FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability)

Size: px
Start display at page:

Download "FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability)"

Transcription

1 FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability) Overview Fortinet FortiGate -3950B enterprise consolidated security appliance has achieved a BreakingPoint Resiliency Score of 95/100 - the highest published score on record. The BreakingPoint Resiliency Score is a test based on industry standards for performance, security and stability of network and security devices. The BreakingPoint Resiliency Score is presented as a numeric grade from 1 to 100. Networks and devices may receive no score if they fail to pass traffic at any point or they degrade to an unacceptable performance level. The BreakingPoint Resiliency Score establishes standards against which network and security devices are measured. It provides automated, standardized and deterministic methods for evaluating and ensuring the resiliency of networks, network equipment and data centers. The BreakingPoint Cyber Tomography Machines (CTM) provides a standard measurement of the performance, security and stability of networks and data centers using real-world application traffic, real-time security attacks, extreme user load and application fuzzing. The FortiGate-3950B appliance, running FortiOS 4.0 MR3 and utilizing its two built-in 10-GbE interfaces was tested. The evaluation was performed using one BreakingPoint Storm CTM containing one four-port 10-GbE card. The BreakingPoint Resiliency Score validates the performance of Fortinet s network security solutions using metric-based, rigorous real-world testing. Fortinet customers can deploy products with the utmost confidence, as these standards-based evaluations enable enterprises to easily determine the right fit for their environments. As demonstrated by the BreakingPoint Resiliency Score testing, the FortiGate-3950B appliance continues to impress with its security capabilities, scalability, flexibility and stability. For more information on the Fortinet FortiGate-3950B series please visit FortiGate-3950B: Modular Security Platform Download the BreakingPoint whitepaper, A Six-Step Plan for Competitive Device Evaluations here

2 Firewall Resiliency Report 1. Firewall Report Product: Fortinet FortiGate-3950B Resiliency Score: Synopsis Throughput 64: : Lab Real Session Stress Session Rate Stress Rate: Sessions Count: Rate: Rate: Robustness IP: pass UDP: pass TCP: pass Count: Security pass pass pass pass Overall Score Throughput Sessions Measures a device s ability to handle large numbers of TCP sessions and the rate at which it handles them. Robustness Security Overall Score A blended average of all sub-test. This number represents the over score relative to expected performance for the resiliency test.

3 2.1. Score Calculation Overall Score Calculation:(A(93) + B(98) + C(93) + D(100) + E(100) + F(79) + G(100)) / 7 Overall Score = Throughput A) I EEE Throughput measurement of 64 byte frames A = (100 X Throughput Achieved[w/64]) / Max Wireline Throughput = (100 X 9375) / Score = 93 B) IEEE Throughput measurement of 1518 byte frames B = (100 X Throughput Achieved[w/1518]) / Max Wireline Throughput = (100 X 9843) / Score = 98 C) Throughput, Simulated Real World Conditions C = (100 X Application Frames Rate) / Max Application Frames Rate = (100 X ) / Score = 93 Sessions D) Concurrent IETF 793 TCP Connections D = (100 X Number Flows) / Max Number Flows = (100 X ) / Score = 100 E) Concurrent IETF 2581 TCP and IETF 768 UDP Connections E =(100 X Number Flows) / Max Number Flows = (100 X ) / Score = 100 F) IETF 793 TCP Connections/sec F = (100 X Flow Rate / Max Flow Rate = (100 X ) / ) Score = 79 G) IETF 2581 TCP and IETF 768 UDP Connections/sec G = (100 X Flow Rate) / Max Flow Rate = (100 X ) / Score = 100 Robustness H) IETF 7 91 IP Stack Stability H = Dropped Pings Score = pass I) IETF 768 UDP Stack Stability I = Dropped Pings Score = pass J) IETF 79 3 TCP Stack Stability J = Dropped Pings Score = pass Security K) CVE Security F ault Injection, Independent K = Dropped Pings Score = pass L) CVE Security Fault Injection, Benign L = Dropped Pings Score = pass M) CVE Security Fault Injection, Concurrent Sessions Stress M = Dropped Pings Score = pass N) CVE Security Fault Injection, Session Rate Stress N = Dropped Pings Score = pass

