ICSA Labs Network IPS Certification Testing Report Network IPS Enterprise Certification Testing Criteria - Version 1.4.
|
|
|
- Collin Banks
- 10 years ago
- Views:
Transcription
1 ICSA Labs Network IPS Certification Testing Report Network IPS Enterprise Certification Testing Criteria - Version 1.4 IBM Corporation IBM Security Network Intrusion Prevention System GX Family December 18, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA Replacing NIPS-IBMCORPORA
2 Table of Contents EXECUTIVE SUMMARY... 1 Introduction... 1 Product Overview... 1 Scope of Assessment... 2 Summary of Findings... 2 Certification Maintenance... 2 PRODUCT OVERVIEW... 3 Hardware... 3 Software... 3 TESTING METHODOLOGY HIGHLIGHTS... 4 Background... 4 Security Coverage Tests... 4 Network Performance Tests... 5 Administrative Tests... 6 SUMMARY OF FINDINGS... 6 ANALYST NOTES FROM PATCHED TO GENERALLY AVAILABLE CONCLUSION APPENDIX 1: TOOLS VENDOR PARTNERS CORE IMPACT, Core Security Technologies IXIA XM2 Portable Chassis with IxNetwork and IxLoad applications APPENDIX TESTING INFORMATION Lab Report Date Test Location Product Developer s Headquarters Page i of i
3 Executive Summary Introduction Note: this report, originally published on Dec. 18, 2013 was updated to correct an error in the name of the product family and a couple of formatting issues. Comprehensive enterprise network security is increasingly important. Savvy network and security professionals realize that a strong defense that incorporates deep packet inspection with appropriate real-time action is not optional. These professionals know it is essential to detect and block malicious and other unwanted traffic from entering and damaging the enterprise network, while introducing little latency and allowing valid business traffic to pass unimpeded. These needs are addressed by a class of security devices known as network intrusion prevention systems (network IPS). In attempting to make an informed purchasing decision about a network IPS solution, it is easy to be baffled by the array of features and claims made by network IPS product developers. This is where ICSA Labs adds its value. ICSA Labs has a rich heritage of rigorous security testing and is recognized throughout the world for setting high standards in computer and network security certification testing. For more than 20 years, ICSA Labs has been testing and certifying the world s leading security products against criteria developed with input from key industry stakeholders. The test suite incorporates a proper combination of rigorous security coverage protection, network performance, and administrative testing all aimed at the needs of enterprise end users. The testing brings to bear ICSA Labs considerable security testing expertise. The outcome is a network IPS test set that is thorough, objective, and exacting which produces relevant and useful results benefiting the enterprise end user community. This report documents the testing results for the certified product named below and provides end users with details about how the network IPS solution performed against the full battery of hundreds of test cases each developed to ensure that one or more criteria requirements is met. The network IPS solution is subjected to test cases that combine: vulnerability-focused attack testing; evasion testing; denial-of-service testing; network performance and latency testing; false positives testing; administrative function testing. ICSA Labs understands that ignoring or short-changing one or more of the above areas at best falls short of serving enterprise end users and at worst totally misleads them. Therefore, in addition to comprehensive and relevant testing in the above areas, the capabilities are tested simultaneously, not just in isolation. The test suite mimics the real world conditions in which the network IPS could be deployed. As a result of these considerations, an ICSA Labs Certified Network IPS like the IBM Security Network Intrusion Prevention System GX Family performs its functions well in live networks, not just in the lab. Product Overview When developers build a network IPS they have a very good idea about the kind of end user customer networks for which their product is best suited. End users could benefit from knowing this information as Page 1 of 16
4 well. There are a number of places in a network where one might deploy a network IPS and there are organizations of all different sizes with all kinds of different needs in terms or protection, latency, etcetera. ICSA Labs believes it is important for the end user to be able to marry their own needs to those of developers attempting to satisfy those needs. The information below is a brief overview of what the product developer says about its product(s). IBM Security Network Intrusion Prevention System solutions are designed to stop Internet threats before they impact your business. Preemptive protection protection that works ahead of the threat is available from IBM through its proprietary combination of line-speed performance, security intelligence and a modular protection engine that enables security convergence. By consolidating network demands for data security and protection for web applications, IBM Security Network Intrusion Prevention System solutions serve as security platforms that can reduce the cost and complexity of deploying and managing point solutions. Scope of Assessment During this test iteration the IBM Security Network Intrusion Prevention