TOLLY. No August 2002
|
|
- Noah Norman
- 6 years ago
- Views:
Transcription
1 No August 2002 Check Point Software Technologies Ltd. VPN-1 Pro vs. Cisco Systems PIX-535 and NetScreen Technologies NetScreen-500 Competitive Evaluation of Enterprise-Class Internet Security Solutions Premise: When considering the purchase of firewall and VPN devices, network architects and managers need to validate performance characteristics of available security products. With the growth in high-speed Internet access, network managers must contend with the potential performance degradation frequently associated with providing a secure data path. Check Point Software Technologies Ltd. commissioned The Tolly Group to evaluate its VPN-1 Pro, an enterprise-class security solution that integrates firewall and VPN capabilities against two other enterprise products: a Cisco Systems Inc. PIX- 535 and a Net-Screen Technologies Inc. NetScreen-500. T H E TOLLY G R O U P Test Highlights Test Summary outperforms Cisco PIX-535 and NetScreen-500 by 14% and 100% respectively in a singlerule firewall configuration using 64-byte packets outperforms both PIX-535 and NetScreen by 400% each in an IPSec 3DES firewall/vpn configuration using 64-byte packets Check Point s AES outperforms the fastest competitive VPN 3DES configurations by 277% and 294% respectively delivers 57% more throughput while securing "real-world" traffic than NetScreen-500 in a firewall configuration Gigabit Ethernet Firewall Throughput Zero-Loss ( 0.01%) Bidirectional Performance with UDP Traffic Streams Measured by SmartFlow The security devices were subjected to a battery of performance tests that were grouped into three sections: UDP firewall benchmarks, UDP VPN performance, and a real-world mix of Layer 7 application traffic. Tests were conducted in July and August Results Throughput in Mbit/s Single-rule Firewall Bidirectional Throughput Engineers measured the bidirectional packet throughput of each device Devices under test (DUT) Source: The Tolly Group, August 2002 Figure The Tolly Group Page 1
2 configured as a single-rule firewall with two Gigabit Ethernet interfaces. In tests of 64-byte UDP packets traversing a Gigabit Ethernet link, Check Point s VPN-1 Pro achieved 160 Mbit/s of throughput, or 14% greater throughput than the PIX-535 and 100% greater throughput than the NetScreen- 500, which delivered 140 Mbit/s and 80 Mbit/s of throughput, respectively (see Figure 1). In tests of 1,518-byte UDP packets traversing a Gigabit Ethernet link, Check Point s VPN-1 Pro achieved 1.92 Gbit/s of bidirectional throughput, which represents a 9% lead over the PIX-535 and more than three times that offered by the NetScreen-500, which delivered 1.76 Gbit/s and 600 Mbit/s of throughput, respectively. See Throughput in Mbit/s 3DES VPN Throughput Zero-Loss ( 0.01%) Bidirectional Performance with UDP Traffic Streams Measured by SmartFlow 1 Devices under test (DUT) 1 DUTs were peered with a Check Point device. The Check Point device may have limited NetScreen's throughput on the 1,450-byte frame size test. Source: The Tolly Group, August 2002 Figure 2 Check Point Software Technologies leads all vendors in dual-port firewall tests, but its VPN-1 Pro also posted generous firewall throughput results in four-port tests. Check Point Excels in Four-Port Test achieved 240 Mbit/s or 50% more throughput than offered in a dual-port configuration. With 1,518-byte packets, the VPN-1 Pro forwarded 2.84 Gbit/s of traffic. The Tolly Group tested the firewall functionality of the VPN-1 Pro in a four-port configuration with both 64- byte and 1,518-byte packets across Gigabit Ethernet interfaces. With 64-byte packets, the VPN-1 Pro These results show that if the need occurs, Check Point can outfit a device with four Gigabit Ethernet ports that can deliver roughly 50% more traffic than with the dual-port configuration. VPN-1 Pro Four-port Firewall Performance Throughput (Mbit/s) 3,000 2,000 1, byte packets 2,840 1,518-byte packets 2002 The Tolly Group Page 2
3 sidebar on four-port test results, page 2. IPSec Firewall-VPN Tunnel Throughput The Tolly Group tested VPN tunnel throughput using IPSec 3DES and IPSec Advanced Encryption Standard (AES). Engineers benchmarked the bidirectional packet throughput of VPN tunnels with each device paired with the Check Point VPN-1 Pro solution (including a test of matching Check Point devices). Engineers utilized a UDP packet stream for this test. This is a rigorous test of firewall/vpn functionality because the traffic is being filtered rather than just being allowed to pass through unexamined. Engineers created a single tunnel between the device peers and streams of packets were generated from a Spirent SmartBits, including 64-byte packets and 1,450-byte packets. The packet sizes selected represented 64-byte packets, the smallest for Gigabit Ethernet, as well as 1,450-byte packets that approximate the largest packet size that can be sent across the VPN tunnel without fragmentation. Check Point Software Technologies Ltd. VPN-1 Pro Competitive Evaluation VPN Throughput: IPSec 3DES Engineers measured the throughput of a VPN tunnel supporting the 3DES encryption algorithm. MD5 was utilized as the hashing algorithm. In tests of 64-byte Check Point Software Technologies Ltd. VPN-1 Pro Product Specifications* Performance 1,500,000 concurrent firewall connections 