4 2.2. Throughput for the device. Network Packet Stress This test will be repeated once with 64 byte and again with 1518 byte packets. These two packet sizes represent the smallest and larget valid packet size for a single network frame. The test begins by transmitting packets at half of the theoretical maximum rate for the given packet size. Any dropped or corrupted packets result in a failed iteration. Testing continues iterating in a binary search pattern;; for each iteration testing at a rate halfway between the last passed test and the last failed test, until a maximum successful rate is found. Benign Realistic Network Packets bandwidth. The test begins by transmitting packets at half of the theoretical maximum rate for the given packet size. Any dropped or corrupted packets result in a failed iteration. Testing continues iterating in a binary search pattern;; for each iteration testing at a rate halfway between the last passed test and the last failed test, until a maximum successful rate is found Sessions TCP Sessions Stress test begins by opening a single TCP session. Every 5 seconds, 1500 additional TCP sessions are attempted, up to a maximum of 10,000,000 concurrent TCP sessions. Once completed, an analysis is made to determine the achieved concurrent sessions based on the measured number of active concurrent TCP sessions. Benign Realistic Network Sessions This test begins by opening a single TCP session, which remains open for the duration of the test. Every 5 seconds 1500 additional TCP sessions are attempted, up to a maximum of 10,000,000 concurrent TCP sessions. Once completed, an analysis is made to determine the achieved concurrent sessions based on the measured number of active concurrent TCP sessions.

5 2.4. Robustness IP Robustness Packets will have random payload ranging in size from 46 to 1500 bytes, and will be transmitted at a rate between 2000 and 2500 packets per second. Data will be transmitted for at least one hour, for a minimum of 5,000,000 distinct the Urgent pointer, and the IP checksum. UDP Robustness of the UDP header in addition to the IP header. Packets will have random payload ranging in size from 46 to 1500 bytes, and will be transmitted at a rate between 2000 and 2500 packets per second. Data will be transmitted for at TCP Robustness This test limits the scope of random testing to Layer 4 by randomizing portions of the TCP header in addition to the IP header. Packets will have random payload ranging in size from 46 to 1500 bytes, and will be transmitted at a rate between 2000 and 2500 packets per second. Data will be transmitted for at least one hour, for a minimum of 2.5. Security Security - Laboratory conditions payloads are blocked or neutered. Security - Benign Realistic Conditions Security - Concurrent Sessions Stress Conditions as measured in the performance baseline. Security - Session Open Rate Stress Conditions performance baseline.

6 2.6. Settings Setting Speed Device Type Run Type Session Rate Robustness Throughput Security Value Gigabits Firewall Full yes yes yes yes Client Routing Server Routing Network: / 24 Min: Max: DUT Address: Network: / 24 Gateway: DUT Address: Network: / 24 Gateway: Network: /8 Min: Max: End of Document -

7 The BreakingPoint Resiliency Score An automated, standardized, and deterministic measure of the performance, security, and stability of network and application infrastructure devices and systems 1

8 Table of Contents Introduction...3 The BreakingPoint Resiliency Score... 3 Resiliency Score Assessment Elements... 3 Prescribed Configuration... 3 Duration... 4 Results... 4 Resiliency Score Phases...4 Phase 1: Throughput Byte Packet Byte Packet Measurement... 5 Real Bandwidth Measurement... 6 Phase 2: Sessions... 6 Basic Concurrent Sessions... 6 Real Concurrent Sessions... 7 Basic Connections per Second... 8 Real Connections per Second... 9 Phase 3: Robustness... 9 IP Stability... 9 UDP Stability... 9 TCP Stability... 9 Phase 4: Security Independent Security Benign Traffic Security Concurrent Sessions Security Session Open Rate Security

9 Resiliency Score Setup...11 Physical Connection Network Configuration Switch Router Load Balancer Proxy Firewall Intrusion Prevention System Unified Threat Manager Summary...14 About BreakingPoint Storm CTM