System (IPS) GX Family was tested against the complete set of criteria requirements found in version 1.4 of the ICSA Labs Network IPS Enterprise Certification Testing Criteria. All test cases were conducted with the product deployed and configured in a manner similar to that found in enterprise environments. Summary of Findings To attain ICSA Labs Network IPS Certification, IBM overcame five criteria violations. Two were related to logging functions, two related to coverage protection and one related to remote administration. The details of these criteria violations as well as how they were resolved are discussed in the Summary of Findings section of this report. Testing was completed on the IBM Security Network IPS GX Family using firmware version 4.6, XPU and SiteProtector version b3. Certification Maintenance Across testing programs at ICSA Labs, products remain deployed throughout their annual testing contract. This continuous deployment of products, a trademark of ICSA Labs, affords ICSA Labs the ability to test certified and not-yet-certified products whenever necessary. Beyond testing products anytime on demand, many ICSA Labs certification testing programs routinely test products more than a single time throughout the year. For example, ICSA Labs tests anti-virus products every month and antispam products every day. The Network IPS Certification Testing Program is no exception. Network IPS solutions are tested annually against the entire set of 50+ criteria requirements. They are also tested to confirm they provide coverage protection each time the test set changes. Additionally, network IPS solutions are tested to confirm that the fixes resulting from testing are incorporated into shipping code. And finally, network IPS solutions are tested when critical security vulnerabilities arise that merit an out-of-band test. Like this testing report which is produced at the completion of a product s initial test iteration, all reports are available from the ICSA Labs Website for all to review free of charge. Given all the testing performed, not all products are able to maintain their certification. Therefore, ICSA Labs recommends frequently checking the following link for any changes to the certification status of any product: Page 2 of 16
5 Product Overview Hardware IBM provided ICSA Labs with the following hardware: IBM GX this appliance is equipped with four 10/100/1000BaseT copper interfaces that serve as two pairs of mission segments. There also two 10/100/1000BaseT copper interfaces for management functionality. IBM GX this appliances is equipped with eight 10 GbE SFP+ interfaces that server as four pairs of mission segments. There also two 10/100/1000BaseT copper interfaces for management functionality. Software IBM provided ICSA Labs with the following software and/or firmware: IBM Security Network IPS GX Family Firmware Base software of the sensor. Testing began with version 4.4 and completed with version 4.6. Intrusion Prevention XPU Signature package of the sensor. Testing began with XPU and completed with XPU SiteProtector Central management and log server. Testing began with version b225 and completed with version b3 Multiple Network IPS Engine Models Network IPS product developers often build and sell multiple models to attract and accommodate a broad range of customers. Though hardware differences may exist for these models, the software and/or firmware providing the network IPS functionality remains essentially the same. In an effort to be practical while still providing a meaningful level of assurance to end users, ICSA Labs tests two or more from a group of related network IPS models. Prior to testing the developer signs an ICSA Labs attestation form confirming that all the models in the group are indeed the same with respect to meeting the testing criteria requirements. The attestation form coupled with successful testing of at least two models from the group leads to certification for not just the models tested but the entire group. Any remaining models are rotated in-and-out of ICSA Labs such that all models in the group are tested in due time. The following table depicts the entire group of ICSA Labs Network IPS Certified models. The italicized models are the ones that were tested during this and any previous testing iteration. The models listed are subject to change. For the most up-to-date list of certified product models refer to the ICSA Labs Network IPS Certified products on the ICSA Labs Website at IBM Security Network IPS GX Family Models GX GX4004 GX5008 GX5108 GX5208 GX GX GX7412 GX7800 Table 1 - Group of ICSA Labs Network IPS Certified Models Page 3 of 16
6 Testing Methodology Highlights Background Developing a comprehensive network IPS test suite that is relevant to enterprise end users is a complex and lengthy undertaking. In fact, ICSA Labs spent more than a year developing its rigorous network IPS test suite. And we are continually revising and improving it. The test suite is comprised of hundreds of individual test cases focused on three main categories: security coverage tests, network performance tests, and administrative tests. This section provides an overview of the key test cases performed by ICSA Labs in each category. Security Coverage Tests There are thousands of known vulnerabilities with more being discovered every day. Since some vulnerabilities are not remotely exploitable and others are only present in obscure software rarely found in enterprise networks, not all vulnerabilities are relevant for meaningful network IPS testing. To determine the set of vulnerabilities that are most relevant for its testing, ICSA Labs performs research on a regular, ongoing basis. Each developer s solution is tested against attacks targeting this evolving set of remotely exploitable, high-severity vulnerabilities found in enterprise software spanning the last several years. 