40,000 concurrent VPN tunnels 3.1 Gbit/s firewall throughput 800 Mbit/s AES VPN throughput 400 Mbit/s 3DES VPN throughput (with accelerator card) Firewall ActiveX and Java blocking SmartDefense attack blocking Stateful inspection of 150+ applications Security servers Online attack defense updates VPN IPSec/IKE, AES 256/128, DES/3DES, SHA1/MD5 Integrated certificate authority OneClick VPNs Data compression VPN Client Integrated client firewall Security configuration verification Windows domain login Authentication via RADIUS, SecureID, LDAP, TACACS/TACACS+, S/Key, OS/internal password, digital certificates NAT traversal Management One-Click Management Automated client/gateway software distribution Up to 100 virtual systems and VLANs Management server high availability Visual policy management Redundant logging Automated log archival Real-time performance and status monitoring High Availability/Load Sharing Active session fail-over (including VPN) Integrated load sharing QoS Quality of Service (QoS) Bandwidth weights, limits, guarantees DiffServ For more information contact: Check Point Software Technologies Ltd. Phone: (800) URL: *Vendor-supplied information not verified by The Tolly Group 2002 The Tolly Group Page 3
4 packets, the Check Point VPN-1 Pro achieved 100 Mbit/s of throughput, versus 20 Mbit/s of throughput each for the Cisco PIX-535 and the NetScreen-500. AES VPN Throughput Zero-Loss ( 0.01%) Bidirectional Performance with UDP Traffic Streams Measured by SmartFlow 1 For 1,450-byte packets, Check Point s VPN-1 Pro achieved 180 Mbit/s, the NetScreen-500 forwarded the same amount of traffic, and the PIX-535 supported 100 Mbit/s of traffic (see Figure 2). VPN Throughput: IPSec AES Next, The Tolly Group used AES as the encryption algorithm. For 64-byte packets, the achieved 100 Mbit/s of throughput while the NetScreen-500 forwarded just 5 Mbit/s of traffic. NetScreen passed (0.25%) traffic, but not enough to reach the 1% resolution of the data point for the test tool. For this purpose, we are showing that NetScreen did pass some traffic. Cisco does not support AES in the release of the PIX-535 available for testing. For 1,450-byte packets, Check Point VPN-1 Pro supported 500 Mbit/s and the NetScreen-500 passed 20 Mbit/s of traffic. In this test, Check Point proved it is ahead of other rivals in deployment of AES, the National Institute of Standards and Technologies (NIST) FIPS-approved standard for next-generation security by U.S. government organizations. See Figure 3. Throughput in Mbit/s Real-world application performance The final benchmark involved generating real-world traffic by simulating application layer traffic flows with the use of a NetIQ Chariot. The theory behind doing a realworld test is that using application traffic is a much more realistic type of traffic than sending one frame size (64- byte packets) continuously. Therefore, The Tolly Group attempted to find the throughput value for a mixture of packet sizes that approximates the distribution observed for actual Internet traffic. This test encompassed both firewall and VPN test configurations. Devices under test (DUT) 1 DUTs were peered with a Check Point device. Cisco did not participate because the PIX-535 does not support AES. Source: The Tolly Group, August 2002 Figure 3 In the firewall portion of the test, Check Point s VPN-1 Pro forwarded 758 Mbit/s of application traffic, versus 726 Mbit/s for the PIX-535 and 478 Mbit/s for the NetScreen-500. In the tests using 3DES encryption, Check Point s VPN-1 Pro supported 106 Mbit/s versus 69 Mbit/s for the NetScreen- 500 and 66 Mbit/s for the PIX-535. In the AES tests, the Check Point VPN-1 Pro supported traffic at 260 Mbit/s and the NetScreen-500 supported traffic at 10 Mbit/s (see Figure 4). Cisco s PIX-535 does not support AES, thus did not participate in that portion of the test The Tolly Group Page 4
5 Firewall and VPN Throughput Real-World Traffic Mix Throughput in Mbit/s Devices under test (DUT) 1 Cisco did not participate because the PIX-535 does not support AES. Source: The Tolly Group, August 2002 Figure 4 Analysis The consistently demonstrated higher performance than competitive products in both firewall and VPN tests over Gigabit Ethernet connections. On the firewall side, the VPN-1 Pro achieved 15% greater throughput than its nearest competitor in 64-byte tests. In VPN tests using 3DES with firewall functionality enabled, the VPN- 1 Pro demonstrated five times more throughput than both rival products tested. And in VPN tests utilizing the AES algorithm with firewall functionality enabled, the VPN-1 Pro delivered 25X greater throughput than the NetScreen In tests measuring the throughput of application traffic flowing across a VPN connection with an active firewall, the VPN-1 Pro delivered an average 57% more traffic. From a price/performance perspective, the VPN-1 Pro offered a cost-per-megabit that is three times less costly than its nearest rival, the NetScreen- 500 and more than four times less costly than the PIX-535. The cost-per-megabit metric divides the real-world firewall Mbit/s throughput results into the total cost of the device under test to obtain a relative cost-per-megabit of throughput. The configuration as tested, including software, PC and NICs, cost $16,200, or 116% less than the NetScreen-500's configuration price of $34,995 (hardware, NICs and software included) and more than 400% less costly than the Cisco PIX-535 configuration price of $66,000 ($59,000 for hardware, $6,000 for two Gigabit Ethernet fiber NICs and $1,000 for a 3DES license). When those prices are divided by their firewall Mbit/s performance results, the cost per megabit of throughput is $21.37 for the VPN-1 Pro, $73.21 for the NetScreen-500 and $90.91 for the PIX-535. This shows that the VPN-1 Pro holds a 2002 The Tolly Group Page 5
