Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009



Similar documents
Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

APV9650. Application Delivery Controller

IBM. Vulnerability scanning and best practices

Firewall Testing Methodology W H I T E P A P E R

SonicWALL Unified Threat Management. Alvin Mann April 2009

FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability)

Gateway Security at Stateful Inspection/Application Proxy

Network Simulation Traffic, Paths and Impairment

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Cisco Integrated Services Routers Performance Overview

Firewall Firewall August, 2003

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Advanced Network Security Testing. Michael Jack

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

Colasoft Capsa Technical White Paper. Maximize Network Value

IxLoad TM Adobe HDS Player Emulation

Basic Network Configuration

Load Balancing Security Gateways WHITE PAPER

Firewalls. Chapter 3

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Spirent Avalanche AVALANCHE LOAD TESTING APPLIANCE

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Application Delivery Testing at 100Gbps and Beyond

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

How to (passively) understand the application layer? Packet Monitoring

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

For IT Infrastructure, Mobile and Cloud Computing - Why and how

Gigabit SSL VPN Security Router

Cisco ACE 4710 Application Control Engine

Bro at 10 Gps: Current Testing and Plans

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

PIOLINK, Inc. PIOLINK, Inc. commissioned The

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Boston Area Windows Server User Group April 2010

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Troubleshooting LANs with Wirespeed Packet Capture and Expert Analysis

Load Balance Router R258V

PerfectStorm 100GbE, High- Performance Application and Security Load Modules

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Cisco PIX vs. Checkpoint Firewall

UNIFIED PERFORMANCE MANAGEMENT

Linux MDS Firewall Supplement

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX64 MX64W MX84 MX100 MX400 MX600

IBM Security Network Intrusion Prevention System

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX60 MX60W MX80 MX100 MX400 MX600

EXPLORER. TFT Filter CONFIGURATION

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License

IxLoad-Attack: Network Security Testing

Flow Analysis Versus Packet Analysis. What Should You Choose?

Cisco RV180 VPN Router

Multi-Homing Dual WAN Firewall Router

Application Service Testing Enabling scalable delivery of layer 4-7 services

Transport and Network Layer

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

EAGLE EYE IP TAP. 1. Introduction

TCP/UDP # General Name Short Description

Data Sheet. VLD 500 A Series Viaedge Load Director. VLD 500 A Series: VIAEDGE Load Director

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Intrusion Detection Systems (IDS)

Log Audit Ensuring Behavior Compliance Secoway elog System

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

Proxy Server, Network Address Translator, Firewall. Proxy Server

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

CTS2134 Introduction to Networking. Module Network Security

The Bro Network Intrusion Detection System

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

Firewalls, IDS and IPS

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Computer Networks CS321

NEFSIS DEDICATED SERVER

Secure and Optimize Application Delivery, Performance, and Reliability

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

High Performance 10Gigabit Ethernet Switch

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

F5 BIG-IP V9 Local Traffic Management EE Demo Version. ITCertKeys.com

Next Generation Firewalls and Sandboxing

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Virtual Private Servers

Cisco IOS Firewall. Scenarios

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

CT LANforge-FIRE VoIP Call Generator

Network Security. Protective and Dependable. Pioneer of IP Innovation

UTM FIREWALL SPECS HARDWARE SPECIFICATIONS

Transcription:

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Gregory Fresnais gfresnais@bpointsys.com +33672510922 Director of International Business Development

BreakingPoint Systems Founded September 2005 Management track record Deep networking, security, & performance assurance expertise Breakthrough, award-winning products Privately held and based in Austin, TX Sales & Support: US, Canada, UK, France, Italy, Spain, Netherlands, Belgium, Israel, China, Japan, Korea, Taiwan, Malaysia, New Zeeland, Australia

What can BreakingPoint Offer? BreakingPoint provides comprehensive Layer 2-7 testing for network equipment and application servers through highperformance, compact, flexible and easy-to-use products. BreakingPoint testing tools provide realistic performance and security results using stateful application protocols and live security strikes. 3

