Test Report November 2007. Cyberoam Identity Based UTM Appliance Unified Threat Management Technology Report



Similar documents
Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Cyberoam. Unified Threat Management. Comprehensive Network Security

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Test Report November Firebox X family from Watchguard. Unified Threat Management Technology Report

SurfControl Filter for SMTP

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Cyberoam Perspective BFSI Security Guidelines. Overview

Automate your IT Security Services

Achieving PCI-Compliance through Cyberoam

Chapter 9 Firewalls and Intrusion Prevention Systems

Next Gen Firewall and UTM Buyers Guide

Network protection and UTM Buyers Guide

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Unified Threat Management

Steps for Basic Configuration

Cyberoam Anti Virus Implementation Guide Version 9

White paper. Cyberoam UTM. Cyberoam. 360 Protection. on a Shoe-String Budget. I sales@cyberoam.com

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Gigabit SSL VPN Security Router

SonicWALL PCI 1.1 Implementation Guide

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

Networking for Caribbean Development

Move over, TMG! Replacing TMG with Sophos UTM

Chapter 4 Firewall Protection and Content Filtering

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

CMPT 471 Networking II

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Configuration Information

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Building A Secure Microsoft Exchange Continuity Appliance

ANTI-SPAM SOLUTIONS TECHNOLOGY REPORT FEBRUARY SurfControl Filter.

MailFoundry Users Manual. MailFoundry User Manual Revision: MF Copyright 2005, Solinus Inc. All Rights Reserved

About Firewall Protection

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

High Availability Configuration Guide Version 9

Network Access Security. Lesson 10

User Guide Version 9 Document version /03/2007

Firewall and UTM Solutions Guide

Firewalls. Chapter 3

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

QUICK START GUIDE. Cisco C170 Security Appliance

Assuring Your Business Continuity

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Security Technology: Firewalls and VPNs

Anti-spam Comparison Report

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

NetDefend Firewall UTM Services

Chapter 4 Security and Firewall Protection

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewall Defaults and Some Basic Rules

Astaro Gateway Software Applications

Radius Integration Guide Version 9

Trustwave SEG Cloud Customer Guide

Chapter 4 Firewall Protection and Content Filtering

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

User Guide Version 9.5.8

SafeNet Content Security. esafe SmartSuite - Security that Thinks. Real-time, Smart and Simple Web and Mail Security Solutions.

Content-ID. Content-ID URLS THREATS DATA

Ovation Security Center Data Sheet

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Tumbleweed MailGate Secure Messenger

Simple security is better security Or: How complexity became the biggest security threat

NetDefend Firewall UTM Services

Preparing for Version 10

Network Security. Protective and Dependable. Pioneer of IP Innovation

Test Report October InterScan Messaging Security Suite. Anti-Spam Technology Report

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

INTRODUCTION TO FIREWALL SECURITY

Training Course on Network Administration

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

SonicWALL Unified Threat Management. Alvin Mann April 2009

Recommended IP Telephony Architecture

10 Configuring Packet Filtering and Routing Rules

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Gigabit Content Security Router

Network Defense Tools

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Advantages of Managed Security Services

How To - Deploy Cyberoam in Gateway Mode

Using a Firewall General Configuration Guide

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

Cyber Essentials. Test Specification

Importance of Web Application Firewall Technology for Protecting Web-based Resources

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Fortigate Features & Demo

SANS Top 20 Critical Controls for Effective Cyber Defense

Guidance Regarding Skype and Other P2P VoIP Solutions

Websense Security Transition Guide

Transcription:

Test Report November 2007 Cyberoam Identity Based UTM Unified Threat Management Technology Report

Vendor Details Name: Elitecore Technologies Address: 29 Water Street, Newburyport, MA 01950, USA Telephone: +1-978-465-8400 Website: www.cyberoam.com Product: Cyberoam CR Series 50i, 100i, and 250i Models Test Laboratory Details Name: West Coast Labs, Unit 9 Oak Tree Court, Mulberry Drive Cardiff Gate Business Park, Cardiff, CF23 8RS, UK Telephone: +44 (0) 29 2054 8400 Date: November 2007 Issue: 1.0 Author: Rob Tanner Contact Point Contact name: Rob Tanner Contact telephone number: +44 (0) 29 2054 8400 2