6 performance and a capital investment advantage over the rival products tested. Related Tests The Tolly Group conducted a similar set of firewall/vpn performance benchmarks for NetScreen Technologies, Ltd., which was published in July 2001 (Document ). It is important to note that the performance results of the NetScreen- 500 in this report do not match the performance of the device in the earlier report. In the July 2001 tests, NetScreen tested Version Beta 3 of its software, versus Version 3.1 for the current tests. While the tests may have yielded different results, it is important to note they do not share identical test parameters or configurations. Test Configuration and Methodology IPSec Tunnel Test Bed Configuration For IPSec tunnel performance tests, engineers connected a pair of Check Point Software VPN-1 Pro devices, SecurePlatform NG FP2 with Performance Pack to each other via full-duplex Gigabit Ethernet using SC fiber-optic cable. This software was run on a 2.4-GHz Xeon processor with 1 Gigabyte of RAM and served as a VPN peer with all of the devices under test. The other Check Point Software VPN-1 Pro configured as an IPSec gateway was running on a 2.2-GHz processor with 1 Gigabyte of RAM. For competitive IPSec tunnel performance tests, engineers replaced one of the Check Point devices configured as an IPSec gateway with either a Cisco Systems, Inc. PIX-535, Version 6.1(2) equipped with a PIX VPN Accelerator card or a NetScreen Technologies NetScreen-500, ScreenOS version 3.1. The test devices were connected via Gigabit Ethernet to a Spirent Communications SMB Advanced Multiport Performance/Tester/Analyzer. The SmartBits console ran Spirent SmartFlow 1.5. Each device under test also was connected to an Acterna Domino DA-360 hardware-based network analyzer running DominoNAS software version 3.1 configured for 1000BASE- SX. This device verified packet sizes, utilization and encryption. In all tests, DUTs were tested in a dual-port configuration, except for firewall tests where engineers also tested the VPN-1 Pro in a four-port configuration. Firewall Test Bed Configuration and Methodology For firewall throughput, engineers removed one of the Check Point Software VPN-1 Pro devices; the remaining test bed was the same as the IPSec tunnel test bed. Engineers configured the DUT as a singlerule, allow-all firewall. The Tolly Group engineers measured the percent of traffic the device forwarded when offered 100% of the theoretical maximum load and adjusted the offered load in 1% decrements until zero-loss ( 0.01%) was achieved. SmartBits generated 64-byte and 1,518-byte UDP packets. SmartBits measured the percent of traffic forwarded by the firewall under test. Engineers ran three iterations of each packet size for 60 seconds and results were averaged. IPSec Tunnel Test Methodology IPSec performance tests were conducted with each DUT operating as a VPN/IPSec gateway. All traffic was encrypted using 3DES/MD5 for one series of tests and using AES/MD5 for a second series of tests. Tolly Group engineers tested the DUTs for zero-loss ( 0.01%) throughput. For steady-state, zero-loss, bidirectional packet-per-second throughput tests, engineers measured the packet loss of the DUT when offering 100% of the theoretical maximum load and adjusted the offered load in 1% decrements until zero-loss was achieved. SmartBits generated 64-byte and 1,450-byte UDP packets (1,450-byte packets were used to avoid packet fragmentation). Smart- Bits measured the percent of zero-loss line-rate traffic that traversed the device under test. Engineers ran three iterations of each packet size for 60 seconds and results were averaged. Note: Typically, The Tolly Group tests VPN tunnel throughput with matching pairs of devices on each end of the VPN tunnel. For budget reasons, Check Point requested the use of mismatched units with one 2002 The Tolly Group Page 6
7 of the Check Point devices serving as one end of the VPN tunnel. In the IPSec 3DES test at 1,450 bytes, the use of the Check Point device as a VPN tunnel pair for the NetScreen- 500 may have been a gating factor in overall VPN throughput performance. Layer 7 Application VPN/firewall throughput test For Layer 7 application throughput across a VPN/firewall, engineers connected a pair of Check Point Software VPN-1 Pro devices to each other via full-duplex Gigabit Ethernet using SC fiber-optic cable. Engineers then replaced one of the Check Point devices with either a Cisco Systems PIX-535 or a NetScreen Technologies NetScreen-500. For this series of tests, engineers configured the DUT as a singlerule, allow-all firewall with NAT disabled, and as an IPSec gateway. All traffic was encrypted using 3DES, MD5 for one series of tests and using AES, MD5 for a second series of tests. The test devices connected to an Extreme Networks Alpine This switch supported links to eight PCs configured as NetIQ Chariot