95% have a CVSS score of 7 or greater. The test set is weighted most heavily with vulnerabilities in software developed by Microsoft (nearly 40%) and includes a wide range of other vulnerable software including vulnerable versions of: Oracle, Symantec Backup Exec, CA ARCserve, IBM Tivoli, Citrix Presentation Server, MySQL, etc. To attain and retain ICSA Labs Network IPS Certification, the candidate being tested must repeatedly prevent any and all attacks targeting the vulnerability set, inbound and outbound, while 80% of the product s bandwidth is consumed by real, background network traffic. In the midst of the network traffic, ICSA Labs injects attacks at pseudo-random intervals. If a replayed attack targeting a vulnerability is either not detected or detected but not prevented, then ICSA Labs verifies the findings by running the actual attack through the candidate against a real vulnerable system. ICSA Labs maintains a collection of vulnerable systems comprised of numerous VMware images and physical systems running versions of enterprise software that ICSA Labs installed and confirmed to be vulnerable to attacks targeting vulnerability set elements. In the event that a candidate does not detect and/or prevent an attack targeting a vulnerability set element, ICSA Labs informs the developer that the candidate has a criteria violation that must be resolved. ICSA Labs then provides the CVE ID of the vulnerability for which protection is inadequate. ICSA Labs neither provides the attack nor a packet capture of the attack to the developer. By restricting what is provided to the developer to resolve the violation, ICSA Labs helps the industry move toward true vulnerability protection and away from individual attack protection. With testing that is vulnerability focused, the network IPS industry is encouraged to build network intrusion prevention systems that protect against the exploitation of each vulnerability instead of reactionary protection after each new attack is released. ICSA Labs also verifies that the network IPS is not easily evaded. To attain and retain ICSA Labs Network IPS Certification, the candidate being tested must not be evaded using common evasion techniques such as those found in the Ptacek/Newsham paper. ( s08/readings/ptacek-newsham.pdf) Page 4 of 16
7 ICSA Labs evasion testing combines attacks used in security coverage protection testing with evasions at one or multiple layers in the TCP/IP stack. The evasion testing exploits TCP/IPs natural, built-in flexibility in order to disguise attacks. With attacks disguised in one or more ways, those that would otherwise be caught can sometimes evade detection by the candidate network IPS. ICSA Labs network IPS certification testing uses a great deal of this trickery in an attempt to evade the protections provided by the candidate device under test. Finally, ICSA Labs network IPS certification testing verifies that a candidate network IPS can mitigate the effects of denial of service (DoS) attacks. ICSA Labs does not expect a network IPS to completely neutralize all DoS attacks. Instead, ICSA Labs expects any rate-based and/or resource consumptionbased DoS attack to be mitigated to acceptable levels as defined in the Network IPS Enterprise Certification Testing Criteria. In DoS testing, the attacking system is connected on one side of the network IPS candidate, and the target system is connected on the other. ICSA Labs launches a variety of DoS attacks that are publicly known and executable from a single system. The DoS attacks include for example synflood, udpflood, and the whole suite of targa2 DoS attacks. At the same time, real background traffic is filling 80% of the available bandwidth. In order to determine whether or not a candidate can satisfy the DoS attack criteria requirement and successfully mitigate the DoS attack, ICSA Labs measures: the rate of DoS attack traffic that leaves the attacking system, the rate of DoS attack traffic that arrives at the target system, the reduction in capability of the candidate network IPS to pass legitimate background traffic, and the manageability of the candidate network IPS via its primary administrative interface. Network Performance Tests It is important that network IPS devices introduce a minimal amount of latency as they inspect real-world traffic. During testing, ICSA Labs increases the amount real background traffic until one or more of the following occurs: the candidate begins to allow attacks to pass through that it had previously blocked at lower throughput rates, the latency of the candidate increases to such a high level that a further increase in throughput is not possible, administration of the candidate becomes impractical, or the media speed of the mission interfaces becomes the limiting factor. ICSA Labs employs a combination of mechanisms to fill the pipe with real background network traffic. Both traffic generation tools and the open source packet capture replay tool, Tomahawk, are used. In order for Tomahawk to be used, ICSA Labs collected packet captures from the