TOLLY. No August 2002

Size: px
Start display at page:

Download "TOLLY. No August 2002"

Transcription

1 No August 2002 Check Point Software Technologies Ltd. VPN-1 Pro vs. Cisco Systems PIX-535 and NetScreen Technologies NetScreen-500 Competitive Evaluation of Enterprise-Class Internet Security Solutions Premise: When considering the purchase of firewall and VPN devices, network architects and managers need to validate performance characteristics of available security products. With the growth in high-speed Internet access, network managers must contend with the potential performance degradation frequently associated with providing a secure data path. Check Point Software Technologies Ltd. commissioned The Tolly Group to evaluate its VPN-1 Pro, an enterprise-class security solution that integrates firewall and VPN capabilities against two other enterprise products: a Cisco Systems Inc. PIX- 535 and a Net-Screen Technologies Inc. NetScreen-500. T H E TOLLY G R O U P Test Highlights Test Summary outperforms Cisco PIX-535 and NetScreen-500 by 14% and 100% respectively in a singlerule firewall configuration using 64-byte packets outperforms both PIX-535 and NetScreen by 400% each in an IPSec 3DES firewall/vpn configuration using 64-byte packets Check Point s AES outperforms the fastest competitive VPN 3DES configurations by 277% and 294% respectively delivers 57% more throughput while securing "real-world" traffic than NetScreen-500 in a firewall configuration Gigabit Ethernet Firewall Throughput Zero-Loss ( 0.01%) Bidirectional Performance with UDP Traffic Streams Measured by SmartFlow The security devices were subjected to a battery of performance tests that were grouped into three sections: UDP firewall benchmarks, UDP VPN performance, and a real-world mix of Layer 7 application traffic. Tests were conducted in July and August Results Throughput in Mbit/s Single-rule Firewall Bidirectional Throughput Engineers measured the bidirectional packet throughput of each device Devices under test (DUT) Source: The Tolly Group, August 2002 Figure The Tolly Group Page 1

2 configured as a single-rule firewall with two Gigabit Ethernet interfaces. In tests of 64-byte UDP packets traversing a Gigabit Ethernet link, Check Point s VPN-1 Pro achieved 160 Mbit/s of throughput, or 14% greater throughput than the PIX-535 and 100% greater throughput than the NetScreen- 500, which delivered 140 Mbit/s and 80 Mbit/s of throughput, respectively (see Figure 1). In tests of 1,518-byte UDP packets traversing a Gigabit Ethernet link, Check Point s VPN-1 Pro achieved 1.92 Gbit/s of bidirectional throughput, which represents a 9% lead over the PIX-535 and more than three times that offered by the NetScreen-500, which delivered 1.76 Gbit/s and 600 Mbit/s of throughput, respectively. See Throughput in Mbit/s 3DES VPN Throughput Zero-Loss ( 0.01%) Bidirectional Performance with UDP Traffic Streams Measured by SmartFlow 1 Devices under test (DUT) 1 DUTs were peered with a Check Point device. The Check Point device may have limited NetScreen's throughput on the 1,450-byte frame size test. Source: The Tolly Group, August 2002 Figure 2 Check Point Software Technologies leads all vendors in dual-port firewall tests, but its VPN-1 Pro also posted generous firewall throughput results in four-port tests. Check Point Excels in Four-Port Test achieved 240 Mbit/s or 50% more throughput than offered in a dual-port configuration. With 1,518-byte packets, the VPN-1 Pro forwarded 2.84 Gbit/s of traffic. The Tolly Group tested the firewall functionality of the VPN-1 Pro in a four-port configuration with both 64- byte and 1,518-byte packets across Gigabit Ethernet interfaces. With 64-byte packets, the VPN-1 Pro These results show that if the need occurs, Check Point can outfit a device with four Gigabit Ethernet ports that can deliver roughly 50% more traffic than with the dual-port configuration. VPN-1 Pro Four-port Firewall Performance Throughput (Mbit/s) 3,000 2,000 1, byte packets 2,840 1,518-byte packets 2002 The Tolly Group Page 2

3 sidebar on four-port test results, page 2. IPSec Firewall-VPN Tunnel Throughput The Tolly Group tested VPN tunnel throughput using IPSec 3DES and IPSec Advanced Encryption Standard (AES). Engineers benchmarked the bidirectional packet throughput of VPN tunnels with each device paired with the Check Point VPN-1 Pro solution (including a test of matching Check Point devices). Engineers utilized a UDP packet stream for this test. This is a rigorous test of firewall/vpn functionality because the traffic is being filtered rather than just being allowed to pass through unexamined. Engineers created a single tunnel between the device peers and streams of packets were generated from a Spirent SmartBits, including 64-byte packets and 1,450-byte packets. The packet sizes selected represented 64-byte packets, the smallest for Gigabit Ethernet, as well as 1,450-byte packets that approximate the largest packet size that can be sent across the VPN tunnel without fragmentation. Check Point Software Technologies Ltd. VPN-1 Pro Competitive Evaluation VPN Throughput: IPSec 3DES Engineers measured the throughput of a VPN tunnel supporting the 3DES encryption algorithm. MD5 was utilized as the hashing algorithm. In tests of 64-byte Check Point Software Technologies Ltd. VPN-1 Pro Product Specifications* Performance 1,500,000 concurrent firewall connections 40,000 concurrent VPN tunnels 3.1 Gbit/s firewall throughput 800 Mbit/s AES VPN throughput 400 Mbit/s 3DES VPN throughput (with accelerator card) Firewall ActiveX and Java blocking SmartDefense attack blocking Stateful inspection of 150+ applications Security servers Online attack defense updates VPN IPSec/IKE, AES 256/128, DES/3DES, SHA1/MD5 Integrated certificate authority OneClick VPNs Data compression VPN Client Integrated client firewall Security configuration verification Windows domain login Authentication via RADIUS, SecureID, LDAP, TACACS/TACACS+, S/Key, OS/internal password, digital certificates NAT traversal Management One-Click Management Automated client/gateway software distribution Up to 100 virtual systems and VLANs Management server high availability Visual policy management Redundant logging Automated log archival Real-time performance and status monitoring High Availability/Load Sharing Active session fail-over (including VPN) Integrated load sharing QoS Quality of Service (QoS) Bandwidth weights, limits, guarantees DiffServ For more information contact: Check Point Software Technologies Ltd. Phone: (800) URL: *Vendor-supplied information not verified by The Tolly Group 2002 The Tolly Group Page 3