endpoints and a connection to a Chariot server console. The following devices ran Chariot Endpoint software: an 800-MHz Intel Pentium 3 with 512 Mbytes of RAM; two 800-MHz Intel Pentium 3 processors with 512 Mbytes of RAM; three 2.4-MHz dual-processor Xeon Pentium 4 with 512 Mbytes of RAM; and two 500-MHz Intel Pentium 3 processors with 128 Mbytes of RAM. All endpoints ran Chariot 4.1 software and Windows 2000, Service Pack 2. A 1-GHz Pentium III processor with 256 Mbytes of RAM served as the Chariot console; the Domino DA-360 console ran Spirent SmartFlow 1.5. The real-world traffic test consisted of massive numbers of concurrent variable sized TCP (HTTP) transactions. The transaction size distribution used in the mix was based on the well known SPECWeb99 benchmark and imitated the HTTP transaction mix recorded on busy real-life enterprise Web servers. The test-bed consisted of multiple pairs of Chariot endpoints, simulating HTTP clients and servers. Each HTTP client performed multiple, variable-sized HTTP- GET transactions with HTTP servers. Engineers ran the test script for duration of two minutes, for three iterations and averaged results. For all performance tests, a Domino DA-360 device verified packet sizes and utilization but was removed prior to testing. Equipment Acquisition and Support The Cisco Systems PIX-535 and the NetScreen Technologies NetScreen-500 were acquired through normal product distribution channels. The Tolly Group contacted executives at the vendor companies and invited them to provide a higher level of support than available through normal channels. Executives from Cisco did not respond; NetScreen accepted the offer. The Tolly Group verified product release levels and shared test configurations with executives from NetScreen in order to give them an opportunity to optimize their device for the tests. Results were shared with NetScreen executives who neither acknowledged nor disputed their accuracy The Tolly Group Page 7
8 VPN Test Bed 1 1 The test bed for the firewall test replicated this scenario except that it used a single firewall instead of two VPN endpoints. Source: The Tolly Group, August 2002 Figure 5 The Tolly Group gratefully acknowledges the providers of test equipment used in this project. Vendor Product Web address Acterna Corp. Domino Internetwork Analyzer Cybex Slimline Commander Extreme Networks Alpine NetIQ Chariot Console Spirent Communications SmartBits SmartFlow Tolly Group Services With more than a decade of testing experience of leadingedge network technologies, The Tolly Group employs time-proven test methodologies and fair testing principles to benchmark products and services with the highest degree of accuracy. Plus, unlike narrowly focused testing shops, The Tolly Group combines its vast technology knowledge with focused marketing services to help clients better position product benchmarks for maximum exposure. The company offers an unparalleled array of reports and services including: Test Summaries, Tolly Verifieds, performance certification programs, educational Webcasts, white paper production, proof-of-concept testing, network planning, industry studies, end-user services, strategic consulting and integrated marketing services. Learn more about The Tolly Group services by calling (732) , or send to info@tolly.com. For info on the Fair Testing Charter, visit: Project Profile Sponsor: Check Point Software Technologies Ltd. Document number: Product class: Enterprise-class Internet security system Products under test: Check Point Software Technologies Ltd. VPN-1 Pro, SecurePlatform NG FP2 Cisco Systems, Inc. PIX 535 Firewall, Version 6.1(2) NetScreen Technologies, Inc. NetScreen-500, ScreenOS, version 3.1 Testing window: July through August 2002 Software status: Generally available For more information on this document, visit our Web site at send to info@tolly.com, or call (732) Internetworking technology is an area of rapid growth and constant change. The Tolly Group conducts engineering-caliber testing in an effort to provide the internetworking industry with valuable information on current products and technology. While great care is taken to assure utmost accuracy, mistakes can occur. In no event shall The Tolly Group be liable for damages of any kind including direct, indirect, special, incidental, and consequential damages which may result from the use of information contained in this document. All trademarks are the property of their respective owners. The Tolly Group doc rev. clk 24 Oct The Tolly Group Page 8
T H E TOLLY. No September 2002
No. 202149 September 2002 Dell PowerConnect 3248 versus 3Com SuperStack 3 Switch 4400 and Cisco Systems, Inc. Catalyst 2950 Layer 2 Fast Ethernet/Gigabit Ethernet Switching Competitive Evaluation Premise:
More informationTOLLY. No March NetScreen Technologies, Inc. 2,000 1,750 1,500 1,250 1, Aggregate throughput.
No. 222 March 22 NetScreen Technologies, Inc. versus Nokia IP74 and Cisco Systems PIX 535 Competitive Evaluation of Multi-gigabit Firewall/VPN Multifunction Devices Premise: Two trends today are redefining
More informationTOLLY. No July 2002
No. 202131 July 2002 VINA Technologies, Ltd. VINA erouter versus ADTRAN Total Access 616-TDM and TA 600R-TDM, Cisco Systems 1720 and Netopia R5300 Competitive Performance Evaluation Premise: Customers
More informationTOLLY. Extreme Networks, Inc.
