PIOLINK, Inc. PIOLINK, Inc. commissioned The



Similar documents
4 Delivers over 20,000 SSL connections per second (cps), which

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Application Delivery Testing at 100Gbps and Beyond

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

DPtech ADX Application Delivery Platform Series

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

Cisco ACE 4710 Application Control Engine

UPPER LAYER SWITCHING

IBM Proventia Network Intrusion Prevention System With Crossbeam X80 Platform

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Lab Testing Summary Report

APV9650. Application Delivery Controller

Network Simulation Traffic, Paths and Impairment

Introducing FortiDDoS. Mar, 2013

Firewall Firewall August, 2003

Data Sheet. VLD 500 A Series Viaedge Load Director. VLD 500 A Series: VIAEDGE Load Director

Mail Gateway Testing. Test Plan W. Agoura Rd. Calabasas, CA (Toll Free US) FOR.IXIA (Int'l) (Fax)

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

TOLLY No November 1999

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability)

Securing Networks with PIX and ASA

Unified Threat Management Throughput Performance

Load Balancing Security Gateways WHITE PAPER

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Securing Cisco Network Devices (SND)

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Lucent VPN Firewall Security in x Wireless Networks

Voice over IP- Session Initiation Protocol (SIP) Load Balancing in the IBM BladeCenter

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

INTRODUCTION TO FIREWALL SECURITY

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Networking and High Availability

Improving Network Efficiency for SMB Through Intelligent Load Balancing

Data Sheet. DPtech Anti-DDoS Series. Overview

TEST METHODOLOGY. Network Firewall Data Center. v1.0

How To Protect A Dns Authority Server From A Flood Attack

ENQUIRY NO.NIE/PS/ DATE: 02/09/2014

Ranch Networks for Hosted Data Centers

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

Ixia xstream TM 10. Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks. Aggregation and Filtering DATA SHEET

Networking and High Availability

Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router

Understanding Slow Start

FWSM introduction Intro 5/1

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

IBM Security Network Intrusion Prevention System

Proxies. Chapter 4. Network & Security Gildas Avoine

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

Cisco Application Networking for BEA WebLogic

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Configuration Example

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

F5 BIG-IP V9 Local Traffic Management EE Demo Version. ITCertKeys.com

The On-Demand Application Delivery Controller

FortiOS Handbook - Load Balancing VERSION 5.2.2

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Application Note Gigabit Ethernet Port Modes

Cisco Application Networking for IBM WebSphere

IxLoad: Testing Microsoft IPTV

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Virtualized Security: The Next Generation of Consolidation

IBM Security Network Intrusion Prevention System

Security F5 SECURITY SOLUTION GUIDE

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

IxLoad-Attack: Network Security Testing

Alteon Web OS. Intelligent Internet. What s New in Alteon Web OS Alteon Web OS Benefits. Product Brief

AppDirector Load balancing IBM Websphere and AppXcel

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Sonus Networks engaged Miercom to evaluate the call handling

IxLoad TM : Data HTTP, SSL, and FTP

Coyote Point Systems White Paper

Spirent Avalanche AVALANCHE LOAD TESTING APPLIANCE

Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Stateful Inspection Technology

Deploying ACLs to Manage Network Security

Cisco IPS 4200 Series Sensors

Cisco Integrated Services Routers Performance Overview

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Frequently Asked Questions

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

C(UTM) security appliances the Check Point VPN-1 Pro, the

20 GE + 4 GE Combo SFP G Slots L3 Managed Stackable Switch

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

Transcription:

PIOLINK, Inc. Layer 4/7 Load Balancer, Firewall Performance and Worm Attack Protection Evaluation Premise: Deploying intelligent Layer 4-7 application switch with firewall functionality is not uncommon because the application switches by their nature provide Layer 4-7 packet recognition. Network managers already know that this approach saves money and avoids complexity. Even more critical value for enterprise network managers is high performance and strict security standards, however, they need to know that the high-end application switches not only provide excellent traffic processing capability along with firewall functionality, but also deliver always-on, highly secure and mission critical applications to their users. PIOLINK, Inc. commissioned The Tolly Group and TTA to evaluate the (PAS 45) for Layer 4-7 firewall and load balancing performance, and the impact of the PIOLINK Security Manager (PSM) on the performance. The PAS 45 is an intelligent and secure application switch that provides Layer 4-7 load balancing and application/network security with PSM. The PSM is PIOLINK's unique security system and enhances security by offloading deep packet inspection from the PAS 45 without imposing noticeable delays on the other traffic in the same data path. First, engineers measured the throughput of the PAS 45 as a firewall after configuring Layer 4 filters (based on service port number) and Layer 7 filters (based on application payload signature) respectively for various number of filters and frame sizes. Second, engineers measured the TCP connection rate of the PAS 45 when con- T H E TOLLY G R O U P No. 6 March 6 Test Highlights Delivers 3 Gbps of bi-directional, zero-loss (.%) firewall throughput when tested with over 5-byte frames in a scenario with up to, Layer 4 filters in bridge mode Achieves a steady-state TCP connection rate of,3 connections per second with no TCP connection failures in Layer 4 load balancing Achieves a steady-state HTTP transaction rate of 5,68 transaction per second with no transaction failures in Layer 7 load balancing Forwards.44 Gbps HTTP traffic and 6 Mbps UDP traffic without performance degradation and transaction failures while blocking SQL-slammer worm attacks at, packet per second Throughput (Gbps) Zero-loss (<=.%) Aggregate Firewall Throughput Across PIOLINK PAS 45 with Layer 4 Filters in Two Pairs of Ports, Bbridge Mode as reported by IXIA Scriptmate 4 3.9 64 8 56 5,4 Frame Sizes (Bytes) Test Summary Source: TTA/The Tolly Group, December 5 Figure 6 The Tolly Group Page.6.4 3 3 3,58 filter filters 5 filters, filters

figured as a Layer 4 load balancer. Here, the TCP connection refers to the typical TCP three-way open/close handshaking procedure. Third, engineers measured the HTTP transaction rate of the PAS 45 when configured as a Layer 7 load balancer. Each HTTP transaction consisted of the typical TCP threeway open/close handshaking procedure with a HTTP Get/Reply for data transfer. Fourth, engineers measured the capability of the PAS 45 that processes legitimate HTTP and UDP traffic while blocking the attack traffic. Before running the actual test, the engineers uploaded the signatures to protect the PAS 45 from the attacks like viruses and worms using PSM and then checked whether PSM was active by sending attack traffic listed in the signatures uploaded. R e s u l t s Firewall Throughput with Layer 4 Filters Engineers measured the bi-directional zero-loss (.%) throughput across the PAS 45, when the PAS 45 was configured as a Layer 4 firewall with,, 5 and, Layer 4 filters, four interfaces and processing frame sizes of 64, 8, 56, 5,,4 and,58 bytes. When handling frames over 5 byte sizes, the PAS 45 delivered bidirectional 3 Gbps throughput for all four different filter configurations. For smaller frame sizes, it forwarded the.9 Gbps,.6 Gbps and.4 Gbps for 64-, 8- and 56-byte frames respectively. The number of Layer 4 filters, up to, filters tested, does not affect the Layer 4 firewall throughput performance. Throughput (Gbps) Connections Per Second Zero-loss (<=.%) Aggregate Firewall Throughput Across PIOLINK PAS 45 with Layer 7 Filters in Two Pairs of Gigabits Ethernet Ports, Bridge Mode as reported by IXIA Scriptmate 4 3 Source: TTA/The Tolly Group, December 5 Figure Steady-state TCP Connection Rate and HTTP Transaction Rate As reported by IxLoad. and Avalanche Command 6.5 5,, 75, 5, 5, 64 8 56 5,4,3.5.6 TCP Connection Rate in Layer 4 Load Balancing As reported by IxLoad.5 Frame Sizes (Bytes) 5,68 HTTP Transaction Rate in Layer 7 Load Balancing As reported by Avalanche 5,, 75, 5, 5, * Each TCP connection consisted of a TCP open and a TCP close. * Each HTTP transaction consisted of a TCP open, HTTP Get/Reply and a TCP close..5 filter filters 5 filters, filters..6.7.4.4.8.9.5,58.5 Transactions Per Second Source: TTA/The Tolly Group, December 5 Figure 3 6 The Tolly Group Page

