securing networks with silicon

Similar documents
Session Objectives. At the end of the session, the participants should: Understand advantages of BFD implementation on S9700

Configuring Bidirectional Forwarding Detection for BGP

Volume A Question No : 1 You can monitor your Steelhead appliance disk performance using which reports? (Select 2)

Bidirectional Forwarding Detection Routing

Deep dive SSL. Created for CUSTOMER

PTP 800 SPLIT-MOUNT SOLUTION

VLSI Design 12. Design Styles

A 28nm SoC with a 1.2GHz 568nJ/ Prediction Sparse Deep-Neural-Network Engine with >0.1 Timing Error Rate Tolerance for IoT Applications

Implementing BFD. BFD over Bundle. Enabling BFD Sessions on Bundle Members SUMMARY STEPS DETAILED STEPS

Flight Software Overview

82C288 BUS CONTROLLER FOR PROCESSORS (82C C C288-8)

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

AccuRAID iscsi Auto-Tiering Best Practice

The Universal Translator

SteelHead Product Family

Cloud, Distributed, Embedded. Erlang in the Heterogeneous Computing World. Omer

MOTOROLA PTP 800 LICENSED ETHERNET MICROWAVE

New IBIS Techniques for Modeling Complex IO Cadence Webinar March 23, 2005 Donald Telian

Net$ync II. Net$ync II. System Controllers

Instrument pucks. Copyright MBARI Michael Risi SIAM design review November 17, 2003

The Future of Field-Programmable Gate Arrays

PRODUCT MANUAL. Diver-MOD

SRX 5600 and SRX 5800 Services Gateway I/O Card Installation Instructions

THE CANDU 9 DISTRffiUTED CONTROL SYSTEM DESIGN PROCESS

Computing s Energy Problem:

MICROPROCESSOR ARCHITECTURE

Fast Software-managed Code Decompression

Industrial Compressor Controls Standard Custom

White Rabbit Applications for Data Acquisition Systems

Certification Exhibit FCC ID: R7PIWRS4. FCC Rule Part: ACS Report Number: W03.11.A

PC-based systems ELOP II-NT

VLSI Design 14. Memories

High usability and simple configuration or extensive additional functions the choice between Airlock Login or Airlock IAM is yours!

SWIM MEET MANAGER 5.0 NEW FEATURES

Application Note PowerPC 750GX Lockstep Facility

IBIS Modeling for IO-SSO Analysis. Thunder Lay and Jack W.C. Lin IBIS Asia Summit Taipei, Taiwan Nov. 19, 2013

Electromagnetic Attacks on Ring Oscillator-Based True Random Number Generator

Precision level sensing with low-pressure module MS

Distributed Control Systems

AN-140. Protege WX SALLIS Integration Application Note

CNC Communication Protocol

VLSI Design I; A. Milenkovic 1

CPE/EE 427, CPE 527 VLSI Design I L21: Sequential Circuits. Review: The Regenerative Property

TAKING IT TO THE EXTREME The WAGO-I/O-SYSTEM for extreme Applications

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

Spacecraft Simulation Tool. Debbie Clancy JHU/APL

Layout Design II. Lecture Fall 2003

An Architecture for Combined Test Data Compression and Abort-on-Fail Test

Fast Floating Point Compression on the Cell BE Processor

Approved Minutes (At Long Beach, CA, May 2004) IEEE Backplane Ethernet Study Group March 16th 18 th, 2004 Orlando, FL

This manual provides necessary requirements for meeting the IEC or IEC functional safety standards.