No. 202135 June 2002 BlackDiamond 6800 series 10GLRi module versus Cisco Systems, Inc. Catalyst 6509 outfitted with WS-X6502-10GE 10-Gigabit Ethernet LAN PHY Interface Competitive Performance Evaluation
More informationT H E TOLLY. No September Dell PowerConnect 3348 vs. 3Com SuperStack 3
No. 203116 September 2003 Dell Inc. Dell PowerConnect 3348 vs. 3Com SuperStack 3 Switch 4400 and Cisco Systems Catalyst 2950 Layer 2 Fast Ethernet/Gigabit Ethernet Competitive Switch Evaluation Premise:
More informationTOLLY. Dell Computer Corp. commissioned. Test Summary. Test Highlights
T H E TOLLY G R O U P No. 201131 September 2001 Dell Computer Corp. PowerConnect 3024 and PowerConnect 5012 Performance Evaluation Test Summary Premise: Customers looking to deploy Fast Ethernet/Gigabit
More informationTOLLY. No July 2001 Nortel Networks, Inc. Contivity 2600 VPN Switch Firewall/VPN Multi-Service Performance Evaluation. Throughput (Mbit/s)
T H E TOLLY G R O U P No. 201130 July 2001 Nortel Networks, Inc. VPN Switch Firewall/VPN Multi-Service Performance Evaluation Test Summary Premise: Buyers of enterprise-class VPN/firewall devices need
More informationTOLLY. No July 1999
Premise: Customers who choose to deploy virtual private networks (VPNs) across large campus installations require products that provide excellent throughput while simultaneously supporting hundreds of
More informationTOLLY. Nortel Networks. Contivity Extranet Switch Test Summary. Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput
T H E TOLLY G R O U P No. 199104 January 1999 Nortel Networks Contivity Extranet Switch 4000 Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput Test Summary Premise: As savvy network
More informationTOLLY. Tasman Networks, Inc. commissioned. Tasman Networks, Inc and 1004 Routers. Test Summary
Tasman Networks, Inc. 1002 and 1004 Routers Competitive Performance Evaluation versus Cisco 1841, 2811 and 2821 Integrated Service Routers Premise: Wide-area network routers that provide T1/E1 access for
More informationT H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second
No. 200235 March 2001 StreamCore StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) TCP/IP WAN Access Link Flow Regulation System Performance Evaluation Premise: Network professionals
More informationTOLLY. No March Fortress Technologies, Inc.
Fortress Technologies, Inc. Encryption and Compression Performance Evaluation of Three Models (FC-1500, FC-500 and FC-250) Test Highlights Premise: Wireless networks are getting faster and enterprise deployments
More informationTOLLY. Nortel, Inc. Ethernet Routing Switch 5000 Series. Test Summary
, Inc. Switch 5 Series Competitive Performance Evaluation versus Catalyst 75G and ProCurve cl Premise: When considering the purchase of stackable switches, network managers need to know the performance
More informationTOLLY. No b April T4 Routing Switch versus Cisco Systems, Inc. Catalyst Layer 3 Switch Competitive Evaluation
No. 202109b April 2002 Premise: Network managers who deploy Fast Ethernet/Gigabit Ethernet switches need to know that the devices can deliver zero-loss throughput with minimal latency to support time-sensitive
More informationTOLLY. No December 2001 Fujitsu, Ltd. GeoStream R940 IP Switching Node Performance Evaluation. Cause
T H E TOLLY G R O U P No. 201139 December 2001 GeoStream R940 IP Switching Node Performance Evaluation Test Summary Premise: Carrier-class routers designed for the core backbone of the Internet must exhibit
More informationTOLLY. No January Throughput (transactions per second) 9,000 8,121 8,160 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000
Networks Smart 16/4 Mk3 (Wake-on-LAN) & Plus Adapter Application Throughput for Transaction Processing and IP File Transfers Premise: The majority of token-ring users consist of large institutions and
More informationTOLLY. No November 2005 Nortel Ethernet Routing Switch 5510, 5520, 5530 Layer 2 Performance, Resiliency and Ease of Use
T H E TOLLY G R O U P No. 205137 November 2005 Nortel Ethernet Routing Switch 5510, 5520, 5530 Layer 2 Performance, Resiliency and Ease of Use Test Summary Premise: When considering the purchase of stackable
More informationTOLLY. VPN Gateway 3070 SSL VPN Throughput, Scalability and Voice Quality Benchmark Evaluation. Test Summary. Test Highlights
T H E TOLLY G R O U P No. 25113 June 25 VPN Gateway 37 SSL VPN Throughput, Scalability and Voice Quality Benchmark Evaluation Test Summary Premise: Not all virtual private network (VPN) gateways are the
More informationCabletron Systems Inc. SmartSwitch 9000 Token Ring Switching in Heterogeneous Networks
1R 7 + ( 72//< * 5 2 8 3 -DQXDU\ Cabletron Systems Inc. SmartSwitch 9000 Switching in Heterogeneous Networks Test Summary & abletron Systems Inc. commissioned The Tolly Group to benchmark the SmartSwitch
More informationForce10 Networks, Inc.
No. 204148 Force10 Networks, Inc. TeraScale E-Series E1200 Resilient Switch/Router Evaluation of Non-Stop Networks, Advanced QoS and Scalability Premise: Enterprises and service providers are faced with
More informationTOLLY. No June Reflection for the Web v versus IBM SecureWay Host On-Demand v Web-to-Host Software Competitive Evaluation
No. 200216 June 2000 WRQ, Inc. Reflection for the Web v. 4.0. versus IBM SecureWay Host On-Demand v. 4.0.4 Web-to-Host Software Competitive Evaluation Premise: With the adoption of the Web browser as the
More informationTOLLY. No June Functional Verification and Performance Evaluation. Windows 2000 with IIS5 1 Web Server Performance.
