(Log Management)

Organize and Mediate
Any Device, Any Network
Any Vertical

Scale your existing Core System flexibly to provide end-to-end Log Management Solution

Adopt IWF System collects, stores, correlates and analyses large volume of network and security event logs for security, auditing and reporting purpose. Log information is immediately available for near real-time security investigations and incident response. It provides end-to-end IP details and subscriber details based on Public/Private IP, MSISDN, BNG IP and Cell ID, etc.

Adopt IWF is also a convergent mediation to process large amount of CDRs and send them to downstream systems like BSS, FMS or RA.

IWF Architecture

Adopt platform is based on microservices architecture which can be deployed at edge, which works in coherence with our distributed cloud controller architecture based on Enterprise need of Security, Regulatory Compliance, Scalability, Network Latency, Maintenance and Troubleshooting.

Key Features

Convergent Online and Offline Collection

Capability of receiving data packets from network nodes using industry standards protocols (Syslog, Netflow, IPFIX, GTP’, Diameter*, Radius) & offline collection through FTP/SFTP protocol.

NAT Log Collector Engine (Data Consolidation)

NAT Log Collector collects information from various CGNAT devices. The CGNAT device pushes the information to the Collector Engine. The Collector Engine facilitates a unique design to support a high volume on the basis of different protocols on a single CPU server.

NAT Log Parsing and Processing Engine

It enriches and converts NAT Logs to the required format, arranging data in an ordered structure into the storage and file system, thus enabling run time correlation to initiate faster queries on the data. It parses and processes different types of file format like Syslog, Binary, CSV, Zip, ASN.1 and supports the processing of CDRs as well as firewall logs with millions of PDPs that can be stored for a year.

Error Handling

Exhaustive error handling to manage erroneous data records at each stage. Other capabilities include search erroneous files, alarm & notifications and error re-processing.

Filtration and Enrichment

With support for filtration of data based on pre-defined rules. Enrichment is also done through Look Up Table.

Data Analytics and Reporting

Working on quantitative methods and evidence-based information, it collects data from multiple platforms providing diversified graphical reports for easy decision making and predictive analytics.

LI Query Search / Advanced Search

Enables the following types of search such as LI Query Search, Advanced Search & Sliding Window Search. There are various CDR fields that can be stored/added for the operators and the vigilance agencies.

Ability to identify legitimate value from reference table for reporting, rating and reconciliation purpose/segments.

Secured and Efficient File System

Secured File System supports a unique feature of “write once read many”, once the data is entered; it cannot be edited or deleted for security purpose.

Efficiently manages files of multiple format as well as capability to support file splitting, file merging, file purging, etc.

Managing Alerts and Records

Manages real time alerts and traffic records related to packet request/template or pending request. Real-time alerts are generated in case of malfunctioning of the system, on occurrence of specific events via SNMP v1/v2. These alerts and records keeps the operator updated with specific event that has occurred so that the appropriate action can be taken for the same.

Integration with 3rd Party Network Elements

In order to correlate the data, subscriber information is obtained from AAA, CGF/Mediation or some other system that contains the usage information. If the data is available both with the 3rd party system and is also locally stored, the correlation engine fetches the data from 3rd party system whenever required.

User-Friendly GUI-based Operations

A simple, user-friendly and easy to operate GUI that allows users to achieve complete information such as MSISDN, MAC ID, IMEI, Public IP, Private IP, Gateway IP, Location and Access ports along with end–to-end IP details. It also provides GUI based access for Nodal officers and vigilance agencies along with the support of single reporting GUI for multiple IWF system deployed. Making configuration changes review dashboards can be done on single-click.

IWF Key Benefits:

Carrier Grade Reliability and Proven Performance

Investigation teams and vigilance authorities can easily achieve complete information of users

Improved security through a reduced attack surface, real-time monitoring and improved detection and response times

Ease in operations – Reduced severity of business interruptions

Improved observability and visibility across the enterprise through a common event log

Flexibility in search logic, ensuring faster search results

Provides capability to filter, analyze and generate reports based on log messages

Optimum and unified storage for huge data traffic supporting millions of PDP sessions

Manage long-term Log data storage in database file system for over a year

Highly customized Software Application based solution

Faster and more precise troubleshooting capabilities through advanced network analytics

Key Highlights:

Easy Integration:
Easy integration with standard network elements with no additional cost incurred

99.9999% availability of live use cases with horizontal and vertical scalability

Microservices Architecture:
A pluggable and modular architecture with fault tolerance and high availability

Cloud Native Solutions:
With support of Docker and Kubernetes, IWF automates the process of DevOps

Distributed Architecture:
Collection service at different sites and processing at central site to save cost

Easy Management:
Faster and risk free deployments and upgrades on single and / or multiple microservices

Faster Implementation:
Single site IPLogger solution implementation can be done in 2 days in-turn assuring cost effective implementation TAT