Contents Test Objectives 4 Checkmark Certification 5 The Product 6 Test Report 7 Test Results 11 West Coast Labs Conclusion 13 Security Features Buyers Guide 14 Test Methodology and Specifications 21 3

Test Objectives Through a series of rigorous tests, West Coast Labs is providing a thorough examination of all the main technology components in the devices under test in a real world test environment to establish the level of functionality and performance of both. For the purposes of this Product Test Report, West Coast Labs tests the following technologies: Firewall VPN Anti-Spam URL Filtering IPS West Coast Labs engineers test and evaluate each device in a controlled environment. Throughout the test period, each product has internet access and is configured as recommended to update online. The testing environment mirrors that of a small to medium sized business and the internal interface of the firewall is connected to a 100Mbs network, and traffic loads are set accordingly. Products are tested in accordance with the functionality and performance criteria, which form the Checkmark certification programs for Firewall, VPN, IPS, URL Filtering and Anti-Spam. (See Appendix D). 4

Checkmark Certification Upon completion of all testing within each UTM technology subset, individual product results are manually analyzed and confirmed, and Checkmark accreditation is awarded on achieving the following standards: Checkmark Anti-Spam Certification Premium 97% and over Catch Rate Standard 90% and over Catch Rate Checkmark Anti-Virus Certification 100% Detection Checkmark Anti-Spyware Certification 100% Detection Checkmark IPS Certification 100% Detection and Prevention Rate Checkmark URL Filtering Certification Premium 100% adherence to policy Standard 95% and over adherence to policy Checkmark Enterprise Firewall Certification 100% adherence to policy Checkmark VPN Certification 100% adherence to policy 5

The Product Introduction The Cyberoam range of UTM solutions are designed to meet the diverse and complex security requirements of multiple organisation types; from SOHO via SME to Enterprise. The solutions are ordinarily deployed as gateway appliances, each contains a core set of security components, including firewall, VPN, IPS, anti-virus, anti-spam, URL content filtering, and spyware blocking engines. The hardware is usually rack-mountable and has a dedicated serial console connection for management. The devices contain multiple Ethernet interfaces that are configurable to meet the diverse networking requirements of most organizations. 6

Installation and Configuration The solutions proved straightforward to install. Initial configuration was achieved by directly connecting a cross-over cable between a management computer and port A on the Cyberoam appliances. The IP address of the management computer was set to 172.16.16.2 with a 24 bit subnet mask, to allow data connectivity to the default IP address of the appliances. Connecting from the management computer, the devices were configured via a web browser, to remotely access an integrated set-up wizard. Using the wizard, West Coast Labs enabled the in-built Ethernet ports and assigned IP addresses to WAN, LAN, and DMZ interfaces, in a gateway mode configuration. In addition to the web console, the solution may be remotely configured via telnet and ssh client software, providing increased flexibility. The appliances ship with accurate documentation and the included quick start guide proved particularly helpful during the initial set-up process. 7

Operations and Features The solutions are easily and securely managed via an SSL-encrypted central web-based console, normally accessed from a standard web browser. All management options are available via a hierarchical menu system that is intuitively laid out. Specific appliance functionality is controlled and defined by multiple policies from within this console. The solutions provide in-built anti-malware capabilities that actively scan incoming and outgoing traffic to identify viruses, spyware, and other malicious content. The solutions dynamically scan the HTTP, FTP, IMAP, POP3, and SMTP protocols. The appliances contain an antispam technology that uses Recurrent Pattern Detection, designed to identify zero-hour spam in both text and image based email. The antispam engine can be configured to process SMTP, POP3, and IMAP traffic for maximum coverage. 8

The Cyberoam approach to content filtering is effective and is based on the database analysis of application traffic including HTTP, IM, and P2P to identify and restrict access to specific content such as adult, undesirable, and illegal materials, as specified by pre-defined policies. Advanced firewall features include stateful and deep packet inspection, protection from flooding attacks, and rules for security that protect not only by IP address but also by user identity for deployment in static, DHCP and Wi-Fi environments The VPN module is tightly integrated with the firewall, providing industry standard L2TP and IPSec remote access and tunnelling capabilities. Both Preshared Keys and Digital Certificate authentication are supported. The solutions use an integrated IPS technology designed to block multiple attack types including intrusion attempts, DoS attacks, and blended threats. The IPS engine ships with a range of in-built policies to use out-of-the-box, in addition, administrators can easily create and tailor new policies to match their particular requirements. For example, administrators can configure the policy controls to simply detect individual attacks or to block such attacks, as required. Specific policies for Surfing Quota, Access Time, Internet Access, Bandwidth, and Data Transfer controls are easily created, and managed to a granular level. In some cases, once a policy has been defined, administrators can simply select the Enable or Disable settings via a radio button. Alternatively, certain settings may be changed using a checkbox or dropdown menu. The focus is on policy ease-ofuse, and any policy changes can be instantaneously applied to the devices. 9