Premise: Web content providers seeking faster end-to-end performance are adopting Web acceleration devices to decrease client-side response times and ease overall strain on Web servers. While caching devices
More informationTOLLY. Citrix Systems, Inc. Citrix Systems, Inc. commissioned. Citrix Presentation Server 4.0. Test Summary
Citrix Systems, Inc. Citrix Presentation Server 4.0 Performance Study of Citrix Presentation Server and Windows Terminal Services Premise: Windows Terminal Services, an element of Microsoft Windows Server,
More informationTOLLY No April Com Corporation
T H E TOLLY G R O U P No. 199110 April 1999 3Com Corporation OfficeConnect LAN Modem ISDN Router Competitive Evaluation Test Summary Premise: Buyers of dial-on-demand ISDN routers for small office/home
More informationTOLLY. Radware, Inc. Radware, Inc. commissioned. DefensePro Test Summary. Throughput Benchmark and Attack Mitigation Evaluation.
Radware, Inc. DefensePro 3000 Throughput Benchmark and Attack Mitigation Evaluation Premise: Intrusion prevention products need to detect and block a wide array of common network and application attack
More informationFirewall Performance Evaluation Secure Computing Sidewinder vs. Check Point NGX
Firewall Performance Evaluation vs. Check Point NGX June 1, 27 Author: Bill Bosen Firewall Performance Evaluation 7 vs. R62 June 1, 27 In view of the fact that firewall performance is becoming more and
More informationTOLLY No September 1999
NetReality, Inc. WiseWan 200/S1 Product Evaluation T H E TOLLY G R O U P No. 199129 September 1999 Test Summary Premise: When frame relay was relatively new, it seemed the panacea of consolidation: After
More informationTOLLY. No October Standard file open of a 4MB Excel spreadsheet over a Mbps link (100 ms latency) 29X (3 sec) 9X (10 sec)
Networks, Inc. I shared Server and I shared Remote Appliances Performance and Functionality Evaluation Premise: Branch-office workers need real-time access to corporate files, services and applications,
More informationTOLLY. No July Standard file open of a 4MB Excel spreadsheet over a Mbps link (100 ms latency) 29X (3 sec) 9X (10 sec) (497 sec)
, Inc. ishared Server and ishared Remote Appliances Performance and Functionality Evaluation Premise: Branch-office workers need real-time access to corporate files, services and applications, all while
More informationLANCOM Techpaper Routing Performance
LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided
More informationT H E TOLLY G R O U P. Competitive Performance Evaluation versus Cisco Catalyst 6509 Switch. Test Highlights (++, .-, -+, E*'7D1&A -()'7D1&A )-,
T H E TOLLY G R O U P No. 206168 December 2006 Blade Network Technologies, Inc. Nortel Layer 2/3 10Gb Uplink Ethernet Switch Module & Nortel Layer 2/3 10Gb Ethernet Switch Module for IBM BladeCenter Competitive
More informationThe Tolly Group. Project Report. Sponsor: 3M. 3M VOL-4000 Fast Ethernet Switch and 3M N100VF Fast Ethernet Adapter Benchmark
Project Report Sponsor: 3M Project Manager: John Curtis Project Team: Kevin Tolly, President and CEO; John Curtis, VP of Engineering; Maik Lankau, Director of Operations; William VanBuren, Engineer; Report
More informationIntroduction. Executive Summary. Test Highlights
Introduction Cisco commissioned EANTC to conduct an independent performance test of its new Catalyst 9000 family switches. The switches are designed to work in enterprise campus environments. Cisco offers
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationFile Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents
File Server Comparison: Microsoft Windows NT Server 4.0 and Novell NetWare 5 Contents Executive Summary Updated: October 7, 1998 (PDF version 240 KB) Executive Summary Performance Analysis Price/Performance
More information2 Test s reveal depth of NEC's enterprise strategy for VoIP s reveal depth of NEC's enterprise strategy for V over wireless
2 3 4 5 6 7 Tests reveal depth of NEC's enterprise strategy for VoIP over wireless NEC extends enterprise-level Quality-of-Service to its own VoIP gear to ensure bandwidth precedence to latency-sensitive
More informationSpirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing
Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application
More informationAMD: WebBench Virtualization Performance Study
March 2005 www.veritest.com info@veritest.com AMD: WebBench Virtualization Performance Study Test report prepared under contract from Advanced Micro Devices, Inc. Executive summary Advanced Micro Devices,
More informationExecutive Summary. Introduction. Test Highlights
Executive Summary Today, LTE mobile operators typically deploy All-IP and flat network architectures. This elegant and flexible solution requires deployment of an adequate security infrastructure. One
More informationKemp Technologies LM-3600 IPv4 and IPv6 Performance Report
Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published April 2012 (V1.0) Published by Broadband-Testing A division
More informationHow we tested Quagga router
1 of 2 23/10/2006 3:29 µµ Sponsored by: This story appeared on Network World at http://www.networkworld.com/reviews/2006/100906-quagga-router-test-how.html How we tested Quagga router Clear Choice Tests
More informationWINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010
2010 2009 2008 2007 WINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010 DATA SHEET VIRTUAL ACCELERATOR Six Reasons to say Yes to Expand 1. Comprehensive Whether the WAN is used to connect file servers, email
More informationCisco Nexus 3548 Switch Performance Validation December 2012
Cisco Nexus 3548 Switch Performance Validation December 212 212 Spirent Cisco. All rights reserved. Page 1 Contents Executive Summary... 3 Test Bed... 4 How Testing Was Performed... 4 Test Results... 6
More informationSecurity Quick Sales Guide
Security Quick Sales Guide Security Quick Finder Product/Segment Model 200 ~ 500 PC Users USG 2000 75 ~ 200 PC Users USG 1000 50 ~ 75 PC Users USG 300 Unified Security Gateway 25 ~ 50 PC Users USG 200
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationJuniper SRX Services Gateway Performance Testing
Juniper SRX Services Gateway Performance Testing June 2017 DR170517D Miercom.com www.miercom.com Contents Executive Summary... 3 Products Tested... 5 SRX300 Series... 5 SRX550... 5 SRX1500... 6 How We
More informationCisco Webex Cloud Connected Audio
White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected
More informationCisco RV180 VPN Router
Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow
More informationQLIKVIEW SCALABILITY BENCHMARK WHITE PAPER
QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER Hardware Sizing Using Amazon EC2 A QlikView Scalability Center Technical White Paper June 2013 qlikview.com Table of Contents Executive Summary 3 A Challenge
More informationDrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume
DrayTek Vigor 3900 Technical Specifications WAN Protocol Ethernet PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6 Multi WAN Outbound policy based load balance Allow your local network to access Internet
More informationWHITE PAPER. Monitoring Converged Networks: Link Aggregation
WHITE PAPER Monitoring Converged Networks: Link Aggregation www.ixiacom.com 915-6896-01 Rev. A, July 2014 2 Table of Contents Benefits... 4 Introduction... 4 The Net Optics Solution... 4 Easy-to-Use...