DAV CENTENARY COLLEGE, FARIDABAD

& Role of Powerline Carrier

Implementation of Height Measurement System Based on Pressure Sensor BMP085

Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen

Typical Wayside Reader System Quotation

Profile-driven Selective Code Compression

exsm.cluster High Availability for TSM Server Michael Abel & Bruno Friess TSM Symposium Oxford September 2005 Hier Kundenlogo

Final Report. Remote Fencing Scoreboard Gator FenceBox

Paper Presentation: COMPLETE AND SIMULTANEOUS DCS FAILURE IN TWO 500MW UNITS

Connect with Confidence NO POWER NO PROBLEM

DIY - PC - Interface for Suunto Cobra/Vyper/Mosquito

Condor Week Condor WAN scalability improvements. A needed evolution to support the CMS compute model

REPORT, RE0813, MIL, ENV, 810G, TEMP, IN HOUSE, , PASS

How to use Bidirectional Forwarding Detection(BFD) in NetScaler?

Electronic gas volume corrector model DGVC-04

HumiSys HF High Flow RH Generator

Electronic Automatic Transmission for Bicycle

A4 Operation Manual. Fig.1-1 Controller Socket Diagram

CBC2 performance with switched capacitor DC-DC converter. systems meeting, 12/2/14

IDeA Competition Report. Electronic Swimming Coach (ESC) for. Athletes who are Visually Impaired

API Reference for Cisco Enterprise Network Function Virtualization Infrastructure Software

A4s Operation Manual

Evaluation of a High Performance Code Compression Method

EasySas. The most advanced airlock electronics on the market. Recyclable product. Eco-design. Energy savings

Agenda Item I.5.b Supplemental NOAA Presentation November 2012

GOLOMB Compression Technique For FPGA Configuration

STAND alone & p.c. VERSION

Instructors: Randy H. Katz David A. PaGerson hgp://inst.eecs.berkeley.edu/~cs61c/fa10. Fall Lecture #39. Agenda

Cisco SIP Proxy Server (CSPS) Compliance Information

Visualize Nitrogen Gas Consumption

Pressure Sensor Bridge Configurations

CONTROL TECHNOLOGY INC Middlebrook Pike, Knoxville, TN Phone FAX

Programmable Valves Enable Both Precision Motion Control and Energy Saving

Designing A Low-Latency Cuckoo Hash Table for Write-Intensive Workloads Using RDMA

GOLFER. The Golf Putting Robot

CT PET-2018 Part - B Phd COMPUTER APPLICATION Sample Question Paper

Product Overview. Product Description CHAPTER

Global Information System of Fencing Competitions (Standard SEMI 1.0) Introduction

Out-of-Core Cholesky Factorization Algorithm on GPU and the Intel MIC Co-processors

REASONS FOR THE DEVELOPMENT

MEGAS 2.0. Gas analysis with direct C-Level Calculation and Bus-Connection. Data sheet

Design and Simulation of a Pipelined Decompression Architecture for Embedded Systems

Now every device for small & medium businesses, at zero upfront

TEE Protection Profile

High Integrity Pressure Protection Systems HIPPS

OMS Group Dr. Werner Domschke. The Open Metering System guarantee interoperability, producer and medium independency

BACnet Protocol Implementation Conformance Statement

TEE Protection Profile

Advanced Test Equipment Rentals ATEC (2832) OMS 600

Transcription:

NITROX II A Family of In-line Security Processors Presented by: Muhammad Raghib Hussain Contributed by: Bob Sanzone, Dan Katz, David Asher, David Carlson, Gregg Bouchard, Michael Bertone, Muhammad Hussain, Richard Kessler, Tom Hummel securing networks with silicon Hot Chips 15 August 2003

Introducing NITROX II Industry s First True In-Line Security Processor

NITROX II True bump-in-the-wire Inline Architecture Can sit next to the framer/mac in IPsec applications acting as an intelligent wire Eliminates the need of NPU or any extra logic to perform lookup and L2 processing for ingress IPsec packets. Intelligent packet classification into passthrough, process-then-pass, exception and DOS categories. Highly scalable architecture with a mix of pipeline and parallel processing techniques

