C(UTM) security appliances the Check Point VPN-1 Pro, the



Similar documents
Lab Testing Summary Report

Lab Testing Summary Report

Lab Testing Summary Report

Lab Testing Summary Report

Lab Testing Summary Report

The Cisco ASA 5500 as a Superior Firewall Solution

Lab Testing Summary Report

Lab Testing Summary Report

Check Point submitted the SWG Secure Web Gateway for

Product Summary Report

Lab Testing Summary Report

Router Throughput Tests

Unified Threat Management Throughput Performance

Lab Testing Summary Report

Cisco engaged Miercom to conduct an independent verification of

LAB TESTING SUMMARY REPORT

Sonus Networks engaged Miercom to evaluate the call handling

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Sizing Guideline. Sophos UTM SG Series Appliances. Sophos UTM 9.2 Sizing Guide for SG Series appliances

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

PRODUCT CATEGORY BROCHURE

Firewall Testing Methodology W H I T E P A P E R

4 Delivers over 20,000 SSL connections per second (cps), which

IPS Anti-Virus Configuration Example

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

SonicWALL Unified Threat Management. Alvin Mann April 2009

Deploying Firewalls Throughout Your Organization

Cisco Small Business ISA500 Series Integrated Security Appliances

NetScreen-5GT Announcement Frequently Asked Questions (FAQ)

Virtual Desktops Security Test Report

Comparative Performance and Resilience Test Results - UTM Appliances. Miercom tests comparing Sophos SG Series appliances against the competition

White Paper. ZyWALL USG Trade-In Program

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security Solution. Arktos Lam

Lab Testing Summary Report

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Cisco ASA 5500 Series Business Edition

NetDefend Firewall UTM Services

Lab Testing Summary Report

High Performance NGFW Extended

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Lab Testing Summary Report

Competitive Testing of the Cisco ISA500 Security Appliance

Cisco ASA 5500 Series IPS Solution

Networking for Caribbean Development

Astaro Gateway Software Applications

Latest IT Exam Questions & Answers

Deep Security Vulnerability Protection Summary

Cisco IOS Advanced Firewall

CCNA Security v1.0 Scope and Sequence

NetDefend Firewall UTM Services

Firewall Migration. Migrating to Juniper Networks Firewall/VPN Solutions. White Paper

Fortigate Features & Demo

Next Generation IPS and Reputation Services

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Recommended IP Telephony Architecture

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Cisco SR 520-T1 Secure Router

Performance and Feature Comparison of Application Delivery Appliances. Cisco ACE 4710 F5 BIG-IP 3400 F5 BIG-IP 6400 F5 BIG-IP 8800

Cisco Application Networking for BEA WebLogic

Best Practices for Controlling Skype within the Enterprise > White Paper

The Attacker s Target: The Small Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

UTM-Enabled Network Protection

Firewall Defaults and Some Basic Rules

WHITE PAPER. Understanding How File Size Affects Malware Detection

Gigabit Multi-Homing VPN Security Router

Lab Testing Summary Report

Analysis of Network Beaconing Activity for Incident Response

Lab Testing Summary Report

SSL-VPN 200 Getting Started Guide

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

Check Point taps the power of virtualization to simplify security for private clouds

Lab Testing Summary Report

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

TECHNICAL NOTE. FortiGate Traffic Shaping Version

Cisco Application Networking for IBM WebSphere

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

Cisco ASA 5500 Series VPN Edition for the Enterprise

Total Defense Endpoint Premium r12

Cisco Intrusion Detection System Services Module (IDSM-2)

Load Balancing Security Gateways WHITE PAPER

Lab Testing Summary Report

COORDINATED THREAT CONTROL

Cisco SA 500 Series Security Appliances

Cisco Certified Security Professional (CCSP)

Next Gen Firewall and UTM Buyers Guide

Lab Testing Detailed Report DR January Competitive Testing of Web Security Devices

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Network protection and UTM Buyers Guide

13 Ways Through A Firewall

Microsoft Windows Server 2003 with Internet Information Services (IIS) 6.0 vs. Linux Competitive Web Server Performance Comparison

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Transcription:

Lab Testing Summary Report October 25 Report 5914 Product Category: Unified Threat Management (UTM) Security Appliances Systems Tested: Systems VPN-1 Pro FortiGate 1 Networks Key Findings and Conclusions: The performed more than six times better in throughput than the competitive solutions in real-world multi-function threat mitigation The delivered over three times more 3DES-encrypted VPN throughput than competitors when tested using real-world traffic The scored 1 percent overall threat-detection success; competitors averaged only 3 to 4 percent The demonstrated the highest connection-establishment rate, surpassing the closest competitor by more than four times, in real-world, multi-function, threat-mitigation performance comparisons isco Systems engaged Miercom to independently test the Adaptive Security Appliance against several other comparable, competitive Unified Threat Management C(UTM) security appliances the VPN-1 Pro, the FortiGate 1, and Networks. Performance areas examined included: unified firewall and IPS throughput performance, VPN throughput performance, IPS threatprevention capability; and connections-per-second performance. 35 3 25 2 15 Firewall Performance (Mbps) with All Attack/Virus Signatures Enabled, 16-Kbyte HTTP Object Size 1 5 The demonstrated significantly higher throughput with real-world traffic and 16-Kbyte object sizes, with all threat signatures enabled Competitive Testing Note: The tests and test methodology that produced these results were proposed by, codeveloped with and/or influenced by the vendor sponsoring this comparative review. Miercom assured their fair and accurate application. These are not the only tests or results that should guide a product selection or purchase.

Test Bed Setup Load Generators Avalanche 25 #1 Attack packets Attack System Imperfect Networks ThreatEx 659 Switch Response packets Load Generators Reflector 25 #1 Avalanche 25 #2 VLAN-1 VLAN-2 Reflector 25 #2 1 Mbps hub (Management LAN) Management Workstation (Windows 2) About the Testing: Identical test-bed conditions were applied to the and to all the other competitive systems evaluated in this study. The (Adaptive Security Appliance) was configured with the AIP SSM-2 (Advanced Inspection and Prevention Security Services Module). The ASA software was running version 7..2; the AIP SSM-2 was at 5..4. The Signature Definition file was version S187. The system was configured on a HP DL38 G3, employing a single 2.4 Ghz Xeon processor, with 1 GB of memory and an Intel Pro.1 MT Dual Port Server Adaptor. The software was Gateway NGX 6., Build 244. The Smart Defense Update was version 5915816. The software included WebIntellegence and SecureXL. s ran version 2.8, Build 456 operating code. The FortiGuard AV (anti-virus) Definitions were version 6.37, and the FortiGuard Intrusion Definitions were version 2.226. Networks ran version 5.2. r2. operating code with Deep Inspection Signature Update 364. NetScreen s Deep Packet Inspection software was included in the system tested. Four sets of tests were run. The first two Firewall performance tests measured connections per second and firewall throughput with all threat signatures enabled. Normally, a user selectively enables signatures to minimize the occurrence of false positives events. In our testing, however, we were checking each IPS full detection capabilities, and also exercising the systems under load. So the complete signature sets were enabled in these cases. The third test was the VPN site-to-site termination test; in this case the vendors default firewall settings were enabled. The fourth test was the IPS threat prevention tests, where all signatures, for all devices, were enabled. The traffic for all the performance tests was generated with two pairs of Avalanche/Reflector 25 load generators, which ran v7. (build 36784). The load from the traffic generators and the outputs of the Attack System the Imperfect Networks ThreatEx Appliance (v1.6b) were connected through the same VLANs on a 659 Catalyst switch, which was running IOS 12.2. Note: All publicly available documents and materials from the competitive vendors, along with the considerable technical expertise and judgment of the testers, were applied to ensure these vendors units were appropriately and optimally configured for each test scenario., and all declined requests to provide Miercom with direct technical support for this testing. Copyright 25 Miercom Unified Threat Management Security Appliances Page 2