Reporting A management dashboard provides the administrator with a snapshot of current system activity, in both graphical and tabular form. Additional information viewable on the dashboard shows DoS and intrusion attack status and recently detected malware statistics, as well as user identity information relating to internal threat sources. Cyberoam solutions also provide a comprehensive and flexible report generation engine, allowing an administrator to extract data from almost every system facet, co-relating it with identity information to give reports in tabular, graphical, printable, and CSV formats. Built-in reports allow for the generation of data across the main threat protection functions of the appliance, including anti-virus, anti-spam, VPN, and IPS components. Additional reports include data on Web Surfing, Traffic Discovery, Internet Usage, and Trends. Each of the main reporting categories is further enhanced by the inclusion of URL links, that allow administrators to quickly and easily view a snapshot of recent activity for example, the top users by internet surfing time or the top intrusion alerts. A system audit log is also available in the reports section 10

Results West Coast Labs tested anti-spam capabilities by directing a live internet domain feed at the solutions, containing a mixture of spam, genuine, and gray email. The solution acted as an email proxy between a preconfigured internal mail server and the external internet feed. The anti-spam test results are set out in the table below. Type of Mail Detected as Genuine Detected as Spam GENUINE 100% 0% SPAM 4% 96% In order to rigorously test the Cyberoam anti-spyware and antivirus engines, West Coast Labs introduced live malware within an isolated test environment to the network. Delivery vectors included a combination of HTTP, SMTP, and POP3 based streams. The solutions successfully blocked 100% of the West Coast Labs test suite. West Coast Labs tested the enterprise firewall components of the solutions using a combination of commercial, proprietary and open source tools. The tests included scans, intrusion attempts, packet injectors, and live worm samples, all within a controlled and isolated test environment. Packet capture and logging tools listening on all appropriate Ethernet interfaces were used to check whether any unwanted packets had traversed the solutions under test and contravened the underlying firewall policy. The solutions successfully prevented all attacks within the test suite. IPS testing was conducted using a combination of open source, commercial, and in-house developed tools. Verified published exploits were routed through the appliances in an attempt to circumvent 11

security and breach the protected network. Evasion techniques were simultaneously employed for the same purpose. All exploits triggered the Cyberoam IPS engine to successfully prevent all attacks, in line with the policy settings on each solution under test. West Coast Labs performed URL filtering tests on the solutions using specially developed proprietary software based around a well known internet browser that attempted to access live internet sites containing a variety of content types, including predefined restricted content as applied in the solution's current URL policy. The appliances did not allow access to any restricted content and performed in accordance with policy. A VPN was configured using the in-built functionality of the solutions under test. The VPN was subsequently probed and attempts made to contravene user access policy between live services on each separate VPN connected network. Basic encryption assurance and the integrity of the management console were also assessed as part the test process. The appliances policy controls were not contravened at any point and all tests were passed. West Coast Labs is pleased to award the Cyberoam CR Series the Anti- Spam, Anti-Spyware Gateway, Anti-Virus Gateway, Enterprise Firewall, IPS, Unified Threat Management, URL Filtering, and VPN Checkmarks. 12

Conclusion Cyberoam UTM appliances are proven, effective security solutions. Powerful protection capabilities, designed to counter attacks from multiple infection vectors, combine with straightforward administrative controls and advanced reporting that includes user identity data, to form a strong defensive barrier against internal and external threats. The appliances are simple to deploy and configure, supported by extensive documentation and a useful system integrated help guide. The configuration process is further enhanced by the straightforward layout of the menu system, helping to ensure that common administrative tasks are easy to execute. The robust security components of each appliance proved resistant to real-world attack methods and techniques, protecting multiple business crucial protocols. Such resilience should help to ensure that the appliances are a viable asset to the security conscious business of all sizes. 13