10 Introduction Organizations want measurable answers, not assurances, when it comes to network and application performance, security, and stability. We have come to expect evaluation and certification of product performance for everything from our phones to our automobiles yet network and application infrastructures and the equipment upon which they rely have no standardized certification for performance and security. Instead, buyers must trust statements made in product marketing literature, which are based on best-case scenarios, not real-world evidence. The BreakingPoint Resiliency Score puts an end to this problem by establishing a standard against which networks and security devices are measured. This document describes a step-by-step approach for determining a BreakingPoint Resiliency Score, as implemented in version 2.0 of the BreakingPoint Storm Cyber Tomography Machine (CTM) firmware. The BreakingPoint Resiliency Score The BreakingPoint Resiliency Score provides an automated, standardized, and deterministic method for evaluating and ensuring the resiliency of networks and network equipment. This feature of the BreakingPoint Storm CTM provides a standard measurement of the performance, security, and stability of every component of the network and data center using real-world application traffic, real-time security attacks, extreme user load, and application fuzzing. A BreakingPoint Resiliency Score is calculated using standards by organizations such as US CERT, IEEE, and the IETF, as well as real-world traffic mixes from the world s largest service providers. A BreakingPoint Storm CTM user simply selects the network or device for evaluation and the speed at which the device or system is required to perform for an automated measurement of resiliency. The BreakingPoint Storm CTM then subjects the device to a battery of simulations using a blended mix of application traffic and malicious attacks, including obfuscations. The BreakingPoint Storm CTM delivers this measurement in the form of a Resiliency Score much like an Underwriters Laboratories (UL) certification. The BreakingPoint Resiliency Score is presented as a numeric grade from 1 to 100. Networks and devices may receive no score if they fail to pass traffic at any point or degrade to an unacceptable performance level. The Resiliency Score takes the guesswork and subjectivity out of validation and allows administrators to quickly understand the degree to which system security will be impacted under load and under the threat of newly evolved cyber attacks. Resiliency Score Assessment Elements There are four phases of the Resiliency Scoring process each with a set of associated measurements that target specific aspects of behavior: Throughput Phase Sessions Phase Robustness Phase Security Phase Prescribed Configuration Because the BreakingPoint Resiliency Score is a standardized measurement designed to maintain the consistency of scores across vendors, the BreakingPoint Storm CTM requires little or no configuration. The user simply chooses a class of device from a set list of options; that choice determines the network configuration that will be used. The user configures their own device to support that network configuration, then selects a bandwidth limit for the device, in 100 Mbps increments. 4

11 Duration The Resiliency Score process can be run in either Full or Quick mode. The Quick option allows the user to work through initial issues without waiting through the turnaround time required for a full resiliency assessment. However, only the Full option provides an actual Resiliency Score. Results Once a full assessment encompassing all elements is complete, resiliency is scored from 0 to 100 by calculating the results from individual phases of the Resiliency Score process. If the network or device fails any part of the assessment, no score is given, and the assessment is declared Failed. Resiliency Score Phases There are four phases of the process for producing a Resiliency Score for a component of a network or data center: Phase 1: Throughput The throughput phase targets the device s basic packet forwarding ability. It consists of three parts: 64-Byte Packet To determine the maximum achievable bandwidth of a device when forwarding 64-byte packets only, the BreakingPoint Storm CTM executes a series of simulations in a binary search pattern. For each one, success or failure is determined based on the following criteria: The number of received frames must equal the number of transmitted frames to ensure that there were no dropped packets. No corrupted frames should be received. Initially, traffic is generated at 50 percent of the user-specified rate of the device. If the device passes this assessment, the next rate attempt is halfway between the initial rate and the maximum rate, or 75 percent of the user-specified rate. If the device fails, the next rate attempted is 25 percent. The process continues for seven iterations to determine the maximum achieved rate within a 1 percent margin of error. The individual score for this portion of the overall Resiliency Score is based on the measured bandwidth of the device and is expressed as the percentage of the measured speed versus the user-configured speed. The results of the 64-byte packet assessment are shown in the following way in section 2.1 of the report: A) IEEE Throughput measurement of 64 byte frames A = max(100,100 * Speed(999) / MaxSpeed(1000)) = Byte Packet Measurement Next, a second binary search is run with the frame size set to Aside from the frame size, this component runs identically to the 64-byte packet assessment and is scored the same way. The results below are provided in the final report: B) IEEE Throughput measurement of 1518 byte frames B = max(100,100 * Speed(999) / MaxSpeed(1000)) =