NITROX II I/O Interfaces PCI/PCIX SPI-3 OR SPI-4 SPI-3 OR SPI-4 TWSI DDR SDRAM/ FCRAM

NITROX II Block Diagram On-chip 512KB Packet Buffer SPI-3 Input SPI-4 Input SPI-3 Input SPI-4 Input 64/133 SPI-3 Output SPI-4 Output SPI-3 Output SPI-4 Output SPI I/F PCI-X and PSE I/F SPI I/F Input Buffer Logic L2/L3 Pre Processing L2/L3 Post Processing Packet Order/ Queuing Manager Giga Cipher Processor Cores Output Buffer Logic RNG Key Memory SA Cache/ Memory Controller DDR SDRAM FCRAM I/F On-chip 512KB Packet Buffer securing networks with silicon

Inline IPsec Features in NITROX II L2 header/trailer processing IP header checks and processing Wire Speed Packet Buffering Inbound destination check and SA look-up Inbound IPsec selector checks Complete IPsec Packet Processing IPSEC Transforms (AH, ESP, Tunnel, Transport) 3DES, AES (all key sizes), HMAC SHA-1/MD5 UDP encapsulated IPSEC IKE packet detection and processing offload ICMP PMTU packet handling Robust Statistics for audit, billing and provisioning SA Mirroring for High-Availability IPsec exception processing and error handling securing networks with silicon

Inline SSL Features in NITROX II SSL 3.0 / TLS record transformations and exception processing Inline handshake record processing On-chip key material generation and context management Inline alert detection Session Resumption without CPU intervention TCP acceleration support Security Context Mirroring for High-Availability

NITROX II Raw Performance DES/3DES AES ARC4 SHA-1 MD5 1024-bit private-key RSA 1024-bit public-key RSA True Random Numbers 48 Gbps 48 Gbps 20 Gbps 60 Gbps 38 Gbps 60K per sec. 300K per sec. 320 Mbps securing networks with silicon

NITROX II System Performance Greater than 10Gbps of complete IPSEC packet processing (3DES/SHA-1, ESP/Tunnel) ~20Gbps for large packets 10K IKE sessions per sec. 40 K per sec. Full SSL Handshake Line rate 49B pass-through packet support at 10Gbps SSL (ARC4/MD5) record processing at 10Gbps for average size (512B) records

NITROX II High Level Specs Core Frequency 400MHz Core Voltage 1.0V (Nominal) Technology 0.13 CMOS Metal layers 8 Package 1096 TSBGA Transistors over 100 million Power 6W to 15W Status Sampling now, production Q303

NITROX II I/O Details 36G full duplex of flexible data I/Os Dual SPI-3 up to 133Mhz clock Dual SPI-4 up to 500Mhz DDR (1G data words/sec) 64-bit PCI/PCI-X up to 133MHz High bandwidth Memory Interface 72-bit DDR SDRAM (w/ ECC) 200Mhz DDR 72-bit FCRAM (w/ ECC) 200Mhz DDR Highly configurable I/Os SPI interfaces supports both Link and PHY mode SPI-4.2 interface supports dynamic de-skewing 32 virtual ports on SPI interfaces 3 virtual ports on PCI interface Any port to any port flow through architecture Bridging function between SPI-3, SPI-4 and PCI I/Os.

NITROX II GigaCipher Processor Core (GPC) securing networks with silicon Stand Alone Custom Processor RISC core with SIS (Security Instruction Set) extension Accelerates various ciphers, mod exp and CRC calculation Micro code engine coordinates operations and implements actual algorithms Flexible to adapt emerging standards and protocols Local Micro code and scratch buffer memory increases efficiency Micro code overlay support Efficient Power Management Any algorithm using the same primitive cipher permutation can be implemented Data Integrity and Privacy: HMAC (SHA-1, MD5 etc.), 3DES(ECB, CBC), AES (CBC, XCBC, Counter) Authentication: Public-key cryptography (RSA/DH) Key management (e.g RSA key generation, key backup etc.) Protocol processing (e.g. IKE, IPsec, SSL, WEP, TKIP, SRTP etc.) Programmable CRC Direct Access to on-chip resources (e.g key memory, random number)

