IMIX Latency
The results of the IMIX latency test are presented in Figure and Table .
Figure - Latency with IMIX Traffic Test Chart
Table - Latency with IMIX Traffic Test Details
Min Latency
|
Avg. Latency
|
Max Latency
|
Min Jitter
|
Avg. Jitter
|
Max Jitter
|
16.73
|
202.144
|
2113.36
|
0
|
9.486
|
1219.11
| -
IMIX Frame Loss
The results of the IMIX frame loss test are presented in Table .
Table - Frame Loss Details
iMIX
Distribution
|
Intended
Load (%)
|
Offered
Load (%)
|
Min Frame
Loss (%)
|
Default
|
100
|
100
|
60.62
|
Default
|
50.5
|
50.88
|
22.64
|
-
Maximum Capacity
In this test we evaluate the following performance measures:
-
Concurrent TCP Connection Capacity: The maximum number of concurrent TCP connections supported through the DUT, as defined in RFC 2647. This test is intended to find the maximum number of entries the DUT can store in its connection table.
-
Maximum TCP Connections Per Second (Maximum TCP Connection Establishment Rate): The maximum TCP connection establishment rate through or with the DUT as defined by RFC 2647. This test is intended to find the maximum rate the DUT can update its connection table.
-
Maximum HTTP Transactions Per Second (Maximum HTTP Transaction Rate): The maximum transaction rate the DUT can sustain. This test is intended to find the maximum rate at which users can access objects.
The results of this test on our sample firewall is shown in Table
Table - Maximum Capacity Results
Test Name
|
Result
|
Concurrent TCP Connection Capacity
|
750,000
|
Maximum TCP Connections Per Second
|
28,528
|
Maximum HTTP Transactions Per Second
|
40,000
|
-
Security Features
The security features include:
-
Baseline Policy: Route traffic from one port to another, e.g., route LAN traffic to WAN.
-
Logging: Log security events like deny connection, detect attacks , ….
-
Packet filtering: Filter packets based on security rules like filter based on destination IP and Port, source IP , …
-
IP Address Spoofing Protection: Attacker from the external network may try to access the internal network by spoofing the IP address of an internal IP address.
-
SYN Flood Protection: The DUT is expected to protect itself and internal servers against SYN flood attack.
The sample firewall has all the above four features. (Table )
Table - Security Features
Test Name
|
Result
|
Baseline Policy
|
PASS
|
Logging
|
PASS
|
SYN Flood Protection
|
PASS
|
IP Address Spoofing Protection
|
PASS
| -
Security Evaluation Criteria
The three main tests for security device evaluation are performance, security characteristics and reactions to attacks. The evaluation should be performed based on the results of all these tests.
Table shows the classification of security devices based on performance measures. The performance measures include throughput, Concurrent TCP Connections, maximum TCP connections and maximum HTTP transaction rate. The tested device is considered to be in one of the categories A, B, C, D or F (fail) according to these measures.
Table - Network Security Device Classification based on Performance Measure Percentage
|
Performance Measure Percentage
|
|
A
|
B
|
C
|
D
|
F
|
Firewall
|
95%
|
85%
|
75%
|
65%
|
less than 65%
|
IPS/IDS
|
90%
|
80%
|
70%
|
60%
|
less than 60%
|
Table presents, as an initial suggestion, the minimum required criteria for network security device evaluation. These criteria are based on security characteristics and reactions to attacks tests. The criteria mentioned in Table include:
-
Baseline Policy: Considering that firewall and IPS are active network devices, they ought to have basic routing capability. However, an IDS is a passive device that only monitors the passing traffic so it does not need to have this capability.
-
Logging: All security devices should be able to log security events for further analysis. Other activities such as users logging to system, or configuration changes , are readily observable through system logs.
-
Packet Filtering Protection: Regarding the functionality of IPS and firewall, they have to be able to perform packet filtering based on security policies.
-
IP Spoofing Protection: As the security policies of IPS and firewall are usually expressed with IP addresses, devices should be able to detect IP spoofing for accurate policy application.
