Call Us: +386 31 302 492

Traffic Management

KROZ – complete solution for providing legitimacy in CSP and ISP networks.


  1. Active DPI analysis solution for integration into the channels of telecoms operator.
  2. Certified hardware system, integrated in existing channels, not demanding changes and not creating bottlenecks in a network. Possible connection schemes: inline bypass or capture of traffic on BGP.
  3. Traffic management by rules from 2 to 7 levels of OSI model.
  4. Purchasing of necessary functional and its extension on the existing equipment.
  5. Possible expansion of the range of services provided by the telecoms operator.


Blocking of prohibited URL

Blocking of prohibited URL – limits the access to the Internet resources that contain the information the dissemination of which is prohibited.

  •  Detailed statistics on the blocked URL (for each access attempt), the ability to export;
  • Full-text URL search (support for regular expressions);
  • Support manual and automated adding URL.

Traffic management

Firewall, setting rules on: blocking, shaping, breaking TCP-connections, redirection, statistics calculation or passing of traffic. The rules include a set of elements:

  • Link layer: MPLS, VLAN, packet length;
  • Network layer: network address, geographic location, protocol, TTL, TOS;
  • Transport layer: a set of ports, TCP-flags;
  • Application Layer: HTTP URL, FTP URL, DNS NAME/CNAME, Internet Messaging, Torrents.

Filtering DoS/DDoS attacks

Protection from against network attacks as a service for the network of telecoms operator and Data Center.

  • Conventional methods of filtration (channel protection, protection of TCP/IP stack server and level of applications);
  • Own innovative methods of dealing with DoS/DDoS attacks and optimization of clients requests to reduce the load on the server;
  • An automated mode whitch does not require human intervention (suitable for 95% of attacks);
  • Reporting to clients – users Dashboard and export the report (in pdf format).

The detection of anomalies

Detection of vulnerabilities and anomalies and BotNet networks, both at the time of their creation and operation on the basis of:

  • Regular expressions;
  • Behavioral and empirical analysis;
  • Deviations from the statistics;
  • Regular inspections.

Extended Statistics

Extended statistics is calculated both on the basis of “raw” packets, and the interaction of NetFlow, BGP, SNMP. 100% control and monitoring of traffic in the network. Display of statistics in real-time mode or for a specified period with wide filtering capabilities:

  • Requested hosts, URLs, file names, etc.;
  • Calculation of trends and changes in hosts and URLs popularity;
  • Identification of  dns/http/ftp/proxy/mail services and the load analysis;
  • Statistics on interaction with neighboring telecoms operators;
  • Interaction with the equipment of telecoms operator: monitoring of interface utilization, CPU utilization, Memory utilization, the instability of the routes, etc.;
  • Possibile network expansion plan.

The main advantages of KROZ:

  • The comprehensive solution provides the deployment and extension of a range of services to manage traffic and to comply with the legislation from a service provider;
  • Minimization of costs due to the combined functionality in one device;
  • Purchasing of necessary functional and its extension on the existing equipment;
  • Warranty service and extension of functional capacity in accordance with changes in legislation.

Scheme of usage “inline bypass”


Scheme of BGP capture traffic



Spodnja Senica 20, 1215 Medvode
Phone: +386 31 302 492
Email: v.lustrek@sntt.si


© 2013 - 2021 Copyright by SNTT Company. All rights reserved. Using information from this site without our consent is prohibited.