Applied Services Processor (ASP) 8200 Series Scalable Data Reduction and Security Solutions For Storage and Networking Applications 8200 Series continues the proven line of Exar’s compression and security processors for storage and networking applications With the flexibility of LZS, eLZS, and Deflate compression, as well as a rich set of encryption and hashing/authentication algorithms, the 8200 series processors make an ideal fit for both storage and networking applications ranging from SOHO to Enterprise Markets. The 8200 series makes the perfect choice for off-loading computationally intensive tasks necessary to compress, deduplicate, and secure data in today’s power conscious and performance hungry applications. The product line operates at a power consumption of less than 2 watts, delivers single pass encryption, compression, and authentication performance at multi-gigabit speeds, and includes the latest industry standard PCI-Express interface. Ideal for Storage Applications Today’s storage applications can greatly benefit from the 8200’s ability to both compress and encrypt data. By compressing data customers can optimize bandwidth utilization for cloud storage and increase primary storage capacity for latency sensitive applications like database warehousing. And through encryption, data-at-rest is secured and safe from theft or hacking. In addition, the 8200 series offloads the hash function, thus accelerating and enabling real-time, in-line deduplication. Using deduplication techniques, only a single compressed copy need be stored, resulting in storage capacity optimization ratios that are an order of magnitude better than using data compression alone. Deduplication results in significantly lower acquisition and operational costs, including power, space, and cooling requirements. Deduplication combined with compression also reduces the amount of data that must be sent across a WAN for remote backups, replication, and disaster recovery. Ideal for Networking Applications The 8200 series processors perform the raw encryption, authentication, and compression necessary for multi-protocol packet processing for security protocols such as IPsec and SSL/TLS/DTLS, as well as compression protocols such as IPComp (LZS and Deflate). By performing single pass encryption, compression, and authentication at multi-gigabit speeds, the packet transformation process is greatly accelerated and the computational overhead of the host processor is significantly reduced. STORAGE SYSTEM APPLICATIONS • Consumer/SOHO Network-Attached Storage (NAS) • Enterprise Network-Attached Storage (NAS) • Direct-Attached Storage (DAS) • Storage Area Network (SAN) • Disk backup and archival servers, offering: – Data deduplication – Continuous Data Protection (CDP) – Snapshot and Replication – Disk-to-Disk (D2D) – Virtual Tape Library (VTL) – Content-Addressable Storage (CAS) • Tape backup servers Network APPLICATIONS • Unified Threat Management Appliance • Enterprise Secure Router / VPN gateway • Enterprise VPN Firewall • Data Center Load Balancers • Multi Service Switches • Layer 4-7 switches • Wireless Base Stations • Radio Network Controllers • Carrier Network Security • WAN Optimization appliances In addition, the 8200’s high-performance Public Key (PK) engine offloads the computationally expensive modular exponentiation operations associated with traditional RSA, DSA, DH, ECC operations with no loss of bulk processing performance. Key features of the the 8200 series • Performance and scalability • Power and space efficiency • High availability • End-to-end data protection • Software flexibility 8200 Series Data Reduction and Security ASP www.exar.com Applied Services Processor (ASP) 8200 Series Scalable Data Reduction and Security Solutions For Storage and Networking Applications 8200 Series 8200 Series Key Features Power and Space Efficiency Data Reduction Algorithms • eLZS, LZS, GZIP (Deflate RFC 1951) Encryption / Decryption • AES (128, 192, 256) CBC, GCM, CTR, ECB, XTS-256, XTS-512 • 3DES, DES, ARC4 Authentication • AES-GMAC, -XCBC-MAC • HMAC-SHA-1, -256; HMAC-MD5 • SSL3.0-MAC Hashing for Deduplication • SHA-1, SHA-256 • MD5 • Fine grain power management ensures lowest real-time power consumption per command • Small form factor • No external memory required • Software failover protection (All HW functionality) in case of device failure • End-to-end data integrity (On chip and off chip error detection) • Complete verification of compressed, encrypted and hash data • On Chip Temperature sensor Reliability and Service Features aSIC Specifications Public Key • RSA and DH up to 8k-bits, DSA • ECDH and ECDSA (256-bit, 384-bit, 521-bit) Bus Interface • PCIe x1, x2, x4 • PCIe Spec. Rev. 2.0 compliant, Gen 1 speed (2.5 Gbps) Random Numbers • Hardware random number generator • ANSI X9.31 PRNG Package 196-ball HSBGA Package Dimensions 15x15 mm; 1 mm pitch Suite B Support Broadest set of cryptographic algorithms for government applications • Top Secret: AES-GCM-256/AES-GMAC-256, SHA-384/ HMAC-SHA-384, ECDSA-384, ECDH-384 • Secret (and below): AES-GCM-128/AES-GMAC-128, SHA-256/HMAC-SHA-256, ECDSA-256, ECDH-256 Environmental Specifications • OpenSSL • OpenSwan OS support and Host Utilities Security Performance / Throughput See table below Applications Performance Features • • • • • Open Source Network Temperature and Humidity Available in Commercial and Industrial Temperature SKUs Material Safety Available in Leaded and Lead-Free (RoHS-6) Package options Host Utilities and Compression, hash and encryption in a single pass Hash acceleration for deduplication Up to a combined 32 ASICs per system Automatic load balancing Hardware-assisted command chaining and scatter gather (unlimited buffers) Operating Systems Supported • New SDK simplifies integration and reduces time to market • Intel QuickAssist API Support Ease of Use • • • • Power-on Self Test (POST) DMA and ASIC configuration Error log configuration Demonstration and test application • • • • • • • Windows Server 2003 R2 32/64 bit Windows Server 2008 32/64 bit Red Hat Enterprise Linux 4 32/64 bit Red Hat Enterprise Linux 5 32/64 bit Novell SUSE ELS 9 32/64 bit Novell SUSE ELS 10 32/64 bit OS Abstraction Layer allows easy porting to different Linux Kernel or custom O/S Product Selector Guide Performance (Refer to Note 2) Product Compression Encryption Hash Packet Processing Acceleration Power Model No. Mbps MB/s 1k RSA, Ops/s Lzs elzs Gzip Aes Des, 3des Arc4 SHA-1, MD5 Sha-256 True Rng Ipsec, ipcomp Ssl/tls Typ (W) 8204 6,400 800 14,200 √ √ √ √ √ √ √ √ √ √ Note 1 2.10 8203 3,200 400 7,100 √ √ √ √ √ √ √ √ √ √ Note 1 1.50 8202 1,600 200 3,550 √ √ √ √ √ √ √ √ √ √ Note 1 1.10 8201 800 100 1,775 √ √ √ √ √ √ √ √ √ √ Note 1 0.95 Note 1: Raw crypto/compression performed on-chip; packet header/trailer manipulation performed in software at application level Note 2: Refer to performance application note for specific performance results for each algorithm. E x ar C orporation www.exar.com 48720 Kato Road Fremont, CA 94538 U.S.A. T. +1.510.668.7000 F. +1.510.668.7001 © 2 010 E x ar C o rp o rat i o n F ly 0 311 _ 8 2 x x