Unified Threat Management Unified Threat Management (UTM) devices have recently become very popular because they address multiple security-related threats, all in one unit. Many current UTM products are offered as security appliances (pre-packaged hardware and software). Some, however, are offered as software products running on standard Intel PC/server platforms. For this comparative study, all the devices tested provide firewall capabilities, IPS (intrusion prevention system) capabilities, and VPN gateway capabilities. All the vendors offer a range of devices that address these functions. The products we selected for this evaluation were chosen because they are in approximately the same price range. The basic (with WebIntelligence and SecureXL) a software-only product costs more than the other systems, but the price is still fairly close to the other systems tested. The price of these products is very much tied to performance. All the vendors offer higher-end units with much more performance and capability, but at a significantly higher price. The goal of this evaluation was to compare similarly priced systems. Workloads and Performance The traffic load for our performance tests was generated using s Avalanche/Reflector load generators (see details on page 2). The Avalanche/Reflector systems were set to automatically generate high rates of TCP/IP traffic, which were directed to the particular UTM device being tested (one at a time, in turn). The generated TCP/IP traffic simulates real-world HTTP 1.1 Web traffic between typical users and Web servers. For the HTTP traffic, thousands of TCP/IP connections were setup and terminated during each test run. Each test, lasting two to three minutes, consisted of ramp up, steady state and ramp down phases. The load on each system under test was increased until connections started dropping (as reported by the Avalanche/Reflector system). At this point the maximum throughput was recorded. To confirm this, the traffic load was increased beyond this point. In some cases, the overall throughput increased minimally; while in other cases throughput dropped. As more traffic was applied, more and more connections were dropped. Higher throughput could have been achieved with UDP traffic, but UDP does not exercise connection setup and teardown, and other TCP-related logic, which is central to Firewall operation and performance. Also, the overwhelming percentage of network traffic these days is TCP/IP. For both firewall and VPN testing, test cases were run with both 4-Kbyte and 16-Kbyte HTTP Object sizes. These simulated two different types of users: 16-Kbyte objects simulate users downloading large files, while 4k-byte objects are more representative of transactional-type traffic. For firewall throughput, IPS performance tests and connections-per-second tests, all of the vendor s threat signatures were enabled. For site-to-site VPN tests, we ran with just the vendors default firewall settings these are those settings that ship with the product out of the box. The IPS tests specifically evaluated the devices ability to detect each threat. No background traffic was running as the threat-detection tests were being run. Firewall and IPS Performance To measure firewall throughput, we ran tests with both 4-Kbyte and 16-kbyte HTTP Object sizes. The results of the 16k-byte HTTP Object-size tests are shown on page 1. The chart below shows the results of the 4-Kbyte HTTP Object sizes. The results show that the continues to deliver high throughput performance, compared to competitors, even for this smaller, transactional-type traffic, with all threat signatures enabled. 25 2 15 1 5 Firewall Performance (Mbps) with All Attack/Virus Signatures Enabled, 4-Kbyte HTTP Object Size The demonstrated significantly higher throughput with 4-Kbyte HTTP Object Sizes and all threat signatures enabled Copyright 25 Miercom Unified Threat Management Security Appliances Page 3

VPN Gateway Throughput Performance Similar to the firewall performance, we evaluated VPN performance using 4-Kbyte and 16-Kbyte HTTP Object sizes. Again, the traffic was generated by the Avalanche/Reflector systems, simulating HTTP-TCP/IP real-world traffic. The VPN tests were run with four VPN tunnels, simulating four secure, site-to-site VPN connections, using 3DES encryption. The VPN tests were run with only the vendor s default firewall settings enabled (no additional settings were enabled). 35 3 25 2 15 1 5 VPN 4-Tunnel Site-to-Site Performance (Mbps) 4k-byte Object size 16k-byte Object size The demonstrated higher throughput than competitors in the 4-tunnel Site-to-Site VPN tests, with both 4-Kbyte and 16-Kbyte object sizes. IPS Testing The results of the IPS tests are shown below and on the next page. From a broad assortment of test cases, each involving a different category of threat, the detected 1 percent of the threats in the test cases we performed. When testing the same test cases, with the competitive security appliances, many threats were undetected to varying degrees. None of the other systems detected more than 45 percent of the collective threats in all categories. For instance, while the detected 83 percent of the Virus/Worm test cases, overall only 29 percent of the total threats presented were detected. The detected all of the Backdoor threats, while surprisingly none of the competitive systems detected any of the Backdoor test cases presented. The IPS functionality tested included basic attacks that are typically included in most IPS tests, as well as additional test cases involving attack and threat mitigation, policy violation, and adware and spyware detection. A total of 126 threats (test cases) were presented to all four systems tested. Each test case was executed separately for each system. All the signatures (or any other IPS-type settings) were enabled for each system. The results were examined using each system s main management screen these were web-based applications which were configured to display the attacks as soon as they were detected. 1% Threat Prevention by Category 8% 6% 4% 2% % Viruses/ Worms Backdoors General P2P IM SpyWare Overall VPN-1 The detected 1 percent of the complete set of the threats presented, while comparable, competitive systems from, and only detected 3 to 4 percent of the cumulative threats. Copyright 25 Miercom Unified Threat Management Security Appliances Page 4