12 Real Bandwidth Measurement For the final part of the Throughput Phase, the device s throughput is measured when presented with a realistic blend of application traffic. The BreakingPoint Application Simulator transmits at a bandwidth no higher than the user-configured maximum, with maximum concurrent sessions set to 10,000,000, and a load profile set to control the session open rate. For a full Resiliency Score, the load profile begins by opening sessions at a rate of 100 sessions per second. Every 5 seconds, the attempted open rate is increased by another 100 sessions per second, until 750,000 sessions per second is reached. The quick version of the assessment proceeds in a similar way, except the initial rate is 10,000, and the attempt rate is increased by 10,000 every five seconds. The bandwidth achieved is determined by searching for the maximum measured received frame rate that was sustained for at least three seconds. This bandwidth achieved is factored into the score as a percentage of the configured bandwidth and is also used as a basis to determine the rate of some subsequent processes, as detailed below. C) Throughput, Real C= max(100,100 * Application Frame Rate( ) / Max Application Frame Rate(150000)) = Phase 2: Sessions The Sessions Phase of the Resiliency Score focuses on the device s ability to support UDP and TCP sessions, in terms of both rate and number of concurrent sessions. Basic Concurrent Sessions During the Sessions Phase, the ability of the device to process straightforward TCP sessions is determined using BreakingPoint Session Sender. The bandwidth limit is set to the user-configured speed for the device. The steady-state behavior for the TCP sessions is set to Hold, so that sessions stay open for the duration of the assessment. A load profile is generated to control the maximum number of concurrent sessions. For a full Resiliency Score, 5,000 sessions are opened at the beginning. Every five seconds, 5,000 more sessions are opened, up to a maximum of 10,000,000 concurrent sessions. Once the 6

13 maximum is reached, the sessions are held open for an additional 30 seconds before wrapping up the assessment. A quick Resiliency Score follows similar behavior, except that it starts with 500,000 sessions and adds another 500,000 every five seconds. For scoring, the maximum achieved number of concurrent sessions that was sustained for at least three seconds becomes the measured maximum. This is applied to the score as a percentage of the 10-million-session maximum. D) Concurrent IETF 793 TCP Connections D = max(100,100 * Number Flows( ) / Max Number Flows( )) = Real Concurrent Sessions The Sessions Phase also measures the number of concurrent TCP sessions supported by the device using the BreakingPoint Application Simulator and the BreakingPoint Enterprise application profile. The bandwidth limit is set to the user-configured speed for the device. Again, the steady-state behavior for the TCP sessions is Hold, so that they stay open for the duration. The operation is identical to the BreakingPoint Session Sender assessment. E) Concurrent IETF 2581 TCP and IETF 768 UDP Connections E = max(100,100 * Number Flows( ) / Max Number Flows( )) =

14 Basic Connections per Second The basic connections per second measurement uses BreakingPoint Session Sender to generate the simple TCP connections required to measure the maximum rate at which the device can open new TCP connections. The bandwidth limit for BreakingPoint Session Sender is set to the user-specified rate for the device, and the maximum number of cumulative sessions is set to 10,000,000. When performing a full Resiliency Score, this process begins by opening TCP sessions at a rate of 100 per second. Every five seconds, the attempt rate is increased by another 100 sessions per second. This continues until the attempted rate is 750,000 connections per second. Once the maximum is reached, the process continues at that rate for 30 more seconds. The Quick resiliency assessment is conducted in a similar way, except that the rate starts at 10,000 and is increased by another 10,000 every five seconds. For scoring purposes, the BreakingPoint Storm CTM evaluates the maximum achieved connection rate that was held for at least three seconds. Then a rate goal is calculated as follows: For a user-specified bandwidth of more than 1Gbps, the goal is 150,000. For user-specified bandwidths of 1Gbps or less, the goal is the bandwidth in Gbps times 150,000. For example, for a user-specified bandwidth of 500Mbps, the goal would be half of 150,000, or 75,000. The maximum measured rate is then incorporated into the score as a percentage of the determined goal: F) IETF 793 TCP Connections/sec F = max(100,100 * Number Flows(181390) / Max Number Flows(150000)) =

