L7 Networks, Inc. was founded in 2002 by a group of talented IT experts and three investing corporations, including D-Link, ZyXEL, and Advantech. These three corporations have been dedicated themselves to layer-2 to layer-4 data communication and telecommunication fields for decades. Our current mission is to focus on the fields of layer-7 content network security. L7 Networks is to be the best software solution provider by delivering innovative and scalable network security solutions.

CONTACT >

T: +1 (917)  767-0420

E: service@L7-Networks.com

© 2018 by L7 Networks Inc.

ABOUT US >

InstantQoS™ - Unified Performance Management

L7's InstantQoS UPM solution aims to maximize business network management efficiency and network fault troubleshooting capability by providing business-centered network supporting environment review, real-time performance monitoring and quick detecting of network fault. L7 InstantQoS UPM collects all real-time analysis data from devices which are deployed distributedly at each network node and provides operations staff with vivid and graphic working status of every application in the business network.

Drill-Down Based Visibility

REALTIME TOOL TO VISUALIZE PERFORMANCE BOTTLENECKS

L7 gives you the ability to display realtime traffic in many drill-down sequence, such as from app category to app to IP to session, or from IP subnet to IP to app to session. All these drill-down sequences display the bandwidths of each level with refresh rates of 3 seconds, 5 seconds, 10 seconds or manual. Whenever users complain about their network latency, you've got the tool to quickly identify the performance bottlenecks, including: In what bandwidth pipe his/her connections are? How full the bandwidth pipe is? It's only when you know your network then you can do accurate decisions to setup policy rules.

DFI Technology, Beyond DPI

DEEP FLOW INSPECTION WITH LAYER-8 AWARENESS

Traditional DPI (Deep Packet Inspection) based solution cannot accurately correlate information across packets of the same connection. Such information like packet sequence, size, pseudo-match status are useful to recognize encrypted traffic flows. DFI (Deep Flow Inspection) technology is employed to classify packet-based information into connection-based flow information. For web traffic, including http and https connections, FQDN is analyzed into layer-8 information, such as web categories like Video, Portal, Finance, .... The web category field can also be identified as a condition in a policy.

Recognize Evasive Application Traffic

10G WIRE-SPEED CLASSIFICATION

Aside from traditional web and email applications, Peer-to-Peer (P2P) streaming / downloads and Instant Messengers (IM) have become the major Internet applications. IM such as Whatsapp / Facebook Messenger, Skype, WeChat, Line, to communicate with friends, and P2P such as BitTorrent / eMule to download files. However, P2P often consumes a huge amount of bandwidth. "Eat-all-you-can-eat" style of bandwidth consumption makes internal networks and external networks face the challenges. Bandwidth at external networks is occupied by P2P so mission-critical applications cannot obtain adequate bandwidth. Internal subscribers compete for the limited bandwidth at external networks, causing unfairness among the internal subscribers. For telecom operators and campus network administrators, simultaneously solving internal and external bandwidth problems becomes the most critical demand.

Flexible Installation

TRANSPARENT / INLINE MODE OR PORT-MIRROR / SNIFFER MODE

For traffic analysis you can simply mirror the target traffic you want to know to the InstantQoS UPM. After deep analysis, you may want to set policy rules to control the bottlenecks. Switching the device from sniffer mode to inline mode to make policy rules effective. The InstantQoS devices are equipped with hardware bypass module to avoid network interrupts due to hardware failures. It also features a reset watchdog IC that can be programmed to immediately reboot after any severe system failures. During the reboot process, the hardware bypass will also automatically work to avoid network interrupts.