4 packets, the Check Point VPN-1 Pro achieved 100 Mbit/s of throughput, versus 20 Mbit/s of throughput each for the Cisco PIX-535 and the NetScreen-500. AES VPN Throughput Zero-Loss ( 0.01%) Bidirectional Performance with UDP Traffic Streams Measured by SmartFlow 1 For 1,450-byte packets, Check Point s VPN-1 Pro achieved 180 Mbit/s, the NetScreen-500 forwarded the same amount of traffic, and the PIX-535 supported 100 Mbit/s of traffic (see Figure 2). VPN Throughput: IPSec AES Next, The Tolly Group used AES as the encryption algorithm. For 64-byte packets, the achieved 100 Mbit/s of throughput while the NetScreen-500 forwarded just 5 Mbit/s of traffic. NetScreen passed (0.25%) traffic, but not enough to reach the 1% resolution of the data point for the test tool. For this purpose, we are showing that NetScreen did pass some traffic. Cisco does not support AES in the release of the PIX-535 available for testing. For 1,450-byte packets, Check Point VPN-1 Pro supported 500 Mbit/s and the NetScreen-500 passed 20 Mbit/s of traffic. In this test, Check Point proved it is ahead of other rivals in deployment of AES, the National Institute of Standards and Technologies (NIST) FIPS-approved standard for next-generation security by U.S. government organizations. See Figure 3. Throughput in Mbit/s Real-world application performance The final benchmark involved generating real-world traffic by simulating application layer traffic flows with the use of a NetIQ Chariot. The theory behind doing a realworld test is that using application traffic is a much more realistic type of traffic than sending one frame size (64- byte packets) continuously. Therefore, The Tolly Group attempted to find the throughput value for a mixture of packet sizes that approximates the distribution observed for actual Internet traffic. This test encompassed both firewall and VPN test configurations. Devices under test (DUT) 1 DUTs were peered with a Check Point device. Cisco did not participate because the PIX-535 does not support AES. Source: The Tolly Group, August 2002 Figure 3 In the firewall portion of the test, Check Point s VPN-1 Pro forwarded 758 Mbit/s of application traffic, versus 726 Mbit/s for the PIX-535 and 478 Mbit/s for the NetScreen-500. In the tests using 3DES encryption, Check Point s VPN-1 Pro supported 106 Mbit/s versus 69 Mbit/s for the NetScreen- 500 and 66 Mbit/s for the PIX-535. In the AES tests, the Check Point VPN-1 Pro supported traffic at 260 Mbit/s and the NetScreen-500 supported traffic at 10 Mbit/s (see Figure 4). Cisco s PIX-535 does not support AES, thus did not participate in that portion of the test The Tolly Group Page 4

5 Firewall and VPN Throughput Real-World Traffic Mix Throughput in Mbit/s Devices under test (DUT) 1 Cisco did not participate because the PIX-535 does not support AES. Source: The Tolly Group, August 2002 Figure 4 Analysis The consistently demonstrated higher performance than competitive products in both firewall and VPN tests over Gigabit Ethernet connections. On the firewall side, the VPN-1 Pro achieved 15% greater throughput than its nearest competitor in 64-byte tests. In VPN tests using 3DES with firewall functionality enabled, the VPN- 1 Pro demonstrated five times more throughput than both rival products tested. And in VPN tests utilizing the AES algorithm with firewall functionality enabled, the VPN-1 Pro delivered 25X greater throughput than the NetScreen In tests measuring the throughput of application traffic flowing across a VPN connection with an active firewall, the VPN-1 Pro delivered an average 57% more traffic. From a price/performance perspective, the VPN-1 Pro offered a cost-per-megabit that is three times less costly than its nearest rival, the NetScreen- 500 and more than four times less costly than the PIX-535. The cost-per-megabit metric divides the real-world firewall Mbit/s throughput results into the total cost of the device under test to obtain a relative cost-per-megabit of throughput. The configuration as tested, including software, PC and NICs, cost $16,200, or 116% less than the NetScreen-500's configuration price of $34,995 (hardware, NICs and software included) and more than 400% less costly than the Cisco PIX-535 configuration price of $66,000 ($59,000 for hardware, $6,000 for two Gigabit Ethernet fiber NICs and $1,000 for a 3DES license). When those prices are divided by their firewall Mbit/s performance results, the cost per megabit of throughput is $21.37 for the VPN-1 Pro, $73.21 for the NetScreen-500 and $90.91 for the PIX-535. This shows that the VPN-1 Pro holds a 2002 The Tolly Group Page 5