15 Real Connections per Second The data from the throughput Real Bandwidth measurement is reused to evaluate real connections per second. The same process is run when either throughput or sessions is measured; when both are measured, the process is run only once, and the data is used for both. The connection rate is scored in a very similar manner to the basic session rate assessment. For scoring purposes, the maximum achieved connection rate that was held for at least three seconds is determined. Then a rate goal is calculated as follows: For a user-specified bandwidth of more than 1Gbps, the goal is 100,000. For user-specified bandwidths of 1Gbps or less, the goal is the bandwidth in Gbps times 100,000. In other words, for a user-specified bandwidth of 500Mbps, the goal would be half of 100,000, or 50,000. The maximum measured rate is then incorporated into the score as a percentage of the determined goal. G) IETF 2581 TCP and IETF 768 UDP Connections/sec G = max(100,100 * Number Flows(120213) / Max Number Flows(100000)) = Phase 3: Robustness Three processes contribute to the robustness score. Each of them is structured very similarly, using a BreakingPoint Stack Scrambler to target a different layer of the network stack. IP Stability To evaluate IP stability, BreakingPoint Stack Scrambler is configured to send corruptions at 12 Mbps, including bad IP version fields, bad IP options, bad urgent pointers, and bad checksums. A diagnostic ICMP ping request is sent every second. The ICMP packet is structured to distinguish it from any other packets, and a count is kept of how many of these are received on the other side. After this process is complete, the count of received pings is compared to the count of transmitted pings. Up to two pings not received are allowed with no penalty. A third missed ping results in one point being subtracted from the overall score. Four pings dropped result in a 10-points deduction, and five or more dropped pings result in a failing Resiliency Score. H) IETF 791 IP Stack Stability H = Dropped Pings = pass UDP Stability The IP stability process is followed by an identical UDP stability evaluation. For this process, however, the target stack is set to UDP. I) IETF 768 UDP Stack Stability I = Dropped Pings = pass TCP Stability For the final robustness assessment, the same process is used to target the TCP stack. This assessment is also scored the same way. J) IETF 793 TCP Stack Stability J = Dropped Pings = pass 9

16 Phase 4: Security The Security Phase measures the device s response to attack using the BreakingPoint Strike Set repeatedly under different network background conditions. For a full Resiliency Score, the strike set Resiliency All CVE Strikes is used. This Strike Set includes all Strikes that are documented as exploits in the CVE database. A Quick resiliency assessment uses the Strike set Backdoor Strikes. Each Security Phase assessment includes a BreakingPoint Stack Scrambler component targeting the TCP layer. This produces diagnostic pings used to measure security capabilities in the same way that robustness is scored: Up to two pings not received are allowed with no penalty; a third missed ping subtracts one point from the overall score; four pings dropped result in 10 points off; and five or more dropped lead to a failing Resiliency Score. Independent Security This measurement is initially conducted using only the BreakingPoint Security component with the BreakingPoint Stack Scrambler in active mode; in other words, there is no background traffic. K) CVE Security Fault Injection, Independent K = Dropped Pings = pass Benign Traffic Security Next, the same process is executed with the addition of BreakingPoint Application Simulator and the BreakingPoint Enterprise application profile. Maximum attempted sessions per second, maximum number of concurrent sessions, and throughput are all configured to a value that is half of the maximum measured in the Real Bandwidth / Real Sessions per Second process. L) CVE Security Fault Injection, Benign L = Dropped Pings = pass Concurrent Sessions Security The previous process is run again, but this time with BreakingPoint Security and Stack Scrambler components, as well as BreakingPoint Application Simulator with the maximum attempted sessions per second and the throughput both configured to a value half of the maximum measured in the Real Bandwidth / Real Sessions per Second process. The number of concurrent sessions for Application Simulator is set to 10,000,000. M) CVE Security Fault Injection, Concurrent Sessions Stress M = Dropped Pings = pass Session Open Rate Security Finally, the process is executed once more with BreakingPoint Security and Stack Scrambler components, as well as BreakingPoint Application Simulator with the maximum number of concurrent sessions and the throughput both configured to a value half of the maximum measured in the Real Bandwidth / Real Sessions per Second process. The maximum session open rate is configured to 750,000 sessions per second. N) CVE Security Fault Injection, Session Rate Stress N = Dropped Pings = pass 10

17 Resiliency Score Setup Physical Connection The device under evaluation should be connected via two of its interfaces to the BreakingPoint Storm CTM. These connections will be referred to as Physical Interface 1 and Physical Interface 2, based on the interface reservation on the BreakingPoint Storm CTM. Figure 1 - Physical Connection to the BreakingPoint Storm CTM Network Configuration In preparation for the Resiliency Score process, the device that will be evaluated must be configured to support the following network configuration. Switch The network configuration used to evaluate a device classified as a switch will be made up of two separate IP ranges within the same subnet, both directly attached to the device s network, as illustrated below: Figure 2 - Logical Network, Switch 11

18 Router The network configuration used to evaluate a device that is classified as a Router is made up of two ranges of hosts in nonlocal networks. Each will arrive at the device via a router attached to a separate local subnet of the device. Traffic should be routed through gateway IPs on the device, as follows: Figure 3 Logical Network, Router Load Balancer The network configuration used to evaluate a device that is classified as a Load Balancer includes: Traffic that originates from a network of client addresses in a nonlocal subnet. Client addresses that reach the device being scored via a router on a local subnet of interface 1. Traffic from the clients addressed to a single public IP address on interface 1 of the device being assessed. A device being assessed that is expected to translate the destination address to one from a pool of addresses within a local subnet on interface 2 of the device being assessed. Requests within the destination address that are handled by a set of hosts that are simulated as a multi-homed host. That is, the set of IP addresses all originate from a single MAC address, avoiding the possibility of overflowing MAC tables on the device. Figure 4 - Logical Network, Load Balancer 12