Firewall Throughput with Layer 7 Filters Engineers measured the bi-directional zero-loss (.%) throughput across the PAS 45, when the PAS 45 was configured as a Layer 7 firewall with,, 5 and, Layer 7 filters, four interfaces and processing frame sizes of 64, 8, 56, 5,,4 and,58 bytes. For the,58-byte frame test, the PAS 45 delivered up to.9 Gbps of throughput for single- and -filter configurations and.5 Gbps for 5- and,-filter configurations. For other frame sizes, it forwarded the bi-directional throughput of,.,.5,.,.4 Gbps for 64-byte, 8-byte, 56-byte, 5-byte and,4-byte frames respectively. TCP Connection Rate with Layer 4 Load Balancing Engineers used Ixia IxLoad to measure the maximum TCP connection rate of the PAS 45 for Layer 4 load balancing. The PAS 45 yielded a connection rate of,3 connections per second in sustaining phase without any failures. Each connection involved a typical three-way TCP open and three-way TCP close. HTTP Transaction Rate with Layer 7 Load Balancing Engineers used the Spirent Avalanche test system to conduct a Layer 7 URL switching test to determine the maximum steady-state Layer 7 switching transaction rate that the PAS 45 can sustain without any failed transactions. A URL string match was used to decide the server to which a given HTTP GET request must be switched. The PAS 45 supported an average of 5,68 transactions per second without any failures when it was configured as a Layer 7 load balancer. Each HTTP transaction consisted of a TCP open, HTTP Get/Reply and a TCP close procedure. PSM Performance Tests were performed to assess the capability of the PAS 45 to sustain legitimate UDP and HTTP traffic while being subjected to a SQL Slammer worm attack. For this test, engineers enabled the PSM and uploaded the signatures on the PAS 45 to protect worm and virus attack. While Avalanche/Reflector generated the HTTP transactions across the PAS 45, IXIA injected UDP and worm traffic into the PAS 45. Tests show that PAS 45 continued servicing.4 Gbps of HTTP application traffic and 6 Mbps of UDP traffic without any transaction failure or packet loss during the SQL- Slammer attack, generated at the rate of, packets per second. The aggregate throughput for the legitimate traffic was.37 Gbps and the PAS equipped with the PSM blocked the illegal worm traffic completely. A n a l y s i s As real-world traffic is getting much more complex and various malicious attacks such as SQL-Slammer worm keep making their debuts, corporate network users need more intelligent and innovative solutions to secure themselves without sacrificing the performance. In order to grasp two factors - performance and security - in a cost-effective way, the need for highly secure and powerful application switch appliances becomes PIOLINK, Inc. PIOLINK Application Switch 45 Layer 4/7 Load Balancer, Firewall Performance and Worm Attack Proteciton Evaluation PIOLINK, Inc. Product Specifications* PAS 45 Specifications O Ports : 9*//Base-TX or 5*Base-SX, 4*Base-X SFP Slot O Management Ports : *RS-3(RJ45), */Base-TX O Memory :.5 GB O Concurrent Sessions :,, O Backplane : 44 Gbps O Max. Virtual / Actual Servers : 4 O Max. MAC Address : 89 O Max. VLAN(8.q) : 56 O Size ( WxDxH) : 438 x 545 x 88 mm [ Rack Units] O Load Balancing & Redirection HTTP, HTTPS (SSL), FTP, SMTP, POP3, IMAP, DNS, LDAP, VPN, Firewall, IPS and others HTTP/HTTPS Cache Redirection O Layer 4-7 Switching Failure Monitoring (Health Check): L3/L4/L7 and Script Load Balancing Algorithms: Hashing, Round Robin, Weighted Round Robin, Least Connection, Weighted Least Connection and Max Connection One-Arm Configuration (Direct Server Return) URL/Cookie/SSL ID-based Load Balancing Radius Authentication O High Availability evrrp (Enhanced VRRP) Stateful Active-Standby/Active-Active Failover Dual Power Supply / Dual Flash Memory O Security (Option PSM) Network Worm Block (Blaster, Welchia, etc) E-mail Worm Block (Mydoom, Bagle, Sober, etc) E-mail Spam Filter (Sender, Receiver, Title, etc) DoS/DDoS Attack (Ping of Death, Smurf, etc) Flood Control (In/Outbound Session Control) Scan Block (Port Scan, Fingerprint, etc) Intrusion Prevention (Application Vulnerability) Support Signature Auto Update Service O Certificate MIC, VCCI and CE For more information contact: PIOLINK Inc. IT Castle -4, 55- Gasan-Dong, Geumcheon-Gu, Seoul 53-83, Korea Phone: +8--5-69 Fax: +8--5-69 URL: http://www.piolink.com * Vendor-supplied information not verified by TTA and The Tolly Group 6 The Tolly Group Page 3

