gateprotect Performance Test of xutm Appliances



Similar documents
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Astaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ

Network Configuration Settings

Firewall VPN Router. Quick Installation Guide M73-APO09-380

INTRODUCING KERIO WINROUTE FIREWALL

Multi-Homing Dual WAN Firewall Router

Secure Web Appliance. Reverse Proxy

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Special Edition for Loadbalancer.org GmbH

What is the Barracuda SSL VPN Server Agent?

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

Funkwerk UTM Release Notes (english)

Frequently Asked Questions

Automatic Hotspot Logon

NETASQ MIGRATING FROM V8 TO V9

gateprotect Manual Installation, Administration & Examples of Next Generation UTM Appliances & Virtual Appliances As of August 2012 Introduction

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Migration Manual (For Outlook Express 6)

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

PrintFleet Enterprise Security Overview

Figure 41-1 IP Filter Rules

Connecting an Android to a FortiGate with SSL VPN

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Networking for Caribbean Development

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Chapter 11 Cloud Application Development

How To Choose A Network Firewall

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Firewall Firewall August, 2003

Source-Connect Network Configuration Last updated May 2009

Using Innominate mguard over BGAN

Step-by-Step Configuration

Proxies. Chapter 4. Network & Security Gildas Avoine

SSL SSL VPN

Computer Networks. Secure Systems

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Simulation Trading Table of Contents

Answer: Can be used on smart phones/ipad/tablets OR can be used anywhere that has an internet connection. Do not mention anything to do with cost

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

PrintFleet Enterprise 2.2 Security Overview

Chapter 9 Monitoring System Performance

Configuring Outlook for IMAP. Creating a New IMAP Account. Modify an Existing Account

UPSTREAMCONNECT SECURITY

Ignify ecommerce. Item Requirements Notes

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F

Key Term Quiz Answers

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Secure Web Appliance. SSL Intercept

Aloaha Mail and Archive

Accessing TP SSL VPN

SSL DOES NOT MEAN SOL What if you don t have the server keys?

Astaro Gateway Software Applications

NEFSIS DEDICATED SERVER

Hosted Microsoft Exchange Client Setup & Guide Book

[HOSTING] Shared (S) Entry (S) Professional (S) VPS (S) [CF] Cold Fusion9 9,00 39,00 79,00

Application Note Secure Enterprise Guest Access August 2004

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Web. Anti- Spam. Disk. Mail DNS. Server. Backup

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

EXPLORER. TFT Filter CONFIGURATION

Security. TestOut Modules

Routing and Remote Access Service, VPN, and Firewalls

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

Security Technology: Firewalls and VPNs

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Chapter 6 Virtual Private Networking Using SSL Connections

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

DeltaV System Health Monitoring Networking and Security

Fireware Essentials Exam Study Guide

Who s Endian?

Focus on Security. Keeping the bad guys out

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Migration Manual (For Outlook 2010)

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

RoadSync. Administrator s Guide. Mobilizing Microsoft Office Life for Businesses & Professionals Around the World

Building A Secure Microsoft Exchange Continuity Appliance

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Setting Up Scan to SMB on TaskALFA series MFP s.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Administrator's Guide

Transcription:

Introduction The gateprotect xutm appliances were tested under loads that as closely as possible reflected market requirements. As the results showed, the xutm appliances sold by gateprotect offer extremely high levels of performance. gateprotect has purposely chosen powerful hardware in order to have sufficient performance reserves at all times and in any situation. This is particularly important at peak loads. Test procedure One sample of each appliance offered by gateprotect was subjected to a load test using version 8.0 of gateprotect s firewall. The tests were carried out between two powerful servers, one of which supplied web pages, provided a mail server and responded to layer 3 packets that were generated on the other server as a pure load and sent via a VPN tunnel, some of the packets being encrypted and some unencrypted. The other server called up web pages and sent and received mails. The number of helper processes for the mail proxy on the firewall was increased from 15 to 75, in anticipation of this becoming the standard in version 8.1. The test scenario was defined as follows: 1. Measurements For HTTP and HTTPS traffic we measured the time between the request and the web page being delivered (including all its images, etc.). For POP3 we measured the time between the request and the delivery of all mails currently on the mail server. Once fetched, the mails were always deleted from the server. For SMTP we measured the elapsed time until the mail server had accepted a mail for sending and had confirmed this. These measurements were shown in diagrams where they were plotted against the number of simulated users who were simultaneously using the firewall. A simulated user is defined in terms of the load it generates over the course of an eight-hour working day. Load per user: a) HTTP: 190 page views per user over a period of eight hours at an average of 400 KB per page b) HTTPS: 10 page views per user over a period of eight hours at an average of 400 KB per page c) POP3: 50 incoming mails per user over a period of eight hours at an average of 50 KB d) SMTP: 25 outgoing mails per user over a period of eight hours at an average of 50 KB 2. Data traffic While these measurements were being taken the firewalls were also subjected to loads from the following data traffic, which was also scaled with the number of users and constitutes part of the definition of a simulated user. Load per user: a) FTP: One 700 MB *1 download per 10 users b) VPN: One firewall-encrypted 10 Kbit/s data stream per 10 users via VPN tunnel (36 MB over the eight-hour period)* 2 c) Traffic Layer 3: One unencrypted100 Kbit/s data stream per user (360 MB over the eight-hour period) *1 This assumes that within an 8-hour period every tenth user will launch an FTP download of around 700 MB *2 This assumes that within an 8-hour period every tenth user will set up a VPN tunnel. Page 1