6 performance and a capital investment advantage over the rival products tested. Related Tests The Tolly Group conducted a similar set of firewall/vpn performance benchmarks for NetScreen Technologies, Ltd., which was published in July 2001 (Document ). It is important to note that the performance results of the NetScreen- 500 in this report do not match the performance of the device in the earlier report. In the July 2001 tests, NetScreen tested Version Beta 3 of its software, versus Version 3.1 for the current tests. While the tests may have yielded different results, it is important to note they do not share identical test parameters or configurations. Test Configuration and Methodology IPSec Tunnel Test Bed Configuration For IPSec tunnel performance tests, engineers connected a pair of Check Point Software VPN-1 Pro devices, SecurePlatform NG FP2 with Performance Pack to each other via full-duplex Gigabit Ethernet using SC fiber-optic cable. This software was run on a 2.4-GHz Xeon processor with 1 Gigabyte of RAM and served as a VPN peer with all of the devices under test. The other Check Point Software VPN-1 Pro configured as an IPSec gateway was running on a 2.2-GHz processor with 1 Gigabyte of RAM. For competitive IPSec tunnel performance tests, engineers replaced one of the Check Point devices configured as an IPSec gateway with either a Cisco Systems, Inc. PIX-535, Version 6.1(2) equipped with a PIX VPN Accelerator card or a NetScreen Technologies NetScreen-500, ScreenOS version 3.1. The test devices were connected via Gigabit Ethernet to a Spirent Communications SMB Advanced Multiport Performance/Tester/Analyzer. The SmartBits console ran Spirent SmartFlow 1.5. Each device under test also was connected to an Acterna Domino DA-360 hardware-based network analyzer running DominoNAS software version 3.1 configured for 1000BASE- SX. This device verified packet sizes, utilization and encryption. In all tests, DUTs were tested in a dual-port configuration, except for firewall tests where engineers also tested the VPN-1 Pro in a four-port configuration. Firewall Test Bed Configuration and Methodology For firewall throughput, engineers removed one of the Check Point Software VPN-1 Pro devices; the remaining test bed was the same as the IPSec tunnel test bed. Engineers configured the DUT as a singlerule, allow-all firewall. The Tolly Group engineers measured the percent of traffic the device forwarded when offered 100% of the theoretical maximum load and adjusted the offered load in 1% decrements until zero-loss ( 0.01%) was achieved. SmartBits generated 64-byte and 1,518-byte UDP packets. SmartBits measured the percent of traffic forwarded by the firewall under test. Engineers ran three iterations of each packet size for 60 seconds and results were averaged. IPSec Tunnel Test Methodology IPSec performance tests were conducted with each DUT operating as a VPN/IPSec gateway. All traffic was encrypted using 3DES/MD5 for one series of tests and using AES/MD5 for a second series of tests. Tolly Group engineers tested the DUTs for zero-loss ( 0.01%) throughput. For steady-state, zero-loss, bidirectional packet-per-second throughput tests, engineers measured the packet loss of the DUT when offering 100% of the theoretical maximum load and adjusted the offered load in 1% decrements until zero-loss was achieved. SmartBits generated 64-byte and 1,450-byte UDP packets (1,450-byte packets were used to avoid packet fragmentation). Smart- Bits measured the percent of zero-loss line-rate traffic that traversed the device under test. Engineers ran three iterations of each packet size for 60 seconds and results were averaged. Note: Typically, The Tolly Group tests VPN tunnel throughput with matching pairs of devices on each end of the VPN tunnel. For budget reasons, Check Point requested the use of mismatched units with one 2002 The Tolly Group Page 6

7 of the Check Point devices serving as one end of the VPN tunnel. In the IPSec 3DES test at 1,450 bytes, the use of the Check Point device as a VPN tunnel pair for the NetScreen- 500 may have been a gating factor in overall VPN throughput performance. Layer 7 Application VPN/firewall throughput test For Layer 7 application throughput across a VPN/firewall, engineers connected a pair of Check Point Software VPN-1 Pro devices to each other via full-duplex Gigabit Ethernet using SC fiber-optic cable. Engineers then replaced one of the Check Point devices with either a Cisco Systems PIX-535 or a NetScreen Technologies NetScreen-500. For this series of tests, engineers configured the DUT as a singlerule, allow-all firewall with NAT disabled, and as an IPSec gateway. All traffic was encrypted using 3DES, MD5 for one series of tests and using AES, MD5 for a second series of tests. The test devices connected to an Extreme Networks Alpine This switch supported links to eight PCs configured as NetIQ Chariot endpoints and a connection to a Chariot server console. The following devices ran Chariot Endpoint software: an 800-MHz Intel Pentium 3 with 512 Mbytes of RAM; two 800-MHz Intel Pentium 3 processors with 512 Mbytes of RAM; three 2.4-MHz dual-processor Xeon Pentium 4 with 512 Mbytes of RAM; and two 500-MHz Intel Pentium 3 processors with 128 Mbytes of RAM. All endpoints ran Chariot 4.1 software and Windows 2000, Service Pack 2. A 1-GHz Pentium III processor with 256 Mbytes of RAM served as the Chariot console; the Domino DA-360 console ran Spirent SmartFlow 1.5. The real-world traffic test consisted of massive numbers of concurrent variable sized TCP (HTTP) transactions. The transaction size distribution used in the mix was based on the well known SPECWeb99 benchmark and imitated the HTTP transaction mix recorded on busy real-life enterprise Web servers. The test-bed consisted of multiple pairs of Chariot endpoints, simulating HTTP clients and servers. Each HTTP client performed multiple, variable-sized HTTP- GET transactions with HTTP servers. Engineers ran the test script for duration of two minutes, for three iterations and averaged results. For all performance tests, a Domino DA-360 device verified packet sizes and utilization but was removed prior to testing. Equipment Acquisition and Support The Cisco Systems PIX-535 and the NetScreen Technologies NetScreen-500 were acquired through normal product distribution channels. The Tolly Group contacted executives at the vendor companies and invited them to provide a higher level of support than available through normal channels. Executives from Cisco did not respond; NetScreen accepted the offer. The Tolly Group verified product release levels and shared test configurations with executives from NetScreen in order to give them an opportunity to optimize their device for the tests. Results were shared with NetScreen executives who neither acknowledged nor disputed their accuracy The Tolly Group Page 7

8 VPN Test Bed 1 1 The test bed for the firewall test replicated this scenario except that it used a single firewall instead of two VPN endpoints. Source: The Tolly Group, August 2002 Figure 5 The Tolly Group gratefully acknowledges the providers of test equipment used in this project. Vendor Product Web address Acterna Corp. Domino Internetwork Analyzer Cybex Slimline Commander Extreme Networks Alpine NetIQ Chariot Console Spirent Communications SmartBits SmartFlow Tolly Group Services With more than a decade of testing experience of leadingedge network technologies, The Tolly Group employs time-proven test methodologies and fair testing principles to benchmark products and services with the highest degree of accuracy. Plus, unlike narrowly focused testing shops, The Tolly Group combines its vast technology knowledge with focused marketing services to help clients better position product benchmarks for maximum exposure. The company offers an unparalleled array of reports and services including: Test Summaries, Tolly Verifieds, performance certification programs, educational Webcasts, white paper production, proof-of-concept testing, network planning, industry studies, end-user services, strategic consulting and integrated marketing services. Learn more about The Tolly Group services by calling (732) , or send to info@tolly.com. For info on the Fair Testing Charter, visit: Project Profile Sponsor: Check Point Software Technologies Ltd. Document number: Product class: Enterprise-class Internet security system Products under test: Check Point Software Technologies Ltd. VPN-1 Pro, SecurePlatform NG FP2 Cisco Systems, Inc. PIX 535 Firewall, Version 6.1(2) NetScreen Technologies, Inc. NetScreen-500, ScreenOS, version 3.1 Testing window: July through August 2002 Software status: Generally available For more information on this document, visit our Web site at send to info@tolly.com, or call (732) Internetworking technology is an area of rapid growth and constant change. The Tolly Group conducts engineering-caliber testing in an effort to provide the internetworking industry with valuable information on current products and technology. While great care is taken to assure utmost accuracy, mistakes can occur. In no event shall The Tolly Group be liable for damages of any kind including direct, indirect, special, incidental, and consequential damages which may result from the use of information contained in this document. All trademarks are the property of their respective owners. The Tolly Group doc rev. clk 24 Oct The Tolly Group Page 8