Security Features Buyers Guide The Product Cyberoam provides enterprise class, unified security with user visibility and controls through its unique Identity-based UTM appliances. The appliances deliver Firewall-VPN, Gateway Anti-virus, Anti-malware, Anti-spam, IDP and Content Filtering. url : http://www.cyberoam.com 14

Security Features Buyers Guide Business benefits... as stated by Cyberoam Cyberoam Identity-based security a) User and Application Visibility for security: Instant visibility into Who is accessing What b) Business Flexibility: Allows administrators to create customized identity based security policies based on work profile c) Dynamic Environments: Identity-based security in dynamic environments like DHCP and Wi Fi and multi-user environments where IP address based rules fail. d) Regulatory Compliance: Enables adherence to regulatory compliances through user based security controls and identification thus reducing the compliance cost by shortening audit cycles. Cyberoam UTM a) Unified Security: Delivers enterprise class Stateful Inspection Firewall, VPN, Gateway Anti-virus, Gateway Anti-malware, Gateway Antispam, Intrusion Detection and Prevention IDP, Content Filtering, Bandwidth Management and Multi-Link Manager over a single platform. b) Lower Capex and Opex: Single appliance eliminates need for multiple boxes, maintenance contracts, upgrades and maintenance. c) On- Reporting: All Cyberoam appliances come with reporting as standard feature significantly reducing the cost of solution acquisition for SMBs d) Centralized Management: Identity-based security and deployment of Cyberoam Central Console gives centralized control over remote and branch locations without IT staff at these locations. url : http://www.cyberoam.com/downloads/brochure/cyberoambrochure.pdf http://www.cyberoam.com/corporates.html 15

Security Features Buyers Guide Technical benefits... as stated by Cyberoam a) Identity-based Stateful Firewall: Uses user identity as a key parameter in the rule matching criteria ensuring single consolidated security. b) External Authentication: Supports integration with Active Directory, LDAP, Windows Domain Controller, RADIUS and local database. c) Covers the whole range of protocols: HTTP, FTP, FTPoHTTP, SMTP, POP3, IMAP. It also scans for IM, P2P traffic. d) Real time IDP Alerts with identity information: Know who is doing what allowing one to identify the users creating violations and vulnerabilities immediately e) Self-Service Virus Quarantine: Users can self-manage quarantined emails, saving IT staff precious time. f) Active-Active High Availability for protection against hardware failure and to maximize network uptime for uninterrupted access to business-critical applications. url : http://www.cyberoam.com/datasheets.html 16

Security Features Buyers Guide Developments over the last 12 months... as stated by Cyberoam Some of the significant developments during last 12 months include: Regulatory Compliance: Cyberoam s identity-based security identifies and controls users, enabling organizations to meet regulatory compliance and shorten audit cycles. Zero-Hour Protection: Offers protection before signatures are released against emerging malware outbreaks. Protection against Evolving Threats: Cyberoam Anti Spam s recurrent pattern detection technology is content agnostic and detects and blocks emerging spam outbreaks, including image, PDF, Excel, MP3 spam. Expansion of the Range: Cyberoam launched CR 25i, and Cyberoam Central Console (CCC). CR25i meets the comprehensive security demands of the Small Office Home Office (SOHO) and Remote Office Branch Office (ROBO) market. CCC enables Managed Security Service Providers and large enterprises across a broad spectrum of vertical markets protect themselves against zero-hour threats by managing and monitoring multiple dispersed Cyberoam appliances from a centralized location. Enterprise-Grade Security: Cyberoam s identity-based UTM appliances offer powerful performance through robust features like Active-Active High Availability with load balancing between Cyberoam appliances and stateful failover minimizes single point of failure and ensures business connectivity Dynamic Routing provides rapid uptime, increased network throughput with low latencies and trouble-free configuration to expedite network 17

growth Virtual LAN support enhances customers ability to create work profilebased groups across distributed locations and policy setting. Continuous performance enhancements to strengthen enterprises ability to meet tough security requirements and deliver high price-toperformance ratio. 18