-
SYN Flood Attack Protection: IPS and firewall should be able to detect and prevent SYN flooding since they could not accept new connections in the presence of a SYN flooding attack.
-
Attack Detection and Prevention: Attack detection and attack detection/prevention are the main jobs of IDS and IPS respectively.
Table - Minimum Required Criteria for Network Security Devices
|
Security Characteristics
|
Reactions to Attacks
|
Device
|
•Baseline Policy
|
Logging
|
Packet Filtering
|
IP Spoofing
|
SYN Flood Attack
|
Attack Detection
|
Attack Prevention
|
Firewall
|
|
|
|
|
|
-
|
-
|
IDS
|
-
|
|
-
|
-
|
-
|
-
|
-
|
IPS
|
|
|
|
|
|
|
|
8. Conclusion
As IT equipment are widely used in the fields that may impact communication infrastructure, devices, environment or the life of users, we think that new regulations should be defined and applied for them. These regulations must not only take into the consideration traditional radio communication standards (such as SAR, EMC, EMI, safety) but also should have a look on performance or security issues as well as green environment. In this study we categorized IT equipment, surveyed different applicable standards, and proposed several draft criteria for some specific network and security devices. We think that this is the beginning of a challenging though interesting international effort and cooperation for proposing the best practices of such regulations. We hope that this work will encourage more people to contribute to the definition of new and suitable IT equipment Type Approval and test standards.
References
-
https://www.ietf.org/rfc/rfc2544.txt
-
https://tools.ietf.org/html/rfc2988
-
https://tools.ietf.org/html/rfc6076
-
https://tools.ietf.org/html/rfc7501
-
https://tools.ietf.org/html/rfc7502
-
7502 ETSI TS 132 409 V7.3.0 (2009-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Performance Management (PM); Performance measurements IP Multimedia Subsystem (IMS) (3GPP TS 32.409 version 7.3.0 Release 7)
-
ETSI TS 132 454 V10.0.0 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Key Performance Indicators (KPI) for the IP Multimedia Subsystem (IMS) (3GPP TS 32.454 version 10.0.0 Release 10)
-
ETSI, TS. "102 027-3) Methods for Testing and Specification (MTS); Conformance Test Specification for SIP (IETF RFC 3261); Part 3: Abstract Test Suite (ATS) and partial Protocol Implementation eXtra Information for Testing (PIXIT) proforma ; SIP ATS & PIXIT." European Telecommunications Standards Institute, Sophia Antipolis, France. (2006)
-
https://tools.ietf.org/html/rfc4475
-
ETSI, ES. "201 168 (V1. 1.1):" Corporate telecommunication Networks (CN)." Transmission characteristics of digital Private Branch Exchanges (PBXs).
-
Troy, Gene. "Introduction to the Common Criteria for IT Security (ISO 15408)." (1999)
-
https://tools.ietf.org/html/rfc3511
-
https://www.nsslabs.com/reports/categories/methodologies
-
International Electrotechnical Commission. "IEC 60950-1." Information technology equipment – Safety – Part1: General requirements” (2005)
-
International Electrotechnical Commission. "IEC 61000-4-7."Electromagnetic Compatibility, General Guide on Harmonics and Inter-harmonics Measurements and Instrumentation” (1991)
-
http://www.rfemcdevelopment.eu/en/emc-emi-standards/en-55022-2010
-
http://rfemcdevelopment.eu/en/emc-emi-standards/en-55024-2010
-
Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 15: Specific conditions for commercially available amateur radio equipment, ETSI EN 301 489-15 V1.2.1 (2002).
-
https://tools.ietf.org/html/rfc3261
-
https://tools.ietf.org/html/rfc3264
-
“Network Intrusion Prevention Systems Test Methodology V6.1”, NSS Labs
-
Directive, E. E. C. "European community." Council Directive 98 (1990): 83.
-
ETSI, EG. "201 120:" Public Switched Telephone Network (PSTN)." Method of rating terminal equipment so that it can be connected in series and/or in parallel to a Network Termination Point (NTP).
-
https://tools.ietf.org/html/rfc2285
-
https://www.ietf.org/rfc/rfc1242.txt
Share with your friends: |