T H E TOLLY. No September 2002

T H E TOLLY. No September 2002 No. 202149 September 2002 Dell PowerConnect 3248 versus 3Com SuperStack 3 Switch 4400 and Cisco Systems, Inc. Catalyst 2950 Layer 2 Fast Ethernet/Gigabit Ethernet Switching Competitive Evaluation Premise:

More information

TOLLY. No March NetScreen Technologies, Inc. 2,000 1,750 1,500 1,250 1, Aggregate throughput.

TOLLY. No March NetScreen Technologies, Inc. 2,000 1,750 1,500 1,250 1, Aggregate throughput. No. 222 March 22 NetScreen Technologies, Inc. versus Nokia IP74 and Cisco Systems PIX 535 Competitive Evaluation of Multi-gigabit Firewall/VPN Multifunction Devices Premise: Two trends today are redefining

More information

TOLLY. No July 2002

TOLLY. No July 2002 No. 202131 July 2002 VINA Technologies, Ltd. VINA erouter versus ADTRAN Total Access 616-TDM and TA 600R-TDM, Cisco Systems 1720 and Netopia R5300 Competitive Performance Evaluation Premise: Customers

More information

TOLLY. Extreme Networks, Inc.

TOLLY. Extreme Networks, Inc. No. 202135 June 2002 BlackDiamond 6800 series 10GLRi module versus Cisco Systems, Inc. Catalyst 6509 outfitted with WS-X6502-10GE 10-Gigabit Ethernet LAN PHY Interface Competitive Performance Evaluation

More information

T H E TOLLY. No September Dell PowerConnect 3348 vs. 3Com SuperStack 3

T H E TOLLY. No September Dell PowerConnect 3348 vs. 3Com SuperStack 3 No. 203116 September 2003 Dell Inc. Dell PowerConnect 3348 vs. 3Com SuperStack 3 Switch 4400 and Cisco Systems Catalyst 2950 Layer 2 Fast Ethernet/Gigabit Ethernet Competitive Switch Evaluation Premise:

More information

TOLLY. Dell Computer Corp. commissioned. Test Summary. Test Highlights

TOLLY. Dell Computer Corp. commissioned. Test Summary. Test Highlights T H E TOLLY G R O U P No. 201131 September 2001 Dell Computer Corp. PowerConnect 3024 and PowerConnect 5012 Performance Evaluation Test Summary Premise: Customers looking to deploy Fast Ethernet/Gigabit

More information

TOLLY. No July 2001 Nortel Networks, Inc. Contivity 2600 VPN Switch Firewall/VPN Multi-Service Performance Evaluation. Throughput (Mbit/s)

TOLLY. No July 2001 Nortel Networks, Inc. Contivity 2600 VPN Switch Firewall/VPN Multi-Service Performance Evaluation. Throughput (Mbit/s) T H E TOLLY G R O U P No. 201130 July 2001 Nortel Networks, Inc. VPN Switch Firewall/VPN Multi-Service Performance Evaluation Test Summary Premise: Buyers of enterprise-class VPN/firewall devices need

More information

TOLLY. No July 1999

TOLLY. No July 1999 Premise: Customers who choose to deploy virtual private networks (VPNs) across large campus installations require products that provide excellent throughput while simultaneously supporting hundreds of

More information

TOLLY. Nortel Networks. Contivity Extranet Switch Test Summary. Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput

TOLLY. Nortel Networks. Contivity Extranet Switch Test Summary. Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput T H E TOLLY G R O U P No. 199104 January 1999 Nortel Networks Contivity Extranet Switch 4000 Fast Ethernet-to-Fast Ethernet Layer 2 Tunneling Protocol Throughput Test Summary Premise: As savvy network

More information

TOLLY. Tasman Networks, Inc. commissioned. Tasman Networks, Inc and 1004 Routers. Test Summary

TOLLY. Tasman Networks, Inc. commissioned. Tasman Networks, Inc and 1004 Routers. Test Summary Tasman Networks, Inc. 1002 and 1004 Routers Competitive Performance Evaluation versus Cisco 1841, 2811 and 2821 Integrated Service Routers Premise: Wide-area network routers that provide T1/E1 access for

More information

T H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second

T H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second No. 200235 March 2001 StreamCore StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) TCP/IP WAN Access Link Flow Regulation System Performance Evaluation Premise: Network professionals

More information

TOLLY. No March Fortress Technologies, Inc.

