TeraVM
TeraVM offers a virtualized solution enabling the flexibility to run anywhere - lab, datacentre and the cloud, with consistent performance coverage, ensuring highly optimized networks and services can be delivered with minimal risk. This powerful tool can be used for Automation and Orchestration, Cybersecurity Threat and Malware Penetration, Secure Access Firewall/VPN Testing, Wireless Core Interface Testing and Wireless RAN and Core Emulation.
TM500 offers comprehensive testing across the entire protocol stack, from the physical layer to NAS and application layers.
We provide detailed statistics and logs from various layers of the protocol stack, coupled with advanced data processing. This enables you to quickly address issues and reduce the risk of deployment delays.
VIAVI delivers a suite of solutions to enhance test strategies, maximize engineering productivity, and equip you with the right tools for rapid delivery of high-performance, ultra-reliable products. With VIAVI you can achieve your objectives and showcase exceptional quality and cutting-edge capabilities to your customers.
1000
GBPS AND BEYOND TEST BED
80%
UTILIZATION OF TEST ASSETS
5
FIRST TO MARKET NFV TEST SOLUTION
TeraVM Core Emulator
TeraVM Core Emulator can remove the pain of 5G Core Network dependencies by giving RAN engineers a controllable and repeatable test environment that helps implement 3GPP standards rapidly and simplify the development lifecycle of 5G gNBs and the introduction of 5G services to the market.
The VIAVI TeraVM Core Emulator adds to the capabilities of industry-standard TM500 test mobile to provide a full wrap-around test of a 5G gNB for both non-standalone (NSA) and standalone (SA) modes. Find out more
TeraVM Core Test
TeraVM 5G Core Test provides fully configurable emulation of thousands of base stations, millions of UE's and user applications to create the most realistic 5G RAN environment to stress the core. Full support for 3GPP interfaces such as N1, N2, N3 and N6 enables the tester to accurately emulate UE applications and mobility behaviour for inter-5G and inter-RAT scenarios. Find out more
TeraVM O-CU Tester/DU Simulator
The O-RAN ALLIANCE is promoting the disaggregation of the gNB into three distinct, open and standardized elements. The TeraVM O-CU Tester provides a comprehensive validation test suite for the O-CU element of the disaggregated gNB. Find out more
TeraVM Classic
Cybersecurity and Resilience - TeraVM provides scalable real-world application and threat emulation which leverages veritable internet threats from popular Common Vulnerability and Exposure (CVE) repositories. Find out more
Secure access and application integrity - TeraVM supports both clientless (SSL/TLS/DTLS) and client (IPsec IKEv1/ v2) orientated VPNs, with the ability to validate performance using a number of algorithms. Find out more
Migrate to NFV with confidence - With TeraVM's NFV test solution you can ensure performance, reliability and predictability for your virtualised network functions Find out more
Post Quantum Cryptography
The implementation of Post-Quantum Cryptography (PQC) protocols introduces additional network performance overhead, impacting end-user experience. Testing is essential for developing and deploying cryptographic systems, including PQC-based ones. Post-Quantum Cryptography aims to create secure algorithms against quantum computer threats. Testing assists in several key areas for Post-Quantum Cryptography:
Security Assurance
Algorithm Resistance Testing verifies PQC algorithms' resistance against cryptographic attacks. This includes testing the algorithms under different scenarios, including those that utilize classical and quantum algorithms, to evaluate their resilience.
Performance Evaluation
Computational Efficiency: Testing evaluates PQC algorithms' computational efficiency. This includes measuring encryption/decryption speed, key generation speed, and overall system performance. Ensuring the efficiency of PQC algorithms is crucial for widespread adoption in practical applications.
Interoperability Testing
Integration with Existing Systems: Cryptographic systems often require interaction with established infrastructure and protocols. Testing is essential to guarantee the seamless integration of PQC algorithms into diverse systems, avoiding compatibility issues.
Standardization Compliance
Adherence to Standards: testing confirms PQC algorithms' compliance with established cryptographic standards, promoting interoperability and consistent implementation across platforms.
Features
TeraVM enables customers to:
- Build an elastic test bed which scales both vertically as well as horizontally
- Scale vertically from 1 Gigabit per second up to 1 Terabit per second
- Scale horizontally across test locations e.g. same building or geo-location
- Centrally manage and allocate test resources via a license server
- Gain higher utilization rates of a single test bed through license sharing
TeraVM is 100% virtual
- Same test tool used to test physical solutions and/or virtual solutions
- Supports all major hypervisors - ESXi, KVM
- Supports all major cloud platforms - OpenStack, AWS, MS-Azure, Google Cloud, Oracle OCI, Containerization
- Supports 1 GbE, 10 GbE, 40 and 100 GbE NICs Automation and Orchestration
- REST, CLI, Perl, TCL, XML, Java API, Python, Jython
- Cisco LaasNG, Cisco pyATS, Qualisystems (CloudShell) L2-7 Stateful Traffic Application Emulation
- Voice: CUCM, CUBE, VoIP, WebEx, VoLTE, SIP & RTP, MOS
- Video: CMTS, CDN, Multicast, AMT, ABR, IPTV, VoD, OTT streaming, Video conferencing, WebEx, TelePresence, HTTP Video
- Data: TCP/UDP, Teraflow, Ookla speed test, HTTP/HTTPS, SMTP/POP3, FTP, P2P, DNS, Quick UDP Internet Connections (QUIC) Secure Access Firewall/VPN (ASA Firewall, FirePOWER)
- Secure TCP/UDP Protocols (SSL, TLS, DTLS, IPSec IKE)
- Client and Clientless VPNs (Cisco AnyConnect SSL and IPsec)
- 802.1x EAP-MD5, EAP & PEAP with MS CHAPv2 Authentication
- Mobile Secure Gateway validation (S1-U over IPSec) Cybersecurity Threat and Malware Penetration
- 40,000+ attacks (Spam, Viruses, DDoS, Malware), updated monthly
- DDoS attack applications:
- Flood: SYN, Reflective SYN, Reset, UDP, Ping, ARP
- Attacks: Teardrop; UDP Fragmentation; Configurable Rates, Start and Stop
- Spoof Mac addressing
- Mixed application flows: Good, the Bad and your Own
Wireless RAN and Core Emulation
- vRAN: 5G-NR, 4G-LTE, 3G, 2G - 1,000s of RANs
- vCORE: 5G (NSA & SA), 4G-LTE 3G, 2G, Mobility, SecGW, MEC Network Slicing – Millions of UEs and Bearers
- CIoT: IPDD over NAS, NIDD over SCEF at Scale
- WiFi ePDG offload (EoGRE)
Wireless Core Interface Testing
- Support testing across multiple key Core interfaces
- Error Injection over 5G-N2 (AMF)
- Error Injection over 4G-S1 (MME)
Related Products
Support at Every Step
We provide support, services, comprehensive training and the resources you need. It’s all part of what we do to maximise the value of your VICOM investment.
Services
Value-add services that complement your VICOM system solution and instrument portfolio to provide a total cost of ownership.
Customer Care
Customer service that provides Return Material Authorisation (RMA) for repair and calibration.
Training
Technical education solutions, product training, and blended learning for technicians who are using new products or working with existing tools
Technical Assistance
Technical Assistance Center to assist you in using/configuring products or address issues regarding product performance
How to get started
Interested in a product demonstration? Contact us for more info, receive a price quote, or find out how to buy.
Contact Sales Expert
Request a Quote