Legitimate HTTP and UDP Throughput Performance During the SQL Slammer Worm Attack in Bridge Mode As reported by Avalanche Commander 6.5 and IxExplorer 3.7 HTTP + UDP Traffic Total.37 Gbps Attack Duration Throughput (Gbps) Time elapsed (minutes) HTTP Traffic (.4 Gbps) UDP Traffic (6 Mbps) * Each HTTP transaction consists of a TCP open, HTTP Get/Reply and a TCP close * 6 Mbps UDP traffic,, attacks/sec SQL Slammer Worm Attack Source: TTA/The Tolly Group, December 5 Figure 4 obvious. Server farms must stay safe from the outside malicious attacks; often application switches are deployed right in front of the server farms. Using application switches to distribute traffic to the servers as well as protect them would be both financially and logistically advantageous, and will be a good selection for the multi-tiered Web infrastructure. Many application switches can push hundreds of Mbps of traffic while providing firewall functionality to a site, without any performance hit, but a few high-end application switches can handle a couple of Gbps of traffic while protecting server farms. Firewall throughput test results showed that, when handling frames over 5 bytes, PAS 45 processed 3 Gbps and over Gbps of the traffic for up to, Layer 4 filters and Layer 7 filters, respectively. This resulted from a high-performance NPU (Network Processing Unit) loaded on the PAS 45, capable of processing the frames at high speed. By showing consistently good performance even with, Layer 4 or Layer 7 filters active, the PAS 45 proved its capability in the large-scale network access points where high-speed packet processing and packet filtering are mandatory. PAS 45 demonstrated that it sustains,3 TCP connections per second without failures for Layer 4 load balancing. This connection rate does not include the data transfer. When PAS 45 was running as a Layer 7 load balancer, it recorded an average of 5,68 transactions per second during the steady state while emulated clients were fetching 8- byte objects from emulated servers across PAS 45. The connection rate of an application switch has a direct impact on the overall application performance and scalability. TCP connection rate and HTTP transaction rate showed how fast the PAS 45 can set up connections and transfer the realworld traffic. Especially, the HTTP transaction rate proved that the PAS 45 is capable of supporting very aggressive real-world Web environments which require fast and secure processing of the various types of dynamic application traffic. This result is due to the innovative and unique internal architecture of the PAS 45. With optimization of the architecture, the PAS 45 could support a large number of sessions while accepting a lot of new application requests from clients. Application and server farm security is a critical challenge. It is real benefit if the application switch could provide a line of defense for the application infrastructure, and protect against attacks targeting applications and servers. Test results show that the PAS 45 equipped with the 6 The Tolly Group Page 4

PSM effectively defends against the SQL-Slammer worm attack (, attacks/sec) while continually servicing Gbps of aggregate legitimate application traffic (.4 Gbps HTTP and Gbps UDP) without impact. T e s t C o n f i g u r a t i o n A n d M e t h o d o l o g y The Tolly Group/TTA tested a (PAS 45) that was outfitted with nine fiber ports and nine redundant copper Gigabit Ethernet ports. For the firewall test, engineers configured the PAS 45 with Layer 4 filters (based on service port number) and Layer 7 filters (based on application payload signature) respectively. Engineers connected four interfaces of the PAS 45 to the IXIA chassis, traffic generator and analyzer. Engineers also configured the PAS 45 to run in bridge mode with one subnet for all interfaces connected. Engineers measured the bi-directional, zero-loss (.%) firewall throughput of the PAS 45 for a various number of filters and frame sizes using bi-directional, one-to-one pattern test traffic between four interfaces. Engineers also checked whether Layer 4 and Layer 7 filters were active by sending some sample traffic blocked by the filters on the PAS 45 before running the real test. For this test, four different numbers of Layer 4 and Layer 7 filters were tested;,, 5 and, filters and six types of frame sizes were used for all test cases; 64-, 8-, 56-, 5-, 4-,,58-bytes (including CRC and VLAN tag of each four bytes). Engineers measured the TCP connection rate of the PAS 45 when served as a Layer 4 load balancer. Engineers connected four Gigabit Ethernet interfaces to the IXIA chassis. Two interfaces were used to simulate the client part and other two interfaces simulated the server part. Engineers allocated two client interfaces into one subnet and two server interfaces into the other subnet and setup the load of 55, connections per second (cps) for each interface. In this test, TCP connections were completed with three-way open/close handshaking procedure and no data packets were requested. The test continued to complete total.6 million TCP connections between client and server interfaces. Engineers averaged the results collected from steady-state period as final result. Next, engineers measured the HTTP transaction rate of the PAS 45 when served as a Layer 7 load balancer. Engineers connected eight interfaces to the Avalanche/Reflector chassis. Four interfaces connected to the Avalanche chassis emulating the real-life Web clients and other four interfaces connected to the Reflector chassis emulating Web servers. Engineers allocated all of the interfaces to different subnet segments, namely total eight segments were created. In this test, an HTTP transaction consisted of the typical TCP 3-way open/close handshaking procedure with one HTTP Get/Reply. Engineers configured the PAS 45 to evenly distribute the inbound Web requests to Web servers according to two URL switching rules. To verify the URL switching function, engineers placed the Agilent's LAN Advisor between the PAS 45 and Reflector, and monitored the flowing traffic and checked HTTP header information. Engineers controlled the load of test traffic generated by Avalanche by four phases: ramp-up, stair-step, steady-state and ramp-down. Engineers averaged the results collected only from the five-minute steady-state phase as a final result. Lastly, engineers measured the capability of the PAS 45 that processes legitimate HTTP and UDP traffic while blocking the malicious traffic. Engineers enabled the PSM on PAS 45 and operated in bridge mode with one subnet for all segments between test tools and PAS 45. Engineers connected the four interfaces to Avalanche/Reflector chassis and the other four interfaces to the IXIA chassis. In this test, the PSM was loaded with,39 signatures. Avalanche/Reflector generated the legitimate stateful HTTP traffic and IXIA generated the legitimate UDP traffic and attack traffic with SQL- Slammer worm signature. Engineers utilized 8 Kbytes of HTTP objects and,58 bytes of UDP packets. While Avalanche/Reflector generated.4 Gbps of HTTP traffic, engineers started IXIA IxExplorer to inject both Gbps of UDP traffic and SQL-Slammer attack at, packets/sec to the PAS 45 and observed the impact on legitimate traffic throughput. 6 The Tolly Group Page 5