TOLLY. No March Fortress Technologies, Inc. Fortress Technologies, Inc. Encryption and Compression Performance Evaluation of Three Models (FC-1500, FC-500 and FC-250) Test Highlights Premise: Wireless networks are getting faster and enterprise deployments

More information

TOLLY. Nortel, Inc. Ethernet Routing Switch 5000 Series. Test Summary

TOLLY. Nortel, Inc. Ethernet Routing Switch 5000 Series. Test Summary , Inc. Switch 5 Series Competitive Performance Evaluation versus Catalyst 75G and ProCurve cl Premise: When considering the purchase of stackable switches, network managers need to know the performance

More information

TOLLY. No b April T4 Routing Switch versus Cisco Systems, Inc. Catalyst Layer 3 Switch Competitive Evaluation

TOLLY. No b April T4 Routing Switch versus Cisco Systems, Inc. Catalyst Layer 3 Switch Competitive Evaluation No. 202109b April 2002 Premise: Network managers who deploy Fast Ethernet/Gigabit Ethernet switches need to know that the devices can deliver zero-loss throughput with minimal latency to support time-sensitive

More information

TOLLY. No December 2001 Fujitsu, Ltd. GeoStream R940 IP Switching Node Performance Evaluation. Cause

TOLLY. No December 2001 Fujitsu, Ltd. GeoStream R940 IP Switching Node Performance Evaluation. Cause T H E TOLLY G R O U P No. 201139 December 2001 GeoStream R940 IP Switching Node Performance Evaluation Test Summary Premise: Carrier-class routers designed for the core backbone of the Internet must exhibit

More information

TOLLY. No January Throughput (transactions per second) 9,000 8,121 8,160 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000

TOLLY. No January Throughput (transactions per second) 9,000 8,121 8,160 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000 Networks Smart 16/4 Mk3 (Wake-on-LAN) & Plus Adapter Application Throughput for Transaction Processing and IP File Transfers Premise: The majority of token-ring users consist of large institutions and

More information

TOLLY. No November 2005 Nortel Ethernet Routing Switch 5510, 5520, 5530 Layer 2 Performance, Resiliency and Ease of Use

TOLLY. No November 2005 Nortel Ethernet Routing Switch 5510, 5520, 5530 Layer 2 Performance, Resiliency and Ease of Use T H E TOLLY G R O U P No. 205137 November 2005 Nortel Ethernet Routing Switch 5510, 5520, 5530 Layer 2 Performance, Resiliency and Ease of Use Test Summary Premise: When considering the purchase of stackable

More information

TOLLY. VPN Gateway 3070 SSL VPN Throughput, Scalability and Voice Quality Benchmark Evaluation. Test Summary. Test Highlights

TOLLY. VPN Gateway 3070 SSL VPN Throughput, Scalability and Voice Quality Benchmark Evaluation. Test Summary. Test Highlights T H E TOLLY G R O U P No. 25113 June 25 VPN Gateway 37 SSL VPN Throughput, Scalability and Voice Quality Benchmark Evaluation Test Summary Premise: Not all virtual private network (VPN) gateways are the

More information

Cabletron Systems Inc. SmartSwitch 9000 Token Ring Switching in Heterogeneous Networks

Cabletron Systems Inc. SmartSwitch 9000 Token Ring Switching in Heterogeneous Networks 1R 7 + ( 72//< * 5 2 8 3 -DQXDU\ Cabletron Systems Inc. SmartSwitch 9000 Switching in Heterogeneous Networks Test Summary & abletron Systems Inc. commissioned The Tolly Group to benchmark the SmartSwitch

More information

Force10 Networks, Inc.

Force10 Networks, Inc. No. 204148 Force10 Networks, Inc. TeraScale E-Series E1200 Resilient Switch/Router Evaluation of Non-Stop Networks, Advanced QoS and Scalability Premise: Enterprises and service providers are faced with

More information

TOLLY. No June Reflection for the Web v versus IBM SecureWay Host On-Demand v Web-to-Host Software Competitive Evaluation

TOLLY. No June Reflection for the Web v versus IBM SecureWay Host On-Demand v Web-to-Host Software Competitive Evaluation No. 200216 June 2000 WRQ, Inc. Reflection for the Web v. 4.0. versus IBM SecureWay Host On-Demand v. 4.0.4 Web-to-Host Software Competitive Evaluation Premise: With the adoption of the Web browser as the

More information

TOLLY. No June Functional Verification and Performance Evaluation. Windows 2000 with IIS5 1 Web Server Performance.

TOLLY. No June Functional Verification and Performance Evaluation. Windows 2000 with IIS5 1 Web Server Performance. Premise: Web content providers seeking faster end-to-end performance are adopting Web acceleration devices to decrease client-side response times and ease overall strain on Web servers. While caching devices

More information

TOLLY. Citrix Systems, Inc. Citrix Systems, Inc. commissioned. Citrix Presentation Server 4.0. Test Summary

TOLLY. Citrix Systems, Inc. Citrix Systems, Inc. commissioned. Citrix Presentation Server 4.0. Test Summary Citrix Systems, Inc. Citrix Presentation Server 4.0 Performance Study of Citrix Presentation Server and Windows Terminal Services Premise: Windows Terminal Services, an element of Microsoft Windows Server,

More information

TOLLY No April Com Corporation

TOLLY No April Com Corporation T H E TOLLY G R O U P No. 199110 April 1999 3Com Corporation OfficeConnect LAN Modem ISDN Router Competitive Evaluation Test Summary Premise: Buyers of dial-on-demand ISDN routers for small office/home

More information

TOLLY. Radware, Inc. Radware, Inc. commissioned. DefensePro Test Summary. Throughput Benchmark and Attack Mitigation Evaluation.

TOLLY. Radware, Inc. Radware, Inc. commissioned. DefensePro Test Summary. Throughput Benchmark and Attack Mitigation Evaluation. Radware, Inc. DefensePro 3000 Throughput Benchmark and Attack Mitigation Evaluation Premise: Intrusion prevention products need to detect and block a wide array of common network and application attack

More information

Firewall Performance Evaluation Secure Computing Sidewinder vs. Check Point NGX

Firewall Performance Evaluation Secure Computing Sidewinder vs. Check Point NGX Firewall Performance Evaluation vs. Check Point NGX June 1, 27 Author: Bill Bosen Firewall Performance Evaluation 7 vs. R62 June 1, 27 In view of the fact that firewall performance is becoming more and

More information

TOLLY No September 1999

TOLLY No September 1999 NetReality, Inc. WiseWan 200/S1 Product Evaluation T H E TOLLY G R O U P No. 199129 September 1999 Test Summary Premise: When frame relay was relatively new, it seemed the panacea of consolidation: After

More information

TOLLY. No October Standard file open of a 4MB Excel spreadsheet over a Mbps link (100 ms latency) 29X (3 sec) 9X (10 sec)

