TechNet Indo-Pacific 2022 Supporting Partner Opportunities

AFCEA has developed an enhanced suppprogram that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Supporting Partner opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Opportunities, and Branding Opportunities.

Have an idea for a Supporting Partner Opportunity not listed below? We are here to ensure you have the best conference experience. We are happy to create a custom package to meet your specific needs. Let us know your vision, objective and budget and we’ll create a customized opportunity just for you.

The deadline to submit contracts and sponsor artwork is Friday, October 7th.

Continuing Education Course #2: Cloud Packet Mirroring with OpenSource Intrusion Detection Systems (IDS) (Hands-on Lab Exercise)

  • Room: Nautilus Suite (Mid-Pacific Conf Center)
Tuesday, November 01, 2022: 2:30 PM - 4:00 PM


Speaker (confirmed)
Chris Goehring
Customer Engineer
Speaker (confirmed)
Ming Ling
Customer Engineer


Note: A laptop with a recent browser version is required to fully participate in this session

Traffic Mirroring is a crucial feature for security and network analysis. Its functionality is similar to that of a network tap or a span session in traditional networking. In short, Packet Mirroring captures network traffic (ingress and egress) from select "mirrored sources", copies the traffic, and forwards the copy to "collectors".

It is
important to note that Packet Mirroring captures the full payload of each packet and thus consumes additional bandwidth. Because Packet Mirroring is not based on any sampling period, it can be used for better troubleshooting, security solutions, and higher-layer application-based analysis.

To demonstrate how Packet Mirroring can be used with an IDS consider the following example will be presented using OpenSource IDS Suricata.

● A single VPC with 2 subnets, one for mirrored sources and one for the collector

● 2 Web servers created with a public IP address

● 1 Collector server (IDS) created with NO public IP for security reasons

● CloudNAT enabled for Internet access as needed

● All VMs created in the same region and zone, for simplicity


Attendees will learn to do the following:

● Create 2 virtual machines with to act as WEB SERVERS

● Create a single virtual machine to act as IDS

● Create an Internal LoadBalancer (ILB) to act as a "collector" for Packet Mirroring

●Install and configure an Open Source IDS (Suricata) on the IDS VM

● Review some basic IDS alert rules

● Create a Packet Mirror Policy

● Test Packet Mirroring by generating network traffic to the "mirrored" subnet

● Test Suricata IDS by generating network traffic to simulate an IDS event and review IDS logging



Sponsored by:

Approved for 1 CompTIA CEUs: A+, Network+, Security+, Cloud+, and Linux+; 1 GIAC CPE; 1 CertNexus CEC for Cyber First Responder (CFR)