Security Features Buyers Guide Additional Noteworthy Product Features... as stated by Cyberoam Stateful Inspection Firewall Identity-based stateful firewall ensures consolidated security by allowing rules based on user in addition to source, destination and service. Policy-based control for anti-virus, anti-spam, IDP, content filtering, bandwidth management from firewall settings Multiple zone security with separate level of access rule enforcement for each zone Gateway Anti-Virus Self-service quarantine area Customized individual user scanning Malware protection Scans HTTP, FTP, SMTP, POP3, IMAP traffic Gateway Anti-Spam Filters based on message header, size, sender, recipient Tags subject line Redirects spam mails to dedicated email addresses Protects against image, pdf, excel, MP3 and other spam variants Intrusion Detection and Prevention 2500+ intrusion detection signatures Multiple, zone-based, user-based IDP policies Blocks HTTP proxy traffic Content Filtering WebCat Automated web categorization engine with millions of sites in 65+ comprehensive categories in addition to custom categories HTTP upload block Identity-based Internet access policies Blocks malware, phishing, pharming URLs Custom block messages per category Blocks Java applets, cookies, Active X 19

Enables adherence to regulatory compliances through user-identity based visibility and controls VPN IPSec, L2TP, PPTP VPN Domain name support for tunnel end points Bandwidth Management Application and user identity-based bandwidth management Guaranteed and burstable bandwidth policy Application and user identity-based traffic discovery Multi-WAN bandwidth reporting Identity-based Controls Controls based on access time, time quota, data quota Schedule- and identity-based committed and burstable bandwidth Schedule- and identity-based P2P and IM controls Automatic Windows Single Sign On Authentication through Active Directory, LDAP, Windows Domain Controller, RADIUS, internal database Networking Multiple Link auto failover WRR-based load balancing Multiple zone support Policy routing based on application and user Support for HTTP proxy mode deployment Parent proxy support 20

Test Methodology and Specifications Firewall Test Environment The test environment will consist of three distinct networks: the external (Internet), DMZ and internal (protected). The external network may include a telnet host, Web server, FTP server, DNS server and a "hacker" client to simulate the internet. The DMZ network may include a Web server and FTP server. The internal network may include a DNS server, SMTP server, file/print server, Web server and a "hacker" client. Machines on the internal and DMZ networks are not configured in a secure manner: they rely totally on the protection of the firewall. The firewall is the only link between the DMZ, internal & external networks. The link between the firewall and the external network is via a simple router. No packet filtering will be configured on this router: all protection must be provided by the firewall. Network monitors, protocol analysers and security monitors are employed on the external, DMZ and internal networks. Firewall Configuration The firewall is to be configured to provide the various services and enforce the various restrictions specified in this document. All firewalls are to be provided initially with an "out of the box" configuration, although vendors will be invited to remotely access their products if they wish to provide a best fit configuration. Network ranges will be provided to vendors as appropriate. No patches or configuration options will be allowed which are not available to the general public either in a current release or via a recognised and generally available support source. The configuration of all machines on the three networks will remain constant between tests. 21

Test Methodology and Specifications Firewall Service Configuration The firewall is to be configured to allow the following outbound services: Internal to External: DNS, FTP (active and passive), HTTP, SSL/HTTPS, SSH, Telnet, SMTP Internal to DMZ: FTP, HTTP, SSL/HTTPS, SSH External to Internal: DNS, SSH, and SMTP External to DMZ: DNS, FTP, HTTP, SSL/HTTPS, SSH, SMTP DMZ to Internal: syslog, SNMP Firewall Test Specifications The testing is designed to ensure that the firewall technologies under test achieve a basic level of protection against a number of common hostile attacks, from both inside and outside the organization. A range of tests will be carried out using a variety of firewall scanning tools: these will be configured with full knowledge of both the firewall and network configuration: Test that all specified outbound services (and no others) are available from internal clients. Test that all specified inbound services (and no others) are available to external clients. Test that the firewall management console is not available to any users unless authenticated. Test that the firewall is resistant to a range of known Denial Of Service (DOS) tests. Test that the firewall does not allow uncontrolled access to either the internal or DMZ networks. Test that the underlying OS is hardened and not vulnerable to known OS-specific attacks. 22

Test Methodology and Specifications Tests will be repeated in the following manner: Probe the internal network from the Internet Probe the DMZ from the Internet Probe the firewall from the Internet Probe the external network from the internal network (test security policy) Probe the DMZ from the internal network Probe the firewall from the internal network Management of the firewall will be evaluated using the following criteria: Local console must be secure. Management console should not be open to the external network. The firewall configuration should be fully protected and tamper proof (except from an authorised management station). Authentication should be required for the administrator for local administration. Authentication and an encrypted link should be available for remote administration. All attacks should be logged with date and time. 23