TOLLY. No October Standard file open of a 4MB Excel spreadsheet over a Mbps link (100 ms latency) 29X (3 sec) 9X (10 sec) Networks, Inc. I shared Server and I shared Remote Appliances Performance and Functionality Evaluation Premise: Branch-office workers need real-time access to corporate files, services and applications,

More information

TOLLY. No July Standard file open of a 4MB Excel spreadsheet over a Mbps link (100 ms latency) 29X (3 sec) 9X (10 sec) (497 sec)

TOLLY. No July Standard file open of a 4MB Excel spreadsheet over a Mbps link (100 ms latency) 29X (3 sec) 9X (10 sec) (497 sec) , Inc. ishared Server and ishared Remote Appliances Performance and Functionality Evaluation Premise: Branch-office workers need real-time access to corporate files, services and applications, all while

More information

LANCOM Techpaper Routing Performance

LANCOM Techpaper Routing Performance LANCOM Techpaper Routing Performance Applications for communications and entertainment are increasingly based on IP networks. In order to ensure that the necessary bandwidth performance can be provided

More information

T H E TOLLY G R O U P. Competitive Performance Evaluation versus Cisco Catalyst 6509 Switch. Test Highlights (++, .-, -+, E*'7D1&A -()'7D1&A )-,

T H E TOLLY G R O U P. Competitive Performance Evaluation versus Cisco Catalyst 6509 Switch. Test Highlights (++, .-, -+, E*'7D1&A -()'7D1&A )-, T H E TOLLY G R O U P No. 206168 December 2006 Blade Network Technologies, Inc. Nortel Layer 2/3 10Gb Uplink Ethernet Switch Module & Nortel Layer 2/3 10Gb Ethernet Switch Module for IBM BladeCenter Competitive

More information

The Tolly Group. Project Report. Sponsor: 3M. 3M VOL-4000 Fast Ethernet Switch and 3M N100VF Fast Ethernet Adapter Benchmark

The Tolly Group. Project Report. Sponsor: 3M. 3M VOL-4000 Fast Ethernet Switch and 3M N100VF Fast Ethernet Adapter Benchmark Project Report Sponsor: 3M Project Manager: John Curtis Project Team: Kevin Tolly, President and CEO; John Curtis, VP of Engineering; Maik Lankau, Director of Operations; William VanBuren, Engineer; Report

More information

Introduction. Executive Summary. Test Highlights

Introduction. Executive Summary. Test Highlights Introduction Cisco commissioned EANTC to conduct an independent performance test of its new Catalyst 9000 family switches. The switches are designed to work in enterprise campus environments. Cisco offers

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend

More information

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents File Server Comparison: Microsoft Windows NT Server 4.0 and Novell NetWare 5 Contents Executive Summary Updated: October 7, 1998 (PDF version 240 KB) Executive Summary Performance Analysis Price/Performance

More information

2 Test s reveal depth of NEC's enterprise strategy for VoIP s reveal depth of NEC's enterprise strategy for V over wireless

2 Test s reveal depth of NEC's enterprise strategy for VoIP s reveal depth of NEC's enterprise strategy for V over wireless 2 3 4 5 6 7 Tests reveal depth of NEC's enterprise strategy for VoIP over wireless NEC extends enterprise-level Quality-of-Service to its own VoIP gear to ensure bandwidth precedence to latency-sensitive

More information

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application

More information

AMD: WebBench Virtualization Performance Study

AMD: WebBench Virtualization Performance Study March 2005 www.veritest.com info@veritest.com AMD: WebBench Virtualization Performance Study Test report prepared under contract from Advanced Micro Devices, Inc. Executive summary Advanced Micro Devices,

More information

Executive Summary. Introduction. Test Highlights

Executive Summary. Introduction. Test Highlights Executive Summary Today, LTE mobile operators typically deploy All-IP and flat network architectures. This elegant and flexible solution requires deployment of an adequate security infrastructure. One

More information

Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report

Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published April 2012 (V1.0) Published by Broadband-Testing A division

More information

How we tested Quagga router

How we tested Quagga router 1 of 2 23/10/2006 3:29 µµ Sponsored by: This story appeared on Network World at http://www.networkworld.com/reviews/2006/100906-quagga-router-test-how.html How we tested Quagga router Clear Choice Tests

More information

WINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010

WINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010 2010 2009 2008 2007 WINNER 2007 WINNER 2008 WINNER 2009 WINNER 2010 DATA SHEET VIRTUAL ACCELERATOR Six Reasons to say Yes to Expand 1. Comprehensive Whether the WAN is used to connect file servers, email

More information

Cisco Nexus 3548 Switch Performance Validation December 2012

Cisco Nexus 3548 Switch Performance Validation December 2012 Cisco Nexus 3548 Switch Performance Validation December 212 212 Spirent Cisco. All rights reserved. Page 1 Contents Executive Summary... 3 Test Bed... 4 How Testing Was Performed... 4 Test Results... 6

More information

Security Quick Sales Guide

Security Quick Sales Guide Security Quick Sales Guide Security Quick Finder Product/Segment Model 200 ~ 500 PC Users USG 2000 75 ~ 200 PC Users USG 1000 50 ~ 75 PC Users USG 300 Unified Security Gateway 25 ~ 50 PC Users USG 200

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Juniper SRX Services Gateway Performance Testing

Juniper SRX Services Gateway Performance Testing Juniper SRX Services Gateway Performance Testing June 2017 DR170517D Miercom.com www.miercom.com Contents Executive Summary... 3 Products Tested... 5 SRX300 Series... 5 SRX550... 5 SRX1500... 6 How We

More information

Cisco Webex Cloud Connected Audio

Cisco Webex Cloud Connected Audio White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected

More information

Cisco RV180 VPN Router

Cisco RV180 VPN Router Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow

More information

QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER

QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER QLIKVIEW SCALABILITY BENCHMARK WHITE PAPER Hardware Sizing Using Amazon EC2 A QlikView Scalability Center Technical White Paper June 2013 qlikview.com Table of Contents Executive Summary 3 A Challenge

More information

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume DrayTek Vigor 3900 Technical Specifications WAN Protocol Ethernet PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6 Multi WAN Outbound policy based load balance Allow your local network to access Internet

More information

WHITE PAPER. Monitoring Converged Networks: Link Aggregation

WHITE PAPER. Monitoring Converged Networks: Link Aggregation WHITE PAPER Monitoring Converged Networks: Link Aggregation www.ixiacom.com 915-6896-01 Rev. A, July 2014 2 Table of Contents Benefits... 4 Introduction... 4 The Net Optics Solution... 4 Easy-to-Use...