More informationValidation of Cisco SCE8000
Isocore Technical Report Validation of Cisco SCE8000 ISOCORE Internetworking Lab ISOCORE Technical Document Reference: ITD: 13039 Version (v1.3): 4/10/09 ISOCORE Internetworking Lab 1 12359 Sunrise Valley
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationCisco Universal Small Cell 8050 Enterprise Management System
Data Sheet Cisco Universal Small Cell 8050 Enterprise Management System The Cisco Universal Small Cell 8050 Enterprise Management System (USC 8050 EMS) is part of the Cisco Universal Small Cell Solution,
More informationThis release of the product includes these new features that have been added since NGFW 5.5.
Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade
More informationTOLLY. Premise: Buyers of multi-port. BayStack T Switch Fast Ethernet Switch Competitive Evaluation Backplane Capacity.
Preise: Buyers of ulti-port switches need to know the actual capacity of the backplane (switching fabric) used to interconnect ports. To assure a non-blocking environent i.e., all ports can run at wire-speed
More informationCheck Point VPN-1/FireWall-1 Performance Pack Guide
Check Point VPN-1/FireWall-1 Performance Pack Guide NG FP3 For additional technical information about Check Point products, consult Check Point s SecureKnowledge at http://support.checkpoint.com/kb/ September
More informationAruba Networks engaged Miercom to provide an independent
Key findings and conclusions: Lab Testing Summary Report October 213 Report 1396 Purpose-built 82.11ac APs double the 82.11n device performance and show 51% greater 82.11ac device performance compared
More informationH3C S12516X-AF Sets New World Records for Data Center Performance. June 2017
H3C S12516X-AF Sets New World Records for Data Center Performance June 2017 T A B L E O F C O N T E N T S Executive Summary... 3 About This Test.... 4 Performance Test Results.......................................................
More informationCisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:
MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationWeb Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates
Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last
More informationHuawei Technologies engaged Miercom to conduct an evaluation
Time (ms) Key findings and conclusions: Lab Testing Summary Report March 2012 Report SR120130B Huawei switches, with up to 48 10GE ports, provide high performance for server access and enterprise aggregation
More informationTEST METHODOLOGY. SSL/TLS Performance. v1.0
TEST METHODOLOGY SSL/TLS Performance v1.0 Table of Contents 1 Introduction... 3 1.1 The Need for SSL/TLS Performance Testing... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 3 2 SSL/TLS
More informationNext-Generation Firewall Series Datasheet
RUIJIE NETWORKS COMPANY LIMITED www.ruijienetworks.com Ruijie 1600 Next-Generation Firewall Series Datasheet Ruijie 1600 Firewall Series is a collection of nextgeneration firewall offering security, routing
More informationActive Directory in Networks Segmented by Firewalls
Active Directory in Networks Segmented by Firewalls Microsoft Corporation Published: July 2002 Updated: October 2004 Abstract Microsoft Active Directory service domain controllers are increasingly being
More informationIntrusion Prevention System Performance Metrics
White Paper Intrusion Prevention System Performance Metrics The Importance of Accurate Performance Metrics Network or system design success hinges on multiple factors, including the expected performance
More informationMellanox Virtual Modular Switch
WHITE PAPER July 2015 Mellanox Virtual Modular Switch Introduction...1 Considerations for Data Center Aggregation Switching...1 Virtual Modular Switch Architecture - Dual-Tier 40/56/100GbE Aggregation...2
More informationRequest for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )
Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;
More informationHikCentral V1.3 for Windows Hardening Guide
HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote
More informationNETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi
NETGEAR-FVX538 Relation Fabrizio Celli;Fabio Papacchini;Andrea Gozzi -2008- Abstract Summary... 2 Chapter 1: Introduction... 4 Chapter 2: LAN... 6 2.1 LAN Configuration... 6 2.1.1 First experiment: DoS
More informationSonus Networks engaged Miercom to evaluate the call handling
Key findings and conclusions: Lab Testing Summary Report September 2010 Report 100914B Product Category: Session Border Controller Vendor Tested: Sonus SBC 5200 successfully registered 256,000 user authenticated
More informationScopia XT Desktop Server
Scopia XT Desktop Server Deployment Guide Version 8.2.1 For Solution 8.2 8.2.1 2000-2013 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected
More informationNSG100 Nebula Cloud Managed Security Gateway
Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive
More informationH Q&As. HCNA-HNTD (Huawei Network Technology and Device) Pass Huawei H Exam with 100% Guarantee
H12-211 Q&As HCNA-HNTD (Huawei Network Technology and Device) Pass Huawei H12-211 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More informationCisco XR Series Service Separation Architecture Tests
Cisco XR 12000 Series Service Separation Architecture Tests Introduction In April 2005, Cisco Systems released the XR 12000 Series routers bringing the functionality of IOS XR to the edge of next generation
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationThe Truth About Router Performance