We segmented the test cases into 6 categories: Viruses/Worms and Backdoors are two of the more conventional attacks, which are typically detected by IPS s. Some of the test cases we used included the zotob, rbot.cbq and netsky viruses and worms. The General category was the largest, containing old and new attacks; and attacks on a variety of client types and servers (different operating systems) as well as attacks on specific types of network devices. Representative threats in this category included the Veritas registration overflow and the javaproxy.dll heap overflow attacks. The P2P (Peer-to-Peer) and IM (Instant Messaging) categories are part of the Policy Violations group. Recently, enterprises have started restricting P2P and IM activity at the workplace. Some of the P2P test cases included KaZaa, Napster, and Gnutella client traffic. IM signatures included AIM, Yahoo and MSN client traffic. These signatures are normally not enabled on the firewalls, but can be enabled if required. The last category is Spyware and Adware, which are also becoming more important as concern for protecting sensitive data grows. Test cases included the Gator beacon and Gain adware malware. All the test cases for IPS testing were captured from actual live attacks in a lab environment. The captured packet traces from these live attacks (called pcap files) were processed by a tool, called ThreatEx (an appliance from Imperfect Networks), and then replayed by ThreatEx through the Unit Under Test. Connections per Second The exhibited excellent performance in a multi-function environment with real-world traffic, compared to competitive security appliances. For this we ran connections-per-second, or transaction-per-second rate tests. The connections-per-second tests were run similarly to other tests in this study. The transaction rate was increased via the Avalanche workload generators until the system-under-test started dropping transactions. The maximum connections per second were recorded. This was the maximumload point achieved, as indicated by the Avalanche, when no transactions were dropped. All the connections-per-second tests were run with 64- byte object sizes. The below chart compares this connections-per-second performance. 7 6 5 4 3 2 1 Connections per Second Performance The achieved over four times the Connections per Second performance of comparable systems using real-world traffic in a multi-function environment with all threat signatures enabled TESTED ATTACKS VPN-1 Viruses/Worms 1% 5% 17% 83% Backdoors 1% % % % General 1% 36% 36% 38% P2P 1% 44% 75% 13% IM 1% 32% 68% % SpyWare 1% 6% 68% 1% Total Protection 1% 38% 43% 29% The successfully detected 1 percent of the complete set of the threats presented in all categories in this evaluation, while comparably priced competitive systems only detected 3 to 4 percent of the threats. Copyright 25 Miercom Unified Threat Management Security Appliances Page 5

Miercom Verified Performance Based on Miercom s examination of these four systems operation, capabilities and features, as described herein, Miercom hereby attests to these findings: The performed more than six times better in throughput than competitive solutions in real-world multi-function threat mitigation (Firewall, IPS, Network Anti-Virus) comparisons The delivered more than three and a half times the 3DES VPN throughput than competitive solutions when tested using real-world traffic The delivered more than twice the threat protection of the tested, NetScreen, or FortiGate devices. The scored 1% detection accuracy in each test, while competitive solutions averaged an alarming threat coverage of 3-4% The demonstrated the highest connection establishment rate, surpassing the closest competitor by more than four times in real-world multi-function threat mitigation (Firewall, IPS, Network Anti-Virus) comparisons Vendor Information: Systems 17 West Tasman Drive San Jose, CA 95134 USA Software 8 Bridge Parkway Redwood City, CA 9465 92 Stewart Drive Sunnyvale, CA 9485 USA Networks 1194 North Mathilda Ave. Sunnyvale, CA 9489 USA www.cisco.com www.checkpoint.com www.fortinet.com www.juniper.net Tel: 48 526-4 8 553-NETS (6387) Fax: 48 526-41 Tel: 8-429-4391 65-628-2 Fax: 65-654-4233 Tel: 48-235-77 Fax: 48-235-7737 Tel: 888-586-4737 48-745-2 Fax: 48-745-21 About Miercom s Product Testing Services With hundreds of its product-comparison analyses published over the years in such leading network trade periodicals as Business Communications Review and Network World, Miercom s reputation as the leading, independent product test center is unquestioned. Founded in 1988, the company has pioneered the comparative assessment of networking hardware and software, having developed methodologies for testing products from SAN switches to VoIP gateways and IP PBX s. Miercom s private test services include competitive product analyses, as well as individual product evaluations. Products submitted for review are typically evaluated under the NetWORKS As Advertised program, in which networking-related products must endure a comprehensive, independent assessment of the products usability and performance. Products that meet the appropriate criteria and performance levels receive the NetWORKS As Advertised award and Miercom Labs testimonial endorsement. 379 Princeton-Hightstown Rd., East Windsor, NJ 8512 69-49-2 fax 69-49-61 www.miercom.com Report 5914 Copyright 25 Miercom Unified Threat Management Security Appliances Page 6