More information

Validation of Cisco SCE8000

Validation of Cisco SCE8000 Isocore Technical Report Validation of Cisco SCE8000 ISOCORE Internetworking Lab ISOCORE Technical Document Reference: ITD: 13039 Version (v1.3): 4/10/09 ISOCORE Internetworking Lab 1 12359 Sunrise Valley

More information

Network Design Considerations for Grid Computing

Network Design Considerations for Grid Computing Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom

More information

Cisco Universal Small Cell 8050 Enterprise Management System

Cisco Universal Small Cell 8050 Enterprise Management System Data Sheet Cisco Universal Small Cell 8050 Enterprise Management System The Cisco Universal Small Cell 8050 Enterprise Management System (USC 8050 EMS) is part of the Cisco Universal Small Cell Solution,

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

TOLLY. Premise: Buyers of multi-port. BayStack T Switch Fast Ethernet Switch Competitive Evaluation Backplane Capacity.

TOLLY. Premise: Buyers of multi-port. BayStack T Switch Fast Ethernet Switch Competitive Evaluation Backplane Capacity. Preise: Buyers of ulti-port switches need to know the actual capacity of the backplane (switching fabric) used to interconnect ports. To assure a non-blocking environent i.e., all ports can run at wire-speed

More information

Check Point VPN-1/FireWall-1 Performance Pack Guide

Check Point VPN-1/FireWall-1 Performance Pack Guide Check Point VPN-1/FireWall-1 Performance Pack Guide NG FP3 For additional technical information about Check Point products, consult Check Point s SecureKnowledge at http://support.checkpoint.com/kb/ September

More information

Aruba Networks engaged Miercom to provide an independent

Aruba Networks engaged Miercom to provide an independent Key findings and conclusions: Lab Testing Summary Report October 213 Report 1396 Purpose-built 82.11ac APs double the 82.11n device performance and show 51% greater 82.11ac device performance compared

More information

H3C S12516X-AF Sets New World Records for Data Center Performance. June 2017

H3C S12516X-AF Sets New World Records for Data Center Performance. June 2017 H3C S12516X-AF Sets New World Records for Data Center Performance June 2017 T A B L E O F C O N T E N T S Executive Summary... 3 About This Test.... 4 Performance Test Results.......................................................

More information

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates A test commissioned by McAfee, Inc. and performed by AV-Test GmbH Date of the report: December 7 th, 2010 (last

More information

Huawei Technologies engaged Miercom to conduct an evaluation

Huawei Technologies engaged Miercom to conduct an evaluation Time (ms) Key findings and conclusions: Lab Testing Summary Report March 2012 Report SR120130B Huawei switches, with up to 48 10GE ports, provide high performance for server access and enterprise aggregation

More information

TEST METHODOLOGY. SSL/TLS Performance. v1.0

TEST METHODOLOGY. SSL/TLS Performance. v1.0 TEST METHODOLOGY SSL/TLS Performance v1.0 Table of Contents 1 Introduction... 3 1.1 The Need for SSL/TLS Performance Testing... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 3 2 SSL/TLS

More information

Next-Generation Firewall Series Datasheet

Next-Generation Firewall Series Datasheet RUIJIE NETWORKS COMPANY LIMITED www.ruijienetworks.com Ruijie 1600 Next-Generation Firewall Series Datasheet Ruijie 1600 Firewall Series is a collection of nextgeneration firewall offering security, routing

More information

Active Directory in Networks Segmented by Firewalls

Active Directory in Networks Segmented by Firewalls Active Directory in Networks Segmented by Firewalls Microsoft Corporation Published: July 2002 Updated: October 2004 Abstract Microsoft Active Directory service domain controllers are increasingly being

More information

Intrusion Prevention System Performance Metrics

Intrusion Prevention System Performance Metrics White Paper Intrusion Prevention System Performance Metrics The Importance of Accurate Performance Metrics Network or system design success hinges on multiple factors, including the expected performance

More information

Mellanox Virtual Modular Switch

Mellanox Virtual Modular Switch WHITE PAPER July 2015 Mellanox Virtual Modular Switch Introduction...1 Considerations for Data Center Aggregation Switching...1 Virtual Modular Switch Architecture - Dual-Tier 40/56/100GbE Aggregation...2

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

NETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi

NETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi NETGEAR-FVX538 Relation Fabrizio Celli;Fabio Papacchini;Andrea Gozzi -2008- Abstract Summary... 2 Chapter 1: Introduction... 4 Chapter 2: LAN... 6 2.1 LAN Configuration... 6 2.1.1 First experiment: DoS

More information

Sonus Networks engaged Miercom to evaluate the call handling

Sonus Networks engaged Miercom to evaluate the call handling Key findings and conclusions: Lab Testing Summary Report September 2010 Report 100914B Product Category: Session Border Controller Vendor Tested: Sonus SBC 5200 successfully registered 256,000 user authenticated

More information

Scopia XT Desktop Server

Scopia XT Desktop Server Scopia XT Desktop Server Deployment Guide Version 8.2.1 For Solution 8.2 8.2.1 2000-2013 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd and are protected

More information

NSG100 Nebula Cloud Managed Security Gateway

NSG100 Nebula Cloud Managed Security Gateway Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive

More information

H Q&As. HCNA-HNTD (Huawei Network Technology and Device) Pass Huawei H Exam with 100% Guarantee

H Q&As. HCNA-HNTD (Huawei Network Technology and Device) Pass Huawei H Exam with 100% Guarantee H12-211 Q&As HCNA-HNTD (Huawei Network Technology and Device) Pass Huawei H12-211 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