Test Methodology and Specifications VPN Test Environment The VPN Test Environment will be based on the specification for Firewall as shown above, although another network will be specified as a Remote Office (RO). This may contain a telnet host, DNS server, SMTP server, FTP server, file/print server, Web server and client machines. Network monitors, protocol analysers and security monitors will also be deployed on the RO network. VPN Configuration and Service Configuration Initial configuration of the RO firewall should allow no inbound traffic to services hosted on the RO network. Clients on the RO should have access to the DNS, HTTP and SSL/HTTPS servers on the External network. The initial configuration of the VPN should allow unrestricted traffic flow between the RO and the main Internal network. This should include as a minimum ICMP, DNS, FTP (active and passive), HTTP, SSL/HTTPS, SMTP. 24

Test Methodology and Specifications VPN Test Specifications The testing is designed to ensure that VPN technology achieves a basic level of security performance in that it: Allows a secure point-to-point link between two networks and between a roaming client and a network (optional) Provides authentication and access control mechanisms to restrict resource access on a per-user or per-group level Provides packet filtering or proxy services within the tunnel to restrict tunnel traffic to specific protocols or source/destination points Enforces a reasonable level of encryption and data integrity. Penetration Tests A range of penetration tests will be carried out using commonlyavailable scanning tools All tools will be configured with full knowledge of both the VPN and network configuration: Check that VPN management console is not available to any users unless authenticated and that the remote management link (if available) is encrypted or can be disabled Check that the VPN configuration is fully protected and tamper proof and that the VPN is resistant to a range of known Denial Of Service (DOS) attacks Check that the VPN has no known vulnerabilities and that it does not allow uncontrolled access to the networks behind it if traffic is restricted (see Services) Check that the VPN does not pass mis-configured packets to the networks behind it if traffic is restricted (see Services) and that the VPN correctly enforces access control policy on a per user and/or per group basis 25

Test Methodology and Specifications Additional Tests Stage 1: Probe the VPN from the protected network with no tunnel established Stage 2: Probe the VPN from the external network with no tunnel established Stage 3: Attempt to establish tunnels using incorrect credentials Stage 4: Establish a valid tunnel (gateway-gateway and optionally client-gateway) and ensure that data is being encrypted Stage 5: Probe the remote network from the local network with valid gateway-gateway tunnel established attempt to violate tunnel traffic policy (eg. pass prohibited protocols, etc.) Stage 6: Probe the remote network from the local network with valid client-gateway tunnel established attempt to violate tunnel traffic policy (eg pass prohibited protocols, etc). Stage 7: Probe the remote network from the local network with valid gateway-gateway tunnel established attempt to violate access control policy (eg. user to access restricted resources). Stage 8: Probe the remote network from the local network with valid client-gateway tunnel established attempt to violate access control policy (eg. user to access restricted resources). 26

Test Methodology and Specifications Management Management of the VPN will be evaluated using the following criteria: Local console must be secure and the Management console should not be open to the external network The VPN configuration should be fully protected and tamper proof (except from an authorised management station) Full authentication is required for the administrator for local administration Full authentication and an encrypted link is required for remote administration. If the remote link cannot be encrypted, there should be the ability to disable it. IPS Test Environment The network structure will be the same as for the VPN testing (if the DUT supports it, otherwise it should be the same as for firewall testing) with deployments of Network monitors, protocol analysers and security monitors on each network. Configuration The configuration of the DUT should be the same as the VPN testing (if the DUT supports it, otherwise it should be the same as for firewall testing). 27

Test Methodology and Specifications Testing The IPS testing module is designed to ensure that the Intrusion Detection and/or Prevention technology contributes to a basic level of protection for an organization against hostile attacks. All IPS testing will be conducted with full knowledge of the configuration of the DUT. The testing will include a variety of different testing methodologies using both proprietary and established tools and code. Further exploration and attempted exploitations will take place dependant upon the DUT and results received from scans made. The IPS will be expected to monitor all traffic between the external and internal networks. Machines on the internal network are not configured in a secure manner. Network monitors, protocol analysers and security monitors are employed on the external and internal networks. The configuration of all machines remains constant between tests. A full range of tests will be carried out using tools, which will be configured with full knowledge of the network configuration. Tools used will include port scanners and vulnerability testers. Attacks will be launched including denial of service attacks and targeted buffer overflows. The internal network will also be subject to attack using spyware, worms and Trojans drawn from the West Coast Labs AV, Spyware and Trojan test suites. The IPS will be tested for reactions to: multiple, varied attacks (flood and swarm). obfuscated URLs and obfuscated exploit payloads speed adjustments in packet sending fragmented packets The testing will also review IPS logs and alerts, matching them to vulnerability scans. They will also be matched to password cracking activity. 28