existing enterprise networks so that the background network traffic mix used in testing would be as realistic as possible. Finding a realistic mix of traffic was challenging but necessary to properly test network IPS devices intended for real-world deployments. Before being used in ICSA Labs network IPS testing, the packet captures went through a thorough, cleaning process prior to testing that involved removing among other things all malicious traffic, incomplete sessions, and sessions with incomplete frames. Following cleaning, the primary packet capture used during testing is characterized in Table 1. IP breakdown Packets: Bytes: tcp - 85% tcp - 96% udp - 15% udp - 4% Application breakdown Packets: Bytes: http - 38% http - 51% https - 35% https - 35% dns - 13% smtp - 9% smtp - 7% dns - 4% other - 7% other - 1% Table 1 - Characteristics of Background Traffic Used During Testing Page 5 of 16
8 While the candidate is configured to block relevant attacks, one-way latency is measured following guidance provided in RFC Seven different datagram sizes are used during testing. At each size, 1200 UDP datagrams are sent at a rate of 10 datagrams per second. The reported latency is calculated as the average value measured with the network IPS device inline minus the average value that was separately measured with just a crossover cable in place. The test is conducted first with no background traffic present and subsequently with realistic background traffic filling 80% of the product s available bandwidth. ICSA Labs verifies that the measured average one-way latency is lower than the value permitted by the criteria. Administrative Tests Lastly, but importantly, ICSA Labs Network IPS certification testing includes thorough coverage of pertinent administrative functions provided by the candidate network IPS. Among other items, there are stringent logging and reporting requirements. ICSA Labs generates events that must be logged -- including attack attempts, policy modifications, and network link status changes -- and verifies that accurate information required in the certification testing criteria document is captured by the candidate network IPS. Another important administrative function that is tested is the capability of the network IPS to automatically acquire and apply the latest set of coverage protection updates. ICSA Labs connects the candidate such that it can access its update server. ICSA Labs then configures the appropriate settings to enable the candidate to automatically update its protection, and verifies that the protection updates are properly received and applied. This important capability helps ensure enterprise end-users remain protected long after the initial deployment of the network IPS. Summary of Findings There is no such thing as a partial pass in ICSA Labs network IPS certification testing. In order to attain ICSA Labs network IPS certification, the candidate network IPS must meet in its entirety the latest version of the ICSA Labs Network IPS Enterprise Certification Testing Criteria. The table below documents all the criteria requirements that were tested and satisfied. It begins by identifying the criteria and version as well as any optional criteria modules against which the candidate network IPS was measured. Endnotes indicate that there was initially a criteria violation and explain what was corrected. Criteria Network IPS Enterprise Certification Testing Criteria Version 1.4 Security Testing Requirement ID Requirement Summary Result ST1 Mission Interfaces Ignore Non-Administrative Traffic PASS ST2 Cannot Obtain Unauthorized Access to Administrative Functions PASS ST3 Engine Itself is Invulnerable to Attacks Via Mission Interfaces PASS ST4 Prevents Attacks Targeting Many of the Most Relevant Vulnerabilities Note: Though a security bulletin from a 3 rd party (e.g., Microsoft) may suggest that a vulnerability has a critical severity, such a vulnerability may or may not be in the PASS(V01,V02) Page 6 of 16
9 vulnerability set. If it is in the set, products tested by ICSA Labs must provide protection but are not required to have protection enabled by default. ST4.3 Prevents Attacks While Under Considerable Load PASS ST4.5 Prevents Attacks That Use Evasion Techniques to Escape Detection PASS ST5 Mitigates All DoS Attacks Regardless of Origin PASS ST6 Repeatedly Provides Protection for ST4 and ST5 Related Attacks PASS ST7 Administration After Tuning, Does Not Detect Attacks in Clean Traffic (i.e., No False Positives) PASS Requirement ID Requirement Summary Result AD1 Perform Remote Administration of Engine PASS(V03) IA1 Enforce Identification & Authentication PASS IA2 Set Strong Passwords PASS Traffic Flow Requirement ID Requirement Summary Result TF1 Passes Clean Traffic While Enforcing Policy PASS Logging Requirement ID Requirement Summary Result LO1.1.a.i Logs Attacks Targeting Vulnerability Set in Detect & Prevent Mode PASS(V04) LO1.1.a.ii Logs Attacks Targeting Vulnerability Set in Detect & Permit Mode PASS(V04) LO1.2.a Logs Powering Down Engine PASS LO1.2.b Logs Change to Policy Being Enforced PASS LO1.2.c Logs Changes to Authentication Data PASS LO1.2.d Logs Attempts to Authenticate for Remote Administration PASS LO1.3.a Logs Engine Power On PASS LO1.3.b Logs Mission Interface Link Status Changes PASS Page 7 of 16