Cisco XR Series Service Separation Architecture Tests

Cisco XR Series Service Separation Architecture Tests Cisco XR 12000 Series Service Separation Architecture Tests Introduction In April 2005, Cisco Systems released the XR 12000 Series routers bringing the functionality of IOS XR to the edge of next generation

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

The Truth About Router Performance

The Truth About Router Performance The Truth About Router Performance Multiservice Routers versus Integrated Service Routers (Gen. 2) Frank Ohlhorst Lab Director/Product Analyst The Truth About Router Performance 2 Router performance has

More information

Hillstone IPSec VPN Solution

Hillstone IPSec VPN Solution 1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private

More information

TOLLY. Token Ring Switching: The Next Generation Prevails. Executive Summary. September 1998

TOLLY. Token Ring Switching: The Next Generation Prevails. Executive Summary. September 1998 T H E TOLLY G R O U P September 1998 Executive Summary 2251 Landmark Place Manasquan, NJ 08736 732.528.3300 732.528.1888 fax http://www.tolly.com info@tolly.com The Tolly Group provides strategic consulting,

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Deploying Gigabit Ethernet to the Desktop: Drivers and Applications

Deploying Gigabit Ethernet to the Desktop: Drivers and Applications Deploying Gigabit Ethernet to the Desktop: Drivers and Applications The Federal Reserve estimates that the greater use of information technology accounts for 60 percent of the gains in the non-farm business

More information

Data Center 40GE Switch Study. Cisco Nexus 9508 DR L. 24 February 2014 Report DR140126L

Data Center 40GE Switch Study. Cisco Nexus 9508 DR L. 24 February 2014 Report DR140126L Data Center 40GE Switch Study DR 140126L 24 February 2014 Report DR140126L Contents 1 Executive Summary... 3 2 Introduction... 4 3 Test Bed Setup and How We Did It... 5 4 Throughput and Latency Performance

More information

Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database. An Oracle White Paper Released October 2003

Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database. An Oracle White Paper Released October 2003 Performance and Scalability Benchmark: Siebel CRM Release 7 on HP-UX Servers and Oracle9i Database An Oracle White Paper Released October 2003 Performance and Scalability Benchmark: Siebel CRM Release

More information

T E C H N I C A L S A L E S S O L U T I O N S

T E C H N I C A L S A L E S S O L U T I O N S Product Management Document InterScan Web Security Virtual Appliance Customer Sizing Guide September 2010 TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 www.trendmicro.com Toll free: +1 800.228.5651

More information

Deployment Scenarios

Deployment Scenarios This chapter describes and shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series Intergrated Services Routers (ISRs): About the, page 1 Enterprise Small Branch, page

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

Exam: : VPN/Security. Ver :

Exam: : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution

More information

StoneGate Management Center. Release Notes for Version 4.0.1

StoneGate Management Center. Release Notes for Version 4.0.1 StoneGate Management Center Release Notes for Version 4.0.1 Table of Contents What s New................................. page 3 System Requirements......................... page 6 Build Version...............................

More information

Gigabit Content Security Router CS-5800

Gigabit Content Security Router CS-5800 Gigabit Content Security Router CS-5800 Presentation Outline Product Overview Product Feature Product Application Product Comparison Appendix 2 / 34 Overview What is the Content filter? Content filtering

More information

QuickSpecs. Key Features and Benefits. HP C-Series MDS 9000 Storage Media Encryption (SME) Software. Overview. Retired

QuickSpecs. Key Features and Benefits. HP C-Series MDS 9000 Storage Media Encryption (SME) Software. Overview. Retired Overview MDS 9000 Storage Media Encryption (SME) secures data stored on tape drives and virtual tape libraries (VTLs) in a storage area network (SAN) environment using secure IEEE standard Advanced Encryption

More information

Secure ACS Database Replication Configuration Example

Secure ACS Database Replication Configuration Example Secure ACS Database Replication Configuration Example Document ID: 71320 Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information Scenario I Scenario

More information

G R O U P. Check Point Proactively Protects More Applications at the Perimeter in a Single Gateway with Greater Security ROI than Cisco or Juniper

G R O U P. Check Point Proactively Protects More Applications at the Perimeter in a Single Gateway with Greater Security ROI than Cisco or Juniper The authoritative, unbiased source for IT certification, research and testing WHITE PAPER February 2005 A white paper commissioned by Check Point Software Technologies Document #205101 Improving Security

More information

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities Product Highlights Comprehensive Management Solution Advanced features such as WAN failover, load balancing, and integrated firewall help make this a reliable, secure, and flexible way to manage your network.

More information

VPN-1 Power VSX VSX NGX R65 HFA 10. Release Notes

VPN-1 Power VSX VSX NGX R65 HFA 10. Release Notes VPN-1 Power VSX VSX NGX R65 HFA 10 Release Notes 12 November, 2009 More Information To view the latest version of this document, see the User Center (http://supportcontent.checkpoint.com/documentation_download?=10363).

More information

G R O U P. The Business Case for Multi-Vendor Networks WHITE PAPER. April A white paper commissioned by 3Com Corporation.

G R O U P. The Business Case for Multi-Vendor Networks WHITE PAPER. April A white paper commissioned by 3Com Corporation. The authoritative, unbiased source for IT certification, research and testing WHITE PAPER April 2004 A white paper commissioned by 3Com Corporation Document #204111 Enterprise WAN Strategies: The Business

More information

Specifying Storage Servers for IP security applications

Specifying Storage Servers for IP security applications Specifying Storage Servers for IP security applications The migration of security systems from analogue to digital IP based solutions has created a large demand for storage servers high performance PCs

More information

The Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing

The Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing . White Paper The Cisco WebEx Node for the Cisco ASR 1000 Series Delivers the Best Aspects of On-Premises and On-Demand Web Conferencing Executive Summary The Cisco WebEx Node for the Cisco ASR 1000 Series,

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

Deployment Overview. Logging via SiteManager EasyTunnel Client

Deployment Overview. Logging via SiteManager EasyTunnel Client Logging via SiteManager EasyTunnel Client Deployment Overview This guide describes the deployment process when using the SiteManager EasyTunnel VPN Client function for fetching log data from devices to

More information