The Truth About Router Performance Multiservice Routers versus Integrated Service Routers (Gen. 2) Frank Ohlhorst Lab Director/Product Analyst The Truth About Router Performance 2 Router performance has
More informationHillstone IPSec VPN Solution
1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private
More informationTOLLY. Token Ring Switching: The Next Generation Prevails. Executive Summary. September 1998
T H E TOLLY G R O U P September 1998 Executive Summary 2251 Landmark Place Manasquan, NJ 08736 732.528.3300 732.528.1888 fax http://www.tolly.com info@tolly.com The Tolly Group provides strategic consulting,
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationDeploying Gigabit Ethernet to the Desktop: Drivers and Applications
Deploying Gigabit Ethernet to the Desktop: Drivers and Applications The Federal Reserve estimates that the greater use of information technology accounts for 60 percent of the gains in the non-farm business
More informationData Center 40GE Switch Study. Cisco Nexus 9508 DR L. 24 February 2014 Report DR140126L
Data Center 40GE Switch Study DR 140126L 24 February 2014 Report DR140126L Contents 1 Executive Summary... 3 2 Introduction... 4 3 Test Bed Setup and How We Did It... 5 4 Throughput and Latency Performance
More informationPerformance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database. An Oracle White Paper Released October 2003
Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database An Oracle White Paper Released October 2003 Performance and Scalability Benchmark: Siebel CRM Release
More informationT E C H N I C A L S A L E S S O L U T I O N S
Product Management Document InterScan Web Security Virtual Appliance Customer Sizing Guide September 2010 TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 www.trendmicro.com Toll free: +1 800.228.5651
More informationDeployment Scenarios
This chapter describes and shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series Intergrated Services Routers (ISRs): About the, page 1 Enterprise Small Branch, page
More informationCisco RV 120W Wireless-N VPN Firewall
Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations
More informationExam: : VPN/Security. Ver :
Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution
More informationStoneGate Management Center. Release Notes for Version 4.0.1
StoneGate Management Center Release Notes for Version 4.0.1 Table of Contents What s New................................. page 3 System Requirements......................... page 6 Build Version...............................
More informationGigabit Content Security Router CS-5800
Gigabit Content Security Router CS-5800 Presentation Outline Product Overview Product Feature Product Application Product Comparison Appendix 2 / 34 Overview What is the Content filter? Content filtering
More informationQuickSpecs. Key Features and Benefits. HP C-Series MDS 9000 Storage Media Encryption (SME) Software. Overview. Retired
Overview MDS 9000 Storage Media Encryption (SME) secures data stored on tape drives and virtual tape libraries (VTLs) in a storage area network (SAN) environment using secure IEEE standard Advanced Encryption
More informationSecure ACS Database Replication Configuration Example
Secure ACS Database Replication Configuration Example Document ID: 71320 Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information Scenario I Scenario
More informationG R O U P. Check Point Proactively Protects More Applications at the Perimeter in a Single Gateway with Greater Security ROI than Cisco or Juniper
The authoritative, unbiased source for IT certification, research and testing WHITE PAPER February 2005 A white paper commissioned by Check Point Software Technologies Document #205101 Improving Security
More informationVPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities
Product Highlights Comprehensive Management Solution Advanced features such as WAN failover, load balancing, and integrated firewall help make this a reliable, secure, and flexible way to manage your network.
More informationVPN-1 Power VSX VSX NGX R65 HFA 10. Release Notes
VPN-1 Power VSX VSX NGX R65 HFA 10 Release Notes 12 November, 2009 More Information To view the latest version of this document, see the User Center (http://supportcontent.checkpoint.com/documentation_download?=10363).
More informationG R O U P. The Business Case for Multi-Vendor Networks WHITE PAPER. April A white paper commissioned by 3Com Corporation.
The authoritative, unbiased source for IT certification, research and testing WHITE PAPER April 2004 A white paper commissioned by 3Com Corporation Document #204111 Enterprise WAN Strategies: The Business
More informationSpecifying Storage Servers for IP security applications
Specifying Storage Servers for IP security applications The migration of security systems from analogue to digital IP based solutions has created a large demand for storage servers high performance PCs
More informationThe Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing
. White Paper The Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing Executive Summary The Cisco WebEx Node for the Cisco ASR 1000 Series,
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationDeployment Overview. Logging via SiteManager EasyTunnel Client
Logging via SiteManager EasyTunnel Client Deployment Overview This guide describes the deployment process when using the SiteManager EasyTunnel VPN Client function for fetching log data from devices to
More information