Liieren is a purpose-built solution that provides secure, scalable, resilient WAN, plus assures optimal user experience for multiple applications. The Liieren solution comes with a transportable independent secure overlay. This enables the use of broadband Internet with or without traditional MPLS. Therefore, a cloud network for access to both enterprise and cloud applications, plus a business driven orchestration layer for automation with virtual services insertion.

Key Principles of Liieren undelaying structure:

Transport

Liieren builds an overlay fabric which is carrier agnostic as well as transport agnostic. Customers get a consistent WAN built on any transport like MPLS, Broadband, 4G/LTE, VSAT etc. The Liieren platform secures connectivity over all of these transports to build a secure overlay network.

Zero-Trust Security

Liieren is built on the zero-trust model. All of the components mutually authenticate each other and all of the edge devices are authorized before they are allowed into the network. Every packet across the data-plane, control-plane and management-plane that flows through the network is encrypted using SSL and IPSec technologies.

Routing & QoS

Liieren can be deployed in any brownfield or greenfield environment and is capable of running all routing protocols. These protocols can be enabled on the WAN or the LAN side. In addition to the routing protocols, QoS can be enabled on any of the WAN and LAN ports.

Zero Touch Provisioning

All of the Liieren virtual routers are configured and managed using Zero Touch Provisioning. This allows customers to significantly reduce their operational expenses in device activations and maintenance, plus fast deployment.

Open Architecture

Liieren is built on the open architecture concept which provides flexibility of choice for customers to effectively manage their WAN network. With the feature of flexibly managing interfaces, the solution supports REST APIs, SNMP, Netconf, Syslog etc.

Advanced Analytics

Liieren’s analytics layer “Liitics” provides deep insight into the operations of wide area networks including visibility into network operations and application visibility plus availability. In addition, customers can run through various “what-if” scenarios and fine tune their network based on the recommendations.