10 LO2.1.a All Required Log Data Includes Timestamp PASS LO2.1.b All Required Log Data Properly Describes the Event PASS LO2.2.a Events Under LO1.1 Indicate Action Taken PASS LO2.2.b Events Under LO1.1 Indicate Protocol PASS LO2.2.c Events Under LO1.1 Indicate Source & Destination IPs PASS LO2.2.d Events Under LO1.1 that are TCP or UDP Indicate Ports PASS(V05) LO2.2.e Events Under LO1.1.a Include Unique Identifier of Engine PASS LO2.3.a Events Under LO1.2.d Indicate Username PASS LO2.3.b Events Under LO1.2.d Indicate Success or Failure PASS LO2.4.a Events Under LO1.3.b Indicate Link Status PASS LO3 Log Data Available for Review and Human Readable PASS LO4 Correlation Exists Between Split Log Records For Any Single Event PASS Reporting Requirement ID Requirement Summary Result RE1 Reports Top 10 Violations Over Several Periods PASS RE2 Reports Top 10 Sources of Violations Over Several Periods PASS Administration Requirement ID Requirement Summary Result AF1 Place into Transparent or Routing Mode (Transparent was chosen) PASS AF2.1 Access Through Remote Administrative Interface PASS AF2.2 Configure & Apply Policies PASS AF2.3 Configure & Change or Acquire Date & Time PASS AF2.4 Display Required Log Data PASS AF2.5 Generate & Display Required Report Data PASS AF2.6 Configure & Change Authentication Data PASS Page 8 of 16
11 AF2.7 Configure & Change Remote Administration Settings PASS AF2.8 Enable & Disable Network Acquisition of Protection Updates PASS Functional Testing Requirement ID Requirement Summary Result FT1 Administrative Functions (Named Above) Work Properly PASS FT2 Introduces Acceptable Average One-Way Latency PASS Documentation Requirement ID Requirement Summary Result DO1 Provides Enough Accurate Guidance to Set Up Candidate PASS DO2 Provides Enough Accurate Guidance to Perform Admin Functions PASS Table 2 Criteria Requirements Tested and Satisfied Violation 1 (V01) - Coverage of Attacks against Relevant Vulnerabilities (ST4) The IBM Security Network IPS GX Family provided 72.00% coverage protection while in detect and prevent mode during inspection of the Contemporary Vulnerability Set. ICSA s Network IPS Certification Criteria Version 1.4 requires that devices provide 100% coverage protection of contemporary vulnerabilities. Resolution - This violation was resolved by updating to XPU and implementing policy changes at IBM s instruction. Violation 2 (V02) - Coverage of Attacks against Relevant Vulnerabilities (ST4) The IBM Security Network IPS GX Family provided 72.00% coverage protection while in detect and permit mode during inspection of the Contemporary Vulnerability Set. ICSA s Network IPS Certification Criteria Version 1.4 requires that devices provide 100% coverage protection of contemporary vulnerabilities. Resolution - This violation was resolved by updating to XPU and implementing policy changes at IBM s instruction. CVE ID Vulnerability Description (*) Microsoft Windows.lnk File Processing Arbitrary Code Execution Vulnerability Multiple Vendor Java Products Browser Plug-in docbase Parameter Arbitrary Code Execution Vulnerability (*) Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability HP OpenView Network Node Manager nameparams Parameter Handling Arbitrary Code Execution Vulnerability Page 9 of 16
12 HP OpenView Network Node Manager nnmrptconfig.exe Remote Arbitrary Code Execution Vulnerability Adobe Flash Player Flash Content Rendering Code Execution Vulnerability Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS (*) 7-Technologies IGSS IGSSdataServer.exe Multiple Command Overflow (*) HP OpenView Storage Data Protector inet Crafted Parameter Multiple Remote Overflows Violation 3 (V03) Remote Administration (AD1) When logging in to the SiteProtector from a separate management station using the SiteProtector Console version b225, some information in the network traffic was visible in plain text. This information included filenames and paths of resources on the SiteProtector server. This revealed some details about the architecture of the system including application names and version numbers. Resolution - This violation was resolved by installing a SiteProtector update. TCP port 3999 provides encrypted administrative communications. Violation 4 (V04) Required Log Events (LO1.1) When the IBM Security Network IPS GX Family encountered the same vulnerability multiple times in a short time period, the security events were combined into a single event. This occurred when the attack is executed from different attack hosts and different target hosts. Each of these attacks is considered a separate event and must be logged as such. Resolution - This violation was resolved by adding and enabling the np.coalescer Tuning Parameter using the SiteProtector at IBM s instruction. Violation 5 (V05) - Required Log Data (LO2.2.d) The IBM Security Network IPS GX Family was configured to be controlled by a SiteProtector server (version b225) and all security event data was sent to the SiteProtector for analysis. Security events reported by the GX4004 and displayed by the SiteProtector server did not include the destination (or target) port. Resolution - This violation was resolved by creating a custom data view in the SiteProtector. Analyst Notes Included below are factual observations, general notes, specific comments, and/or opinions collected during testing by ICSA Labs. This information may or may not directly relate to satisfying a criteria element. Either way, the information is presented as it may be useful to enterprise end users. Violations 1, 2 and 4 were partially or completely resolved by creating and applying a Tuning Parameter policy using the SiteProtector. A Tuning Parameter is a key/value pair that modifies a specific behavior of the IBM Security Network Intrusion Prevention System (IPS) GX Family. During the course of testing, several Tuning Parameters were created and applied to the GX4004 and GX7800 at IBM s recommendation: Name np.coalescer Value true Page 10 of 16
