January 6, 2014 By Brian Fitch 2 min read

Flexible Performance Licensing is a method for licensing throughput on IBM Security Network Protection XGS appliances.  This is a new feature introduced with XGS Firmware 5.1.  Flexible Performance Licensing is currently available on models XGS 3100, XGS 4100 and XGS 5100.

Flexible Performance Licensing allows for the acquisition of a high throughput capable appliance at a lower initial price point.  This can help a customer plan for expected or even unexpected future network growth.

An example of this would be acquiring a XGS 5100 appliance to secure a 10 Gigabit Ethernet (10GbE) network.  However, the customer’s average load on this network is only 10%, or around 1 Gigabit per second.  This customer could purchase a XGS 5100 with a 10GbE Network Interface Module (NIM) and the base performance license, also known as Flexible Performance Level 1 (FPL 1).  FPL 1 entitles the customer to secure up to 2.0 Gigabits per second.  However, in two years, the network throughput is expected to increase to 3.5 Gigabits per second.  With a XGS 5100 entitled to Flexible Performance Level 1, the customer would want to add two additional performance licenses.  The addition of the two performance licenses would permit the XGS 5100 appliance to be moved to Flexible Performance Level 3 and secure up to 5.0 Gigabits per second.

Flexible Performance Licensing has no impact on how much actual network traffic any XGS appliance can pass.  This value is represented by the “Maximum Throughput” row on the XGS appliance datasheet.  Flexible Performance only affects how much of that traffic is being secured.  If network traffic is above the Flexible Performance limit, the inspection engine may pass the traffic that is over the limit without being inspected.

Flexible Performance Licenses are designed to be used on any appliance of the same type.  The license is not fixed to any one appliance.  This means that any XGS 5100 Flexible Performance License can be reclaimed and reused on any other XGS 5100.  A XGS 5100 Flexible Performance License cannot be used on a different appliance type, such as a XGS 4100.

Changing from one Flexible Performance Level to another does not require a reboot or any other change to the XGS appliance.

To see each XGS appliance’s performance capacity and the different Flexible Performance License levels for each appliance, please refer to the XGS appliance datasheet.

More from Mainframe

How dangerous is the cyberattack risk to transportation?

4 min read - If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and subway routes. The results could be terrible. Between June of 2020 and June of 2021, the transportation industry witnessed a 186% increase in weekly ransomware attacks. In one event, attackers breached the New York Metropolitan Transportation Authority (MTA) systems. Thankfully, no one was harmed, but incidents like these are cause…

Low-code is easy, but is it secure?

4 min read - Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and money savings. But with all this software out there, security experts worry about the risks. The global low-code platform market revenue was valued at nearly $13 billion in 2020. The market is forecast to reach over $47 billion in 2025 and $65 billion in 2027 with a CAGR of 26.1%. Very few,…

Starting From Scratch: How to Build a Small Business Cybersecurity Program

4 min read - When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services.However, while it might be helpful to have a managed service provider handle your software and computing issues, cybersecurity for small and medium businesses (SMBs) also requires a personal, hands-on approach. While you can continue to outsource some areas of cybersecurity,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today