What type of tests does BreakingPoint provide? Realistic Traffic Emulation: Layer 2-7 Bit Blaster - Generates Ethernet frames (L2 Tests) Routing Robot - Generates IP packets (L3 Tests) Session Sender - Generates valid TCP sessions (L4 Tests) App Sim Generates 70+ realistic application flows (L7 Tests) Capture and Recreate - Capture & Playback PCAP Layer 4-7 Malicious Traffic Simulation Layer 2-7 Security Module 3,700+ unique attacks, 80+ evasion types Stack Scrambler Protocol Fuzzing 4

BreakingPoint Systems Key Benefits New Generation of Hardware Architecture optimized for Layer 2-7 Testing: FPGA, Network Processor, Embedded Security Module High-Performance Traffic Simulation Layer 2-7: 80 Gbps L2/L3 Traffic Simulation 20 Gbps L4/L7 Traffic Simulation 1.5 Million New TCP Connections per Second 15 Million Concurrent TCP Connections Flexible and Easy to Use Interface Drag and drop GUI to run L2, L3, L4 and L7 traffic 5 Device Under Test (DUT) automation Possibility to mix in the same test on a single test port in same test L2/L3 Stateless and L4/L7 Stateful traffic Good and Malicious traffic

Layer 2 Test BitBlaster Module 6

Layer 2 Network Performance Validation BreakingPoint Bit Blaster analyzes a device s ability to handle high volumes of Layer 2 traffic without corrupting or dropping packets. Bit Blaster can simulate Frame Size from 64 to 9216 Bytes. 7

BreakingPoint Bit Blaster Layer 2 Testing 8

BreakingPoint Bit Blaster Layer 2 Testing (cont.) 9

Layer 3 Test Routing Robot Module 10

Layer 3 Network Performance Validation Routing Robot determines if a DUT can handle high volumes of Layer 3 traffic by sending traffic from one interface and monitoring the receiving interface to see if the traffic is successfully received. Routing Robot can simulate Frame Size from 64 to 9216 Bytes 11

BreakingPoint Routing Robot Layer 3 Testing 12

BreakingPoint Routing Robot Layer 3 Testing 13

Layer 4 Test Session Sender Module 14

Layer 4 Network Performance Validation The Session Sender test component measures the device s ability to handle a large number of new TCP session per second and concurrent TCP sessions Session Sender can simulate Segment Size until 9146 Bytes 15

BreakingPoint Session Sender Layer 4 Testing 16

BreakingPoint Session Sender Layer 4 Testing 17

BreakingPoint Session Sender Layer 4 Testing 18

BreakingPoint Session Sender Layer 4 Testing 19

Layer 7 Test Application Simulator Module 20

Layer 7 Application Performance Validation Application Simulator allows you to define 70+ applications protocols to make complex application protocol distributions to simulate real world traffic. Application Simulator allows you to define in depth each protocol using advanced protocol configuration SuperFlows. 21

70+ Client and Server Protocols Supported HTTP HTTPS POP3 IMAP Finger RTMP MAPI Yahoo Messenger Informix Database MSN Messenger Jabber ICQ QOTD Gopher DNS RTP SIP TCP/UDP SMTP RTSP SNMP FTP RLogin Rshell QQ Messenger RSync DB2 Database AOL IM BOOTPS DCE/RPC LDAP NFSD NTP SSH Postgres Database FIX FIXT CIFS SMB BitTorrent edonkey NetBIOS RADIUS Accounting RADIUS Access Gnutella Vmware Vmotion Telnet Sybase Database Echo Oracle Database Microsoft SQL Server World of Warcraft 22

BreakingPoint- Application Simulator Layer 7 Testing 23

BreakingPoint- Application Simulator Layer 7 Testing 24

BreakingPoint- Application Simulator Layer 7 Testing 25

BreakingPoint- Application Simulator Layer 7 Testing 26

BreakingPoint- Application Simulator Layer 7 Testing 27

Layer 4 Replay TCP/UDP Recreate Module 28

Recreate Captured Traffic The BreakingPoint Recreate feature recreates multi-flow TCP/ UDP traffic based on data from PCAP. BreakingPoint does not use a raw playback, instead it will do stateful multi-flow allowing possibility to replay stateful TCP/UDP traffic with ability to amplify. 29