Test Bed IXIA 6T IxLoad console (Device Under Test) Avalanche Avalanche console Reflector Source: TTA/The Tolly Group, December 5 Figure 5 The Tolly Group gratefully acknowledges the providers of test equipment used in this project. Vendor Product Web address Agilent Technology LAN Advisor http://www.agilent.com IXIA IXIA 6T http://www.ixiacom.com IXIA IxLoad. http://www.ixiacom.com Spirent Communications Avalanche/Reflector 6.5 http://www.spirentcom.com Terms of Usage USE THIS DOCUMENT ONLY IF YOU AGREE TO THE TERMS LISTED HEREIN. This document is provided, free-of-charge, to help you understand whether a given product, technology or service merits additional investigation for your particular needs. Any decision to purchase must be based on your own assessment of suitability. This evaluation was focused on illustrating specific features and/or performance of the product(s) and was conducted under controlled, laboratory conditions and certain tests may have been tailored to reflect performance under ideal conditions; performance may vary under real-world conditions. Users should run tests based on their own real-world scenarios to validate performance for their own networks. Commercially reasonable efforts were made to ensure the accuracy of the data contained herein but errors and/or oversights can occur. Project Profile The test/audit documented herein may also rely on various test tools the accuracy of which is beyond our control. Furthermore, the document relies on certain representations by the sponsor that are beyond our control to verify. Among these is that the software/hardware tested is production or production track and is, or will be, available in equivalent or better form to commercial customers. The Tolly Group provides a fee-based service to assist users in understanding the applicability of a given test scenario to their specific needs. Contact us for information. When foreign translations exist, the English document is considered authoritative. To assure accuracy, only use documents downloaded directly from The Tolly Group's Web site. Sponsor: PIOLINK, Inc. Document number: 6 Product class: Layer 4-7 Application Switch Products under test: Testing window: December 5 Hardware version:pas-459-pfm-3. Software versions: 3.4. Software status: Generally available For more information on this document, or other services offered by The Tolly Group, visit our World Wide Web site at http://www.tolly.com, send E-mail to sales@tolly.com, call (56) 39-56. Information technology is an area of rapid growth and constant change. The Tolly Group conducts engineering-caliber testing in an effort to provide the internetworking industry with valuable information on current products and technology. While great care is taken to assure utmost accuracy, mistakes can occur. In no event shall The Tolly Group be liable for damages of any kind including direct, indirect, special, incidental, and consequential damages which may result from the use of information contained in this document. All trademarks are the property of their respective owners. The Tolly Group doc. 6 rev. leechs 7 Mar 6 6 The Tolly Group Page 6