Control Center login page.
4. Type the login ID in the Username box.
5. Type the password in the Password box.
Note: Passwords are case sensitive.
6. Click Login.
Note: The computer allows three invalid logins. If you type invalid login information on
the fourth attempt, the login window will lock you out. Refresh the browser to unlock your
accounts.
Chapter 2 Product Overview
–8–

Navigational Overview
This section provides an overview of the navigational areas in the Control Center. The Control Center is
divided into two main areas: the menu bar and the navigational buttons. See the following image for a
tour of the interface:
Callout Name Description
1 Menu Bar Provides point and click access to the main areas of the user interface.
2 Device
Status
Provides access to the Device Status area so that you can reserve ports
while no tests are running or the Real Time Statistics screen if there is a
running test.
3 Navigational
Buttons
Provides access to areas within the user interface.
Chapter 2 Product Overview
–9–

This page intentionally left blank.
– 10 –

CHAPTER 3Getting Started
Note: You can also reference the BreakingPoint User Guide for the most current information on
performing the tasks described in this topic.
This section covers the following:
lGetting Started Overview
lTask 1: Installing the BreakingPoint Device
lTask 2: Configuring the BreakingPoint Device
lTask 3: Establishing a BreakingPoint Session
lTask 4: Accessing the BreakingPoint Control Center
lTask 5: Creating a User Account
lTask 6: Setting the Time and Date
lTask 7: Creating a Device Under Test Profile
lTask 8: Creating a Network Neighborhood
lTask 9: Making Port Reservations
lTask 10: Creating a Test
Getting Started Overview
This section provides an overview of the tasks that you must complete to install and configure the
BreakingPoint device, as well as explain how to set up your test environment within the BreakingPoint
Control Center.
The following table lists the Getting Started tasks:
Task Description
Task 1 Installing the BreakingPoint Device.
Task 2 Configuring the BreakingPoint Device.
Task 3 Establishing a BreakingPoint Session.
Task 4 Accessing the BreakingPoint Control Center.
Task 5 Creating user accounts.
– 11 –

Task 6 Setting the time and date.
Task 7 Creating a DUT Profile.
Task 8 Creating a Network Neighborhood.
Task 9 Making Port Reservations.
Task 10 Creating a test.
Task 1: Installing the BreakingPoint Device
This section describes how to set up the BreakingPoint device.
To set up the BreakingPoint device, do the following:
1. Secure the chassis into an equipment rack.
Note: The chassis must be close enough to the device under test so that you can connect
cables from the appliance to the device under test.
2. Insert the computer controller into the module over the power tray.
3. Insert the blade(s) into the top two modules.
4. Power the computer.
5. Connect the device under test to the BreakingPoint device.
Task 2: Configuring the BreakingPoint Device
You will need to use either a telnet client or text console to configure the network settings for the
BreakingPoint device. The following sections provide instructions for configuration through a telnet
client or a text console.
Telnet
This section describes how to configure the host address, netmask, and gateway for the BreakingPoint
device by using either a telnet client or a text console.
Chapter 3 Getting Started
– 12 –

To configure the BreakingPoint device by using Telnet, do the following:
1. Open a telnet client (for example, PuTTy or AlphaCom).
2. Telnet to the following host address: 10.10.10.10.
3. Specify your terminal emulation preference (for example, ANSI or xterm) at the prompt and press
Enter.
4. Specify the following information for your BreakingPoint device in the Network Information box:
lDHCP Enable/Disable
Note: If DHCP is turned off, you can configure additional computer routes from the
Routes tab in the Administration area of the Control Center. If DHCP is turned on,
the Routes area will be unavailable.
lDHCP Hostname
lIP Address
lNetmask
lGateway
5. Click Next.
6. Type the login ID for the user account at the prompt.
Note: The login ID must use alphanumeric characters and consist of 1-15 characters. The
first character of the login ID must be a letter. Login IDs cannot solely consist of numbers.
The login ID cannot be changed after it has been created.
7. Type the password for the user account at the prompt.
Note: The password can consist of up to 15 alphanumeric and special characters.
The computer disconnects while the new network settings are applied and your account is created.
Document the network IP address and user account information. You will need this information to
access and log on to the BreakingPoint Control Center. You may create additional accounts through the
Administration page in the BreakingPoint Control Center.
Text Console
This section describes how to configure the host address, netmask, and gateway for the BreakingPoint
device by using a text console.
To configure the BreakingPoint device by using a text console, do the following:
1. Open a terminal emulation client (for example, HyperTerminal).
2. Connect to the BPS management serial port by using the following settings:
lBaud Rate: 115200 bps
lData Bits: 8
lParity: None
lStop Bits: 1
lFlow Control: None
Chapter 3 Getting Started
– 13 –

3. Specify the following information in the Network Information box:
lDHCP Enable/Disable
lDHCP Hostname
lIP Address
lNetmask
lGateway
4. Click Next when you are done inputting your network settings.
5. Type the login ID that you want to use for the user account at the prompt.
6. Type the password for the user account at the prompt.
The computer disconnects while the new network settings are applied and your new account is created.
Document the network IP address and user account information. You will need this information to
access and log on to the BreakingPoint Control Center. You may create additional accounts through the
Administration page in the Ixia web app.
Task 3: Establishing a BreakingPoint Session
The Breaking Point (BPS) application has been integrated into Ixia’s web app. This integration enables
you to access the BreakingPoint Control Center from the Ixia web app user interface. You can also
configure certain BreakingPoint chassis properties through the Ixia web app user interface. You can
now create new user accounts and manage them through the Ixia web app user interface.
To establish a BreakingPoint session and operate in the BreakingPoint Control Center, you must first
log on to the Ixia web app.
Note: A session is an individual instance of a running test. You can run multiple sessions at one
time, and manage all your current sessions from a single window. You manage sessions on the
Sessions page, which appears after you log on.
To establish a BreakingPoint session, do the following:
1. Open a web browser.
2. In the URL box, type the IP address or hostname of the Ixia chassis where the Ixia web app
server components are installed, followed by the port number that the Ixia web app server is
listening on (the default is 8080), and then press Enter.
Example: 192.168.100.56:8080
The Login page appears.
3. In the Username box, type your user ID.
4. In the Password box, type your password.
5. If you want the browser to automatically fill in the Username and Password field for future logins,
select the Remember Me check box.
6. Click Login. The Sessions page appears.
7. Click the BreakingPoint New Session icon. The BreakingPoint Control Center appears.
Chapter 3 Getting Started
– 14 –
This manual suits for next models
2
Table of contents
Other Keysight Network Hardware manuals

Keysight
Keysight Ixia IxOS User manual

Keysight
Keysight ixia BreakingPoint 20 User manual

Keysight
Keysight E5818A LXI User manual

Keysight
Keysight 11612B Service manual

Keysight
Keysight APS-M8400 User manual

Keysight
Keysight N5247-60116 Installation and operation manual

Keysight
Keysight N1091APCA User manual

Keysight
Keysight M9485A User guide

Keysight
Keysight 85033E Manual

Keysight
Keysight M9485A User guide