13 pam.ca.smb.enabled pam.cisco.sccp.synchronize true false pam.smb.macbufferbo.threshold pam.pdf.trust.length pam.pdf.concealed.flash.paranoid true true pam.lnk.mswin_code_exec.local.enable 1 pam.tcp.synflood.protection.duplicatesyn.size pam.flood.udpfrag.limit 50 pam.flood.udpfrag.interval 1 pam.flood.udpfrag.size 1 pam.flood.icmpfrag.limit 100 pam.flood.icmpfrag.interval 1 pam.flood.icmpfrag.size 1 pam.tcp.synflood.protection.duplicatesyn.timeout 4 np.drop.invalid.checksum np.drop.invalid.protocol false false pam.look.flow.tcp.risk.octetcount These Tuning Parameters addressed several areas of testing such as logging, denial of service protection and latency testing. The ICSA Labs Network Security Team selected the GX4004 and GX7800 as representative samples from the IBM Security Network IPS GX Family. These appliances were configured and administered in parallel using the SiteProtector. The GX4004 and GX7800 performed in a manner consistent with the requirements to be considered in the same product family. One notable exception was the way the appliances handled certain exploit variants that used evasion techniques. Some variants had an IP header length of less than 20 bytes, which is not considered valid by RFC 791. When the GX7800 encountered frames whose IP header length was less than 20 bytes the traffic stream would be terminated silently. However, when the GX4004 encountered the same frame it allowed the invalid frame to pass through. The malicious payload was not allowed to pass through so the GX4004 and GX7800 both effectively blocked the exploit variant, albeit for different reasons. From Patched to Generally Available ICSA Labs requires developers to migrate any and all fixes that result from our testing into the main trunk of their network IPS code base, making it generally available to their customers in subsequent releases. Due to developer release schedules and the need for developers to perform quality assurance testing on Page 11 of 16
14 code fixed as a result of ICSA Labs network IPS testing, the release of generally available code incorporating the fixes may not be possible immediately upon the completion of testing. IBM has made all firmware, software and XPU updates generally available through the Security License Key and Download Center website at Conclusion The IBM Security Network IPS GX Family, including all necessary component parts, meets the requirements set forth in version 1.4 of the Network IPS Enterprise Certification Testing Criteria. Therefore, the IBM Security Network IPS GX Family has successfully attained ICSA Labs Network IPS Certification. The IBM Security Network IPS GX Family will remain continuously deployed in the ICSA Labs network IPS testing laboratory. This affords ICSA Labs the ability to test the network IPS device whenever relevant vulnerabilities, attacks, and evasions emerge. Like this report, the criteria document is freely available on the ICSA Labs website at: Page 12 of 16
15 Appendix 1: Tools Vendor Partners A multitude of tools are used during ICSA Labs Network IPS Certification Testing. Many are open source and freely available. Of those that are open source, some were greatly modified and improved to suit our purposes (e.g., Tomahawk). Still other tools that were used are commercially available. The following set of commercial tools is invaluable in ICSA Labs Network IPS Certification Testing. Therefore, ICSA Labs highly recommends them for use. And ICSA Labs both acknowledges and gratefully appreciates the developers of these tools permitting their use free of charge. Note that none of the tools used commercial or otherwise are limited in scope to Network IPS testing. Check out the links associated with each tool to learn more about the myriad of capabilities that each possesses. CORE IMPACT, Core Security Technologies Core Security s description of CORE IMPACT: CORE IMPACT( ) is the first automated, comprehensive penetration testing product for assessing specific information security threats to an organization. With CORE IMPACT, any network administrator can now safely and efficiently determine exactly how an attacker can get control of their valuable information assets. You no longer have to be an expert, or even a security specialist to perform this critical type of assessment which tests the security of your network, identifies what resources are exposed, and determines if your current security investments are actually detecting and preventing attacks. Using this powerful and easy-to-use tool, ICSA Labs aims relevant CORE IMPACT attacks often combined with its evasion techniques against vulnerable systems on our Death Row network. Death Row contains a multitude of unpatched machines, VMware, and Qemu images all with varying operating systems and other software that are vulnerable to a host of different, relevant vulnerabilities. Using CORE IMPACT, ICSA Labs attacks these vulnerable machines, generating exploit packet captures. These exploit packet captures are later replayed through the candidate Network IPS to ensure the attacks are detected and prevented. In addition to replaying exploit packet