BreakingPoint Recreate: Exact Replay 30

BreakingPoint Recreate: Layer 4 Replay TCP/UDP 31

BreakingPoint Recreate: Amplify Replay 32

BreakingPoint Recreate: Layer 4 Replay TCP/ UDP 33

BreakingPoint Recreate: Layer 4 Replay TCP/ UDP 34

Security Test Security Module 35

Network Security Performance Validation BreakingPoint Security component can be used to test network security devices such as IPS, IDS, VPNs, and firewalls. It measures a device s ability to protect a host by sending 3,700+ Attacks under CVE-ID, BugTraqID, OSVDB and verifying that the device successfully blocks the attacks. 36

BreakingPoint Security Test Component 37

BreakingPoint: Security Test Module 38

BreakingPoint Security Test Component 39

BreakingPoint Security Test Component 40

BreakingPoint Security Test Component 41

BreakingPoint Security Test Component 42

BreakingPoint Security Test Component 43

Protocol Fuzzing Test Stack Scrambler Module 44

Protocol Fuzzing Stack Scrambler tests the integrity of different protocol stacks by sending malformed packets to the device under test. It uses a fuzzing technique, which modifies a part of the packet (checksum, protocol options, etc.) to generate the corrupt data. 45

46 Test Scenario

Mixing Layer 2-3 and Layer 4-7 Traffic BreakingPoint is the only solution able to send Layer 2-3 and Layer 4-7 traffic from a single test solution with single user interface on same test port. 47

BreakingPoint: Mixing L2/L3 and L4/L7 Traffic 48

Mixing Good and Malicious Traffic BreakingPoint properly tests high-performance security devices with the capability to mix good traffic and malicious traffic emulating real world test scenarios. 49

BreakingPoint: Mixing Good and Malicious Traffic 50

What kind of Network Equipment Validation? BreakingPoint testing tools are used to validate the following network equipments: Router L2 Switch L3 Switch UTM IDS/IPS QoS DPI Firewall Web Application Firewall Web Accelerator SSL Accelerator Traffic Shaper SMTP Relay Anti-SPAM Proxy URL Filter Content Filter Anti-Virus Anti-Malware and more 51

Validating Performance and Security of UTM, Firewall, IDS/IPS, Proxy and Anti-Virus Devices 52

Firewall Test 53

Firewall Test - 8.9 Gbps 54

Firewall + IDS/IPS Test 55

Firewall + IDS/IPS 2.6 Gbps 56

Firewall + IDS/IPS + Proxy Test 57

Firewall + IDS/IPS + Proxy 1.2 Gbps 58

Firewall + IDS/IPS + Proxy + Anti-Virus 59

Firewall + IDS/IPS + Proxy + Anti-Virus 558 Mbps 60

Type: Network Equipment Manufacturer Market Segment: Application Firewall (HTTP/HTTPS/ Database Protocols) Customer Test Scenario: Imperva protects online web applications and databases against sophisticated application-level attacks like SQL Injection and crosssite Scripting. Additionally, Imperva provides reporting for PCI-DSS and monitor user privilege for Sarbanes- Oxley compliance. 61

Type: Network Equipment Manufacturer Market Segment: QOS DPI Customer Test Scenario: Procera Networks provides deep packet inspection (DPI) capabilities that allow accurate identification of network traffic such as BitTorrent, YouTube, Skype and more, allowing accurate management and optimization of bandwidth. 62

Type: Service Provider Market Segment: Mobile Customer Test Scenario: T-Mobile validate performance of different network element radius server, router, firewall, load balancer, mobile content accelerator witch composed 10 Gigabit Mobile Silos between GGSN and Internet Services. 63

Device Under Test (DUT) Real-Time Monitoring 64

Real-Time Device Under Test Monitoring BreakingPoint offers the ability to connect to a DUT via Telnet, SNMP, SSH, or Serial to monitor the status of a DUT offering the ability to check CPU, Memory, New TCP connections per Second, Concurrent TCP Connections, Bandwidth and Packet per Second. Eliminates manual power-cycle reboots. 65