Test Methodology and Specifications Anti-Spam test Environment WCL has a number of domains available which act as honeypots for spam, receiving genuine, not canned spam. These domains receive varying levels of spam and are intended to mirror different email environments. Within each domain are designated user accounts with a variety of email practices and needs. Test Methodology During the course of testing, test engineers use several different internal and external accounts to send emails that simulate real life email transactions common in a business environment. These include requesting meetings, distributing notifications to groups and sending non-business related social emails. Emails are also sent from web-based accounts to simulate external users sending non-business related emails and home workers. Individual user accounts are subscribed to several mailing lists and daily newsletters for grey mail purposes. Each solution is configured initially to fit in with the test network using the vendor s recommendations and is placed into the stream of live mail to ascertain how it copes in an out-of-the-box situation. The only alteration made to standard working practices is that all emails should be forwarded on (although with altered headers or some sort of flag marking the offending mail as spam) to allow for later classification. For ascertaining the level of performance, each solution will receive a set number of emails. These are then classified by hand into genuine, spam and grey mail by test engineers with full knowledge of the mailing lists that have been previously signed up for. These figures are then compared with the figures given by the solution to give an overall detection rate. 29

Test Methodology and Specifications Each solution will be assessed in three specific areas Management/ Administration, Functionality, and Performance. 1. Management/Administration. Ease of Setup/Use; Logging and reporting function; Rule creation. Customization; Content Categories; Product Documentation 2. Functionality Email Processing; Allow/Blocking of Email; Quarantine Area; Blacklist/ Whitelist 3. Performance Volume or % of spam detected; False positive rate Spam incorrectly passed thru; Legitimate mail blocked

Test Methodology and Specifications URL Filtering Test Environment The tests replicate a number of hits on sites or emails received that fall outside of a prescribed Acceptable Usage Policy, along with providing genuine sites as a control group. URL Filtering Test Methodology TEST I - A proprietary piece of software loads in a list of URLs from a file. This switches through the list changing web page every 6 (six) seconds until it either runs out of URLs or receives an END command. The HTML code from each web page is appended to a log. The designated test engineer will then look through these logs to ascertain if any pages have been passed through the solution. TEST II - The list from TEST I is re-run through the software. This is accompanied by two human operators manually following a prespecified list of URLs in a pre-specified order, and also by a background load provided by specialist hardware. The logs are then appended again to a log file and will be checked further. Test Specifications Basic assessment of the solutions under test will consist of attempts to access material via the web in contravention of the security policy. A standardised user session will be employed for this purpose with reproducible http requests being generated. It is expected that attempts to access web sites outwith the terms of the security policy will be blocked, and that all such attempts will be logged and recorded. 31

West Coast Labs Disclaimer While West Coast Labs is dedicated to ensuring the highest standard of security product testing in the industry, it is not always possible within the scope of any given test to completely and exhaustively validate every variation of the security capabilities and / or functionality of any particular product tested and / or guarantee that any particular product tested is fit for any given purpose. Therefore, the test results published within any given report should not be taken and accepted in isolation. Potential customers interested in deploying any particular product tested by West Coast Labs are recommended to seek further confirmation that the said product will meet their individual requirements, technical infrastructure and specific security considerations. All test results represent a snapshot of security capability at one point in time and are not a guarantee of future product effectiveness and security capability. West Coast Labs provide test results for any particular product tested, most relevant at the time of testing and within the specified scope of testing and relative to the specific test hardware, software, equipment, infrastructure, configurations and tools used during the specific test process. West Coast Labs is unable to directly endorse or certify the overall worthiness and reliability of any particular product tested for any given situation or deployment. 32

US SALES T +1 (717) 243 5575 EUROPE SALES T +44 2920 548 400 GLOBAL HEADQUARTERS West Coast Labs Unit 9 Oak Tree Court Mulberry Drive Cardiff Gate Business Park Cardiff CF23 8RS, UK