captures, ICSA Labs also launches live exploits from CORE IMPACT through the candidate Network IPS to confirm when a exploit packet capture is missed by the candidate Network IPS. Note that other attack tools and individual attacks from other sources are used when possible in addition to CORE IMPACT. The same basic steps are followed to test the candidate Network IPS regardless of the source of the exploit. For more information on CORE IMPACT refer to the following web page: IXIA XM2 Portable Chassis with IxNetwork and IxLoad applications Ixia s description of the XM2 Portable chassis: "Ixia test systems deliver the industry s most comprehensive solutions for the performance, functional, and conformance testing of networks and networked applications. The 2-slot XM2 portable chassis provides a high-density, highly-flexible platform on which an Ixia test system can be built. Operating in Page 13 of 16
16 conjunction with the Ixia family of test applications, the XM2 provides the foundation for a complete portable, flexible test environment. "A wide array of interface modules is available for the XM2. The chassis supports up to 32 Gigabit Ethernet ports, Gigabit Ethernet ports, 1-40 Gigabit Ethernet port, Gigabit Ethernet port, 1 dual-speed 40/100 Gigabit Ethernet port, four packet over SONET (POS) ports, or 4 asynchronous transfer mode (ATM) ports. These modules provide the network interfaces and distributed processing resources needed for executing a broad range of data, signaling, voice, video, and application testing for layers 2-7." Ixia s description of the IxNetwork application: "IxNetwork is designed to test network infrastructure, capacity, scalability, and convergence using its scaled protocol emulation and ViperCore technology. IxNetwork provides rapid isolation of network issues, service modeling at Internet scale, carrier-class scaling, and accurate convergence measurement with TrueView. "IxNetwork works with Ixia's test platforms to exchange control-plane and data-plane traffic with the device under test. Ixia's chassis are populated with hot-swappable load modules that implement a wide variety of interface types. Each test port is equipped with an independent processor and substantial memory in addition to specialized traffic stream generation and capture hardware providing the speed and intelligence needed for large-scale protocol emulation." Ixia s description of the IxLoad application: "IxLoad is the industry's most scalable solution for testing converged multiplay services and application delivery platforms. IxLoad emulates data, voice, and video subscribers and their associated protocols for ultra-high performance testing. Unique and advanced subscriber modeling capabilities create realistic scenarios to validate subscriber quality of experience (QoE). IxLoad supports such video, voice, and data protocols as: Internet: HTTP, P2P, FTP, SMTP, POP3, DNS, and CIFS Video: IGMP, RTSP, Adobe Flash Player, Microsoft Silverlight, Apple HLS, Adobe HDS, MPEG2, and H.264/AVC Voice: SIP, MGCP, H.323, H.248, Cisco Skinny, FAX over IP, video conferencing, and PSTN Storage: SMB1, SMB2, NFSv3, NFSv4, and iscsi Security: Published vulnerabilities, malware, and high-performance DDoS VPN: IPsec VPN (IKEv1, IKEv2, ESP, AH) and SSL Anyconnect VPN Wireless: 3GPP packet core protocols used by GGSNs Infrastructure: DNS, DHCP, LDAP, and AAA Encapsulation/Security: DHCP, IPsec, PPP/L2TP with integrated 802.1x and NAC authentication ICSA Labs used the IXIA XM2 and the IxNetwork and IxLoad applications to measure latency according to the methodology described in RFC For more information on the IXIA XM2 refer to the following web page: Page 14 of 16
17 Appendix 2 Coverage protection was eventually provided for each of the vulnerabilities listed below. CVE ID NIPS-IBMCORPORA Page 15 of 16 Copyright 2013 ICSA Labst. All Rights Reserved
18 Testing Information This report is issued by the authority of the Managing Director, ICSA Labs. Tests are done under normal operating conditions. Lab Report Date December 18, 2013 Please visit for the most current information about this and other products. Test Location ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA Product Developer s Headquarters IBM Corporation 1 New Orchard Road Armonk, New York USA The certification test methods used to produce this report are accredited and meet the requirements of ISO/IEC as verified by the ANSI-ASQ National Accreditation Board/ACLASS. Refer to certificate and scope of accreditation number AT Copyright 2013 ICSA Labs. All Rights Reserved. Testing reports shall not be reproduced except in full, without prior written approval of ICSA Labs. Page 16 of 16
IxLoad-Attack: Network Security Testing
IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
IxLoad: Testing Microsoft IPTV
IxLoad: Testing Microsoft IPTV IxLoad provides a comprehensive solution for validating service delivery networks utilizing Microsoft IPTV. IxLoad offers a complete solution that simulates core systems
IxLoad TM Adobe HDS Player Emulation
IxLoad TM Adobe HDS Player Emulation HTTP Dynamic Streaming (HDS) is a solution developed by Adobe Systems to playback high quality live and on-demand content. The playback uses HTTP for streaming fragmented
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks
IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad is a highly scalable solution for accurately assessing the performance of content-aware devices and networks. IxLoad