NITROX II L2/L3 Processing Fully Configurable L2 Support Ethernet (w/ VLAN), MPLS, PPPoE, PPPoA, PPPoS, PPPoEoA.. L2 CRC Check and Generation Three inline polynomials (CRC32, CRC16, CRC16/CCITT) configurable per-interface Flexible CRC support present in GPC Custom Link Layer Header Support Skip N byte (programmable) IPv4 and IPv6 Packet Processing IP header checksum and error checks

NITROX II Memory Management Packet Buffer Management On-chip 1MB packet buffer with complete hardware management. Fully ECC protected memory with repair Highly optimized linked list architecture Extensive configurable flow control Per input port/interface buffer thresholds Per output port/interface buffer thresholds SA/Context Management On-chip SA/Context cache Hardware locks for SA/Context sharing

NITROX II Packet Synchronization Hardware based semaphores and synchronizing logic Tag based Synchronization Flexible software controlled tags Packet processing serialization based on tags Excellent fit for SSL and similar applications Hardware based Atomic Order Tag is assigned by the hardware Dynamic synchronization under GPC control Supports lock/release, Fetch and Add etc. Great fit for IPSEC

NITROX II Robust Statistics Global Counters 32 64-bit counters accessible by GPC Fetch and Add operation Primarily implemented for global statistics Per session (SA) counters Management of per session statistics counters with hardware synchronization Excellent for billing and provisioning

NITROX II QOS and Multi-service Support Quality-of-service support Per virtual port queues Per virtual port back pressure mechanisms. Thresholds for denial-of-service type of traffic. Multi-service and multi-protocol support GPCs can be grouped into 8 different groups Each group can process a unique protocol Guaranteed bandwidth support Guaranteed bandwidth can be achieved with the help of per port queues and groups Queues/groups can be dynamically allocated for bandwidth provisioning

NITROX II Trusted Path Support Control Processor Subsystem (optional) Control Processor SPI PCI NITROX N2 II Execution Unit GPC CTL_TWSI TWSI I/F TWSI_CTL EXEC_TWSI TWSI_EXEC Key Memory TWSI Micro TWSI Controller Device PSE_SAFE ZERO_KEYS Smart Card? SPI DDR SDRAM Cryptographic Boundary? Trusted hardware interface and tamper-proof key zeroization Full support for FIPS 140-2 system design Support for key backup, key restore and key pair generation Easy power-on device authentication and key management

NITROX II Low Power Design Low Vdd 1.0 Volts (Nominal) Extensive Power Management Conditionally clocked architecture Functional Block Clocks turned off when not in use Fully Static Design Full custom design yields better smaller circuits saving power. Full custom layout reduces spaghetti routing also saving power. securing networks with silicon

Inline IPsec Solution using NITROX II Control Processor Optional Memory WAN MAC or Framer SPI-3 or SPI-4.2 NITROX II SPI-3 or SPI-4.2 NPU NPU Switch Fabric Example: Intel IXF1010 Intel IXF1104 PMC PM3386 Memory Example: Intel IXP 2800 IBM NP4GS3 AMCC np7510

2xGE Server Secure IPsec NIC SYSTEM Memory GE GE MAC / PHY SPI 3 NITROX II PCI-X Chipset Memory Server CPU

Cavium s Flow Through SSL Solution High End SSL Based Secure Content Processing WAN Complete SSL Termination SSL Context LAN GE/POS GE/POS NPU NITROX II SPI-3 / 4.2 SPI-3 / 4.2 NPU TCP Termination Content Processing

Cavium Summary Industry's Largest family of security processors Family for Low (50Mbps) to High (over 10Gbps) Performance security True Inline high performance security processor Aggressive Roadmap to extend lead ahead of competitors Reducing cost, driving features, horizontal integration, and performance Flexible Solution to support emerging standards for Security centric applications Well Positioned to take lead in security processing market by 2004

Thank You securing networks with silicon