19 Proxy The network configuration used to evaluate a device that is classified as a Proxy includes: Traffic that originates from a network of client addresses in a local subnet. Client requests that are handled by a set of hosts simulated as a multi-homed host. The set of IP addresses will all originate from a single MAC address, avoiding the possibility of overflowing MAC tables on the device. Server hosts listening on a set of hosts on a nonlocal subnet. Server addresses that are reachable by the device being assessed via a router on a local subnet of interface 2. A device being scored that is expected to translate the source address to one from an unspecified pool, which must be reachable by the server hosts. The specific client addresses are learned as they are observed. Figure 5 Logical Network, Proxy Firewall The network configuration used to measure the resiliency of a device classified as a Firewall includes: Traffic that originates from a network of client addresses in a local subnet Client requests that are handled by a set of hosts that are simulated as a multi-homed host. The set of IP addresses all originate from a single MAC address, avoiding the possibility of overflowing MAC tables on the device. Server hosts that will be listening on a set of hosts on a nonlocal subnet. Server addresses that are reachable by the device being assessed via a router on a local subnet of interface 2. A device being assessed that is expected to translate the source address to one from an unspecified pool, which must be reachable by the server hosts. The specific client addresses are learned as they are observed. Figure 6 Logical Network, Firewall 13

20 Intrusion Prevention System The network configuration used to measure the resiliency of an Intrusion Prevention System includes two separate IP ranges within the same subnet, both directly attached to the device s network as illustrated below: Figure 7 - Logical Network, Intrusion Prevention System Unified Threat Manager The network configuration used to evaluate a device classified as a Unified Threat Manager will be made up of two ranges of hosts in nonlocal networks. Each will arrive at the device being assessed via a router attached to a separate local subnet of the device being assessed. Traffic should be routed through gateway IPs on the device, as follows: Figure 8 Logical Network, Unified Threat Manager Summary Based on insights into global network traffic profiles and using standards from US CERT, IEEE, and the IETF, the BreakingPoint Resiliency Score provides an easy-to-produce and defensible measurement of the resiliency of networks and network devices and servers. A Resiliency Score can be produced only with the BreakingPoint Storm CTM, as it is the only product capable of producing the blended mix of application traffic, malicious attacks, user load, and application fuzzing required to understand how devices will perform in today s global networks. 14

21 About BreakingPoint Storm CTM BreakingPoint has pioneered the first Cyber Tomography Machine with the introduction of the BreakingPoint Storm CTM. This innovative product enables users to see for the first time the virtual stress fractures lurking within their cyber infrastructure through the simulation of crippling attacks, high-stress traffic load, and millions of users. The BreakingPoint Storm CTM exposes previously impossible-to-detect vulnerabilities within cyber infrastructure components before they are exploited to destroy what is most important to you your customer data, your assets, your reputation, and even national security. BreakingPoint Storm CTM is delivered in a three-slot chassis that provides the equivalent performance and simulation of hundreds of racks of servers: 40 Gigabits per second of blended stateful application traffic 30 million concurrent TCP sessions 1.5 million TCP sessions per second 600,000+ complete TCP sessions per second 80,000+ SSL sessions per second 130+ stateful applications 4,500+ live security strikes Contact BreakingPoint Learn more about BreakingPoint products and services by contacting a representative in your area U.S. Toll Free BreakingPoint Global Headquarters 3900 North Capital of Texas Highway Austin, TX salesinfo@breakingpoint.com tel: toll-free: BreakingPoint EMEA Sales Office Paris, France emeasales@breakingpoint.com tel: BreakingPoint APAC Sales Office Suite 2901, Building #5, Wanda Plaza No. 93 Jianguo Road Chaoyang District, Beijing, , China asiasales@breakingpoint.com tel:

A Six-Step Plan for Competitive Device Evaluations

A Six-Step Plan for Competitive Device Evaluations A Six-Step Plan for Competitive Device Evaluations How to Evaluate and Select the Best Content-Aware Network or Security Devices for Enterprise, Federal, and Carrier Infrastructures BreakingPoint Enterprise