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
PerfectStorm 100GbE, High- Performance Application and Security Load Modules
PerfectStorm 100GbE, High- Performance Application and Security Load Modules Ixia s PerfectStorm family of 100GbE load modules delivers the industry s most scalable solution for testing converged multi-play
CT505-30 LANforge-FIRE VoIP Call Generator
1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Application Delivery Testing at 100Gbps and Beyond
Application Delivery Testing at 100Gbps and Beyond The Need for Speed 10 Gigabit Ethernet (GE) rapidly became the technology of choice for high speed connections to servers and network devices. Advancements
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller
Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Russell Bennett UC Insights www.ucinsights.com [email protected] Introduction Those familiar with unified communications
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Lab Testing Summary Report
Lab Testing Summary Report February 14 Report 132B Product Category: Web Security Gateway Vendor Tested: Key findings and conclusions: security appliance exhibits best rate to date, 91.3%, for classifying
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform
IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform September 2008 pg. 1 Executive Summary The objective of this report is to provide performance guidance for IBM s Proventia
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
IBM Internet Security Systems
IBM Global Services IBM Internet Security Systems Norberto Gazzoni Italy Channel Manager [email protected] +39 347 3499617 IBM Internet Security Systems Ahead of the threat. 2006 IBM Corporation
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Application Service Testing Enabling scalable delivery of layer 4-7 services
WHITE PAPER Application Service Testing Enabling scalable delivery of layer 4-7 services www.ixiacom.com 915-1735-01 Rev. C January 2013 2 Table of Contents Introduction... 4 Industry Drivers... 4 Multiplay
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
ICSA Labs Network Protection Devices Test Specification Version 1.3
Network Protection Devices Test Specification Version 1.3 August 19, 2011 www.icsalabs.com Change Log Version 1.3 August 19, 2011 added general configuration note to default configuration in Firewall section
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers
Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers The Cisco Intrusion Prevention System Advanced Integration Module
ICSA Labs Network Firewall Certification Testing Report Enterprise (VoIP) - Version 4.1x. SonicWALL, Inc.
ICSA Labs Network Firewall Certification Testing Report SonicWALL, Inc. E-Class Network Security Appliance (NSA) Series February 28, 2011 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
Symantec Messaging Gateway 10.5
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Customer Service Description Next Generation Network Firewall
Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Interoute Communications Limited
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
IxLoad VoIP SIP, MGCP Features
IxLoad VoIP SIP, MGCP Features Aptixia IxLoad can test the performance of VoIP networks and devices by emulating SIP and MGCP user agents. IxLoad can be used to: Test the scalability and performance of
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Performance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz [email protected] IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
Cisco IPS 4200 Series Sensors
Cisco IPS 4200 Series Sensors In today s busy network environments, business continuity relies on effective network intrusion prevention to stop malicious attacks, worms, and application abuse before they
IBM Security Network Protection
IBM Software Data sheet IBM Security Network Protection Highlights Delivers superior zero-day threat protection and security intelligence powered by IBM X- Force Provides critical insight and visibility
IBM Security Network Intrusion Prevention System
IBM Security Network Intrusion Prevention System Comprehensive protection from today s evolving threats Highlights Unmatched levels of performance without compromising breadth and depth of security Protect
Lab Testing Summary Report
Lab Testing Summary Report November 2011 Report 111018 Product Category: Supervisor Engine Vendor Tested: Product Tested: Catalyst 4500E Supervisor Engine 7L-E Key findings and conclusions: Cisco Catalyst
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
IxLoad TM : Data HTTP, SSL, and FTP
IxLoad TM : Data HTTP, SSL, and FTP IxLoad tests the scalability and performance of content-aware networks and devices by emulating HTTP(S), SSL, and FTP clients and servers. IxLoad can be used to: Test
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Cisco IOS Advanced Firewall
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? - and many other vital questions to ask your firewall vendor Zlata Trhulj Agilent Technologies [email protected]
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Cyber Essentials PLUS. Common Test Specification
Cyber Essentials PLUS Common Test Specification Page 1 Version Control Version Date Description Released by 1.0 07/08/14 Initial Common Test Specification release SR Smith 1.1 19/08/14 Updated Scope SR
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.
SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