Device Under Test Monitoring 66

Device Under Test Monitoring 67

Device Under Test Monitoring 68

Automation using Drag and Drop GUI 69

GUI Automation: Run Multiple Layer 2-7 Tests 70

Global Reporting of Layer 2-7 Test Series 71

Automation using Script 72

Automation using Script Tcl Library Available for the Windows, UNIX, and MAC Define a Test Define DUT Profile Run Tests Generate Test Report 73

74 Reporting

Reporting Possibility BreakingPoint reports provide detailed information about each test including the testing environment, the purpose of the test, interface address information, and the results of the test Test Report can be exported in PDF, HTML, RTF, XLS, CSV and ZIP Test results can be e-mailed upon the completion of a test. Results will be sent to the e-mail configured for the user account. The format in which the test is sent depends on the format that is selected for the Default Report Format option. 75

Layer 2-3 Test Report: Latency 76

Layer 2-3 Test Report: Packet Size 77

Layer 2-3 Test Report: Drop/Corruption 78

Layer 4 Test Report: TCP Response Time 79

Layer 7 Test Report: Mix Protocols 80

Security Test Report: High Level 81

Security Test Report: Details 82

83

Hardware Platform (Layer 2 - Layer 3) FPGA (Layer 4 - Layer 7) Network Processor (Security) Embedded 84

BreakingPoint BPS 1K: Gigabit Test Solution Hardware Information 4x Gigabit Ports Copper / 4x Gigabit Port SFP 1x Controller with Management Port and DUT Monitoring Port 85

BreakingPoint BPS 10K: 10 Gigabit Test Solution Hardware Information 4x 10 Gigabit Ports XFP SR or LR 1x Controller with Management Port and DUT Monitoring Port 86

BreakingPoint Elite: 8x 10 Gigabit Ports Hardware Information 2x Blades of 4x 10 Gigabit Ports XFP 1x Controller with Management Port and DUT Monitoring Port 87

BreakingPoint Systems Hardware Test Possibility BreakingPoint BPS 1K BreakingPoint BPS 10K BreakingPoint Elite Nb of Interface 4x 1 Gigabit 4x 10 Gigabit 8x 10 Gigabit Type of Interface 4 Copper / 4 Fiber 4x XFP 8x XFP L2 Test Yes Yes Yes L3 Test Yes Yes Yes L4 Test Yes Yes Yes L7 Test Yes Yes Yes Nb of L7 Protocols 70+ Protocols 70+ Protocols 70+ Protocols Security Test Yes Yes Yes Nb of Attacks 3,700+ 3,700+ 3,700+ Fuzzing Test Yes Yes Yes Recreate PCAP Yes Yes Yes 88

BreakingPoint Systems Hardware Performance BreakingPoint BPS 1K BreakingPoint BPS 10K BreakingPoint Elite L2/L3 Packet/Sec 6 Millions 60 Millions 120 Millions L2/L3 Bandwidth 4 Gbps (64 Bytes) 40 Gbps (64 Bytes) 80 Gbps (64 Bytes) L4/L7 TCP/SEC 500,000 750,000 1,5 Millions L4/L7 TCP OPEN 5 Millions 7.5 Millions 15 Millions L4/L7 Bandwidth 4 Gbps 10 Gbps 20 Gbps 89

90 Software Update

Software Updates 91

Summary of BreakingPoint Systems Testing Products 92

Summary of Test Possibilities 93

BreakingPoint Service & Support New Application Protocols Each Month Security Updates from the Industry s Top Security Researchers Product Releases, Enhancement Requests, and Exclusive Downloads Convenient Technical Support Options Technical Training, Test Plan Assessments, and Onsite Visits Education Online Tutorials: Screencast tutorials demonstrate how BreakingPoint products can be used to accelerate time to test. Test Methodologies: BreakingPoint test methodologies are provided in both video and text formats, and integrated into the product. Custom Training: Onsite, hands-on training helps your staff understand how to apply advanced testing techniques in your specific environment without endless classroom training and certifications For more information contact Gregory Fresnais: gfresnais@bpointsys.com 94

Thank You www.breakingpoint.com 95