More information

WHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance

WHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance WHITE PAPER How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance www.ixiacom.com 915-3132-01 Rev. B, June 2014 2 Table of Contents Network Functions Virtualization (NFV): An

More information

TEST METHODOLOGY. Network Firewall Data Center. v1.0

TEST METHODOLOGY. Network Firewall Data Center. v1.0 TEST METHODOLOGY Network Firewall Data Center v1.0 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls In The Data Center... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

Cyber Range Training Services

Cyber Range Training Services Cyber Range Training Services Table of Contents Train Like You Fight... 2 The Global Cyber Range Imperative... 3 Why Traditional Approaches Have Failed... 3 A Pragmatic Strategy for Arming and Training

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Gregory Fresnais Director of International Business Development Email: gfresnais@bpointsys.com,

More information

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................

More information

TEST METHODOLOGY. Hypervisors For x86 Virtualization. v1.0

TEST METHODOLOGY. Hypervisors For x86 Virtualization. v1.0 TEST METHODOLOGY Hypervisors For x86 Virtualization v1.0 Table of Contents 1 Introduction... 4 1.1 The Need For Virtualization... 4 1.2 About This Test Methodology And Report... 4 1.3 Inclusion Criteria...

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Gregory Fresnais gfresnais@bpointsys.com +33672510922 Director of International Business Development BreakingPoint Systems

More information

How To Test A Ddos Prevention Solution

How To Test A Ddos Prevention Solution TEST METHODOLOGY Distributed Denial- of- Service (DDoS) Prevention v1.0 Table of Contents 1 Introduction... 5 1.1 The Need for Distributed Denial- of- Service Prevention... 5 1.2 About This Test Methodology

More information

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition Comparative Performance and Resilience Test Results - UTM Appliances Miercom tests comparing SG Series appliances against the competition Overview Firewalls not only provide your first line of defense

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Firewall Testing Methodology W H I T E P A P E R

Firewall Testing Methodology W H I T E P A P E R Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

NETWORK FIREWALL TEST METHODOLOGY 3.0. To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs.

NETWORK FIREWALL TEST METHODOLOGY 3.0. To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs. NETWORK FIREWALL TEST METHODOLOGY 3.0 To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs.com 2011 NSS Labs, Inc. All rights reserved. No part of

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

The Fundamentals of Intrusion Prevention System Testing

The Fundamentals of Intrusion Prevention System Testing The Fundamentals of Intrusion Prevention System Testing New network-based Intrusion Prevention Systems (IPS) complement traditional security products to provide enterprises with unparalleled protection

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Unified Threat Management Throughput Performance

Unified Threat Management Throughput Performance Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Configuring IPS High Bandwidth Using EtherChannel Load Balancing Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

UK Interconnect White Paper

UK Interconnect White Paper UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module

More information

First Line of Defense to Protect Critical Infrastructure

First Line of Defense to Protect Critical Infrastructure RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information

Security Labs in OPNET IT Guru

Security Labs in OPNET IT Guru Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project

More information

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Johnnie Chen Project Manager of Network Security Group Network Benchmarking Lab Network Benchmarking Laboratory

More information

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0 TEST METHODOLOGY Distributed Denial-of-Service (DDoS) Prevention v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Distributed Denial-of-Service Prevention... 4 1.2 About This Test Methodology

More information

Introducing FortiDDoS. Mar, 2013

Introducing FortiDDoS. Mar, 2013 Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

School of Information Science (IS 2935 Introduction to Computer Security, 2003) Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Application Delivery Testing at 100Gbps and Beyond

Application Delivery Testing at 100Gbps and Beyond Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements

More information

Business Case for S/Gi Network Simplification

Business Case for S/Gi Network Simplification Business Case for S/Gi Network Simplification Executive Summary Mobile broadband traffic growth is driving large cost increases but revenue is failing to keep pace. Service providers, consequently, are

More information

Guideline on Firewall

Guideline on Firewall CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report July 2006 Report 060725 Product Category: WAN Optimization Appliances Vendors Tested: Citrix Systems TM Riverbed Technology TM Key findings and conclusions: The WANScaler 8800

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;

More information

Spirent Journal of Cloud Application and Security Services PASS Test Methodologies. June 2011 Edition. February 2011 Edition PASS

Spirent Journal of Cloud Application and Security Services PASS Test Methodologies. June 2011 Edition. February 2011 Edition PASS Spirent Journal of Cloud Application and Security Services PASS Test Methodologies June 2011 Edition February 2011 Edition PASS Introduction Today s Devices Under Test (DUT) represent complex, multi-protocol

More information

Mail Gateway Testing. Test Plan. 26601 W. Agoura Rd. Calabasas, CA 91302 (Toll Free US) 1.877.FOR.IXIA (Int'l) +1.818.871.1800 (Fax) 818.871.