3. Activated functions The following firewall functions were activated for the measurements, where permitted by the relevant appliance license: a) Antivirus (for HTTP, HTTPS, POP3 and SMTP) b) IDS (default setting: 2632 rules) c) Web blocking (sex blacklisted) d) Logging and monitoring 4. Measurement points Measurements were determined for the following numbers of users: 25, 50, 75, 100, 150, 200, 250, 500, 750, 1000, 1500, 2000, 2500, 3000, 3500, 4000, 4500, 5000, 6000, 7000, 8000, 9000 und 10000 Each measurement lasted one hour and was then extrapolated up to eight hours. 5. Representation The measurement points were plotted on the diagrams as colored symbols and interpolated using Bézier curves. 6. VPN throughput In addition to the measurements defined above, an additional test was carried out to measure the VPN throughput for each hardware system. For these tests a client-to-server VPN SSL tunnel with AES 128 encryption was set up from one of the test computers to the firewall and data was then sent through this tunnel to the other computer on the firewall; no other data traffic passed the firewall while these measurements were being carried out. The maximum throughput achieved for this data was measured, and the results of these measurements are given below in Mbit/s for each appliance together with the relevant diagram. Where a number of users were using the VPN SSL the throughput per user was calculated by simply dividing the measured overall throughput by the number of users. Page 2

Results 1. GPO 75 The GPO 75 does not use a proxy for any services. Since it only needs to filter packets according to the rules of the firewall, all delays are less than one second, even with 10000 simulated users. Alongside these results it should be noted that, for this hardware, the additional load described in section 2 cannot be scaled up with the number of simulated users beyond about 1000 users, because the installed Fast Ethernet network cards do not permit more than 100 Mbit/s. 40 Mbit/s. Page 3

2. GPO 125 The license for the GPO 125 does not permit an HTTPS proxy. The delays to HTTPS therefore remain under one second for any number of users, as for the GPO 75. However, when a proxy is used, working via this firewall becomes extremely sluggish from about 300 users, and for more than 500 users it is definitely unsuitable. 40 Mbit/s. Page 4

3. GPA 250 The license for the GPO 250 also does not permit an HTTPS proxy, so for HTTPS measurements the same applies as for the GPO 125. Up to around 1000 users, all the measured delays are below two seconds. With 750 users the HTTP proxy is struggling and effective surfing is no longer possible, although as regards the volume of mail this hardware could certainly handle more users. 140 Mbit/s. Page 5

4. GPA 400 Although the GPA 400 could handle up to around 5000 users for HTTP, HTTPS and SMTP, considerable delays occurred with more than about 2000 users when fetching mails via POP3. The downward curve for POP3 for higher numbers of users is an artifact: at this point many mail requests were being rejected, and refusing those connection setup requests really was that fast. 200 Mbit/s. Page 6

5. GPX 800 From 5000 users the GPX 800 exhibits delays for HTTP and HTTPS. On this machine the mail proxy shows no further weaknesses up to 10000 users. 250 Mbit/s. Page 7

6. GPX 1000 On the GPX 1000, working becomes slightly sluggish from around 8000 users, but is still entirely possible right up to 10000 users. It should be taken into account, however, that in networks with so many users the IDS, antivirus and even VPN are generally provided by external systems, so that a major part of this firewall s system resources are left unused. 300 Mbit/s. Seite 8 gateprotect AG Germany Hotline: +49 (0) 1805-428 377 (12 Cent/Min.) Internet: www.gateprotect.com Page 8