Mail Gateway Testing. Test Plan. 26601 W. Agoura Rd. Calabasas, CA 91302 (Toll Free US) 1.877.FOR.IXIA (Int'l) +1.818.871.1800 (Fax) 818.871. Mail Gateway Testing 26601 W. Agoura Rd. Calabasas, CA 91302 (Toll Free US) 1.877.FOR.IXIA (Int'l) +1.818.871.1800 (Fax) 818.871.1805 www.ixiacom.com Test Plan Copyright 2006 by Ixia All rights reserved

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform

IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia

More information

FortiDDos Size isn t everything

FortiDDos Size isn t everything FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One

More information

IxLoad: Advanced VoIP

IxLoad: Advanced VoIP IxLoad: Advanced VoIP IxLoad in a typical configuration simulating SIP endpoints Aptixia IxLoad VoIP is the perfect tool for functional, performance, and stability testing of SIPbased voice over IP (VoIP)

More information

1 Network Service Development Trends and Challenges

1 Network Service Development Trends and Challenges 1 Network Service Development Trends and Challenges Mobility 1. Shift the focus from technology, device, and connectivity to services and user experience. Cloud Computing 2. Shift from single-point security

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

TECHNICAL NOTE. FortiGate Traffic Shaping Version 2.80. www.fortinet.com

TECHNICAL NOTE. FortiGate Traffic Shaping Version 2.80. www.fortinet.com TECHNICAL NOTE FortiGate Traffic Shaping Version 2.80 www.fortinet.com FortiGate Traffic Shaping Technical Note Version 2.80 March 10, 2006 01-28000-0304-20060310 Copyright 2005 Fortinet, Inc. All rights

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Chapter 7. Address Translation

Chapter 7. Address Translation Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210

More information

PIOLINK, Inc. PIOLINK, Inc. commissioned The

PIOLINK, Inc. PIOLINK, Inc. commissioned The PIOLINK, Inc. Layer 4/7 Load Balancer, Firewall Performance and Worm Attack Protection Evaluation Premise: Deploying intelligent Layer 4-7 application switch with firewall functionality is not uncommon

More information

Business Case for a DDoS Consolidated Solution

Business Case for a DDoS Consolidated Solution Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

APPLICATION NOTE 183 RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK. www.exfo.com Telecom Test and Measurement. What is RFC 2544?

APPLICATION NOTE 183 RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK. www.exfo.com Telecom Test and Measurement. What is RFC 2544? RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK Bruno Giguère, Member of Technical Staff, Transport and Datacom Business Unit Service providers worldwide are actively turning up new services

More information

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report January 27 Report 7117 Product Category: Data Center Switch Vendors Tested: Cisco Systems F5 Networks Product Tested: Cisco 65 Application Control Engine Module v A.1.3 F5 84

More information

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT Fortinet FortiGate-1500D FortiOS v5.2.2 build 642 Author Ty Smith Overview NSS Labs performed an independent test of the Fortinet FortiGate-1500D

More information

Intro to Firewalls. Summary

Intro to Firewalls. Summary Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

4 Delivers over 20,000 SSL connections per second (cps), which

4 Delivers over 20,000 SSL connections per second (cps), which April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation

More information

Product Summary Report

Product Summary Report Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted

More information

Load Balancing Bloxx Web Filter. Deployment Guide

Load Balancing Bloxx Web Filter. Deployment Guide Load Balancing Bloxx Web Filter Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Firewall Design Principles

Firewall Design Principles Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region

More information

NAT and Firewall Traversal with STUN / TURN / ICE

NAT and Firewall Traversal with STUN / TURN / ICE NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.

More information

IPv6: Network Security and the Next Generation of IP Communication

IPv6: Network Security and the Next Generation of IP Communication IPv6: Network Security and the Next Generation of IP Communication FORTINET IPv6 and Fortinet Solution Guide PAGE 2 Summary Many enterprises have IPv6 adoption on their technology roadmap due to the exhaustion

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

Internet Security Firewalls

Internet Security Firewalls Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter

More information