我们如何测试帕洛阿尔托的PA-4020防火墙
我们花了两个星期把帕洛阿尔托网络PA-4020通过一系列旨在衡量其性能的测试。在我们的测试中,PA-4020连接到互联网,并能够下载病毒,威胁和URL过滤更新。我们还更新的PA-4020的软件,一旦在测试过程中,从2.0.1到2.0.3。我们在更新过程中确实遇到问题,并必须有帕洛阿尔托的技术支持团队申请修复我们的配置,使其与新的软件版本不兼容。
我们花了两个星期把帕洛阿尔托网络PA-4020通过一系列旨在衡量其性能的测试。在我们的测试中,PA-4020连接到互联网,并能够下载病毒,威胁和URL过滤更新。我们还更新的PA-4020的软件,一旦在测试过程中,从2.0.1到2.0.3。我们在更新过程中确实遇到问题,并必须有帕洛阿尔托的技术支持团队申请修复我们的配置,使其与新的软件版本不兼容。
We started by installing the PA-4020 as a tap on an existing connection used to serve about 1,000 DSL users. During the initial installation, we looked at the management interface for the PA-4020 and evaluated the policy definition and visibility tools available in the PA-4020. Because the PA-4020 supports layer 2, layer 3 and tap mode, we were able to evaluate the capabilities of the system without interfering with existing traffic.
一旦我们相信,我们理解的操作,我们安装在线的PA-4020作为层2防火墙具有相同的DSL连接,施加威胁保护和一些应用阻塞。我们还等着电话铃响,这可能表明PA-4020被不正确地阻碍交通。我们没有赶上在这一点上几句牢骚和误报。
与此同时,我们把线的PA-4020与我们的生活反垃圾邮件/防病毒网关,看看它是如何赶上病毒“野生”。我们让它运行了一个星期,然后比较了PA-4020的日志文件,对电子邮件网关的防病毒扫描程序的日志,看看哪些病毒的PA-4020已经抓住,它已经错过了。
Next, we moved the PA-4020 to a more controlled environment, our ownwirelessnetwork, and began to explore each of its capabilities in depth, including application identification, specific virus testing, SSL man-in-the-middle decryption, network address translation, firewall policy definition, URL filtering and intrusion-prevention/detection system (IDS/IPS) signatures. We ran numerous small tests to determine how well the PA-4020 performed each of these tasks. This part of the test also contributed to our evaluation of the policy definition tools and visibility tools in the PA-4020.
对于反病毒测试中,我们花了15最近(2008年6月)的病毒和使用六种载体把它们打包:电子邮件通过SMTP标准和非标准端口,FTP,HTTP上的端口80,HTTPS端口443,和HTTP再上一个非标准端口。我们使用了客户端传输整个PA-4020的病毒,并期待看到哪些病毒进行识别并拦截。正如去年我们的UTM测试中,我们并没有使非标准HTTP或SMTP端口的任何特定的标识。在我们的UTM测试中,我们并没有测试安全-HTTP拦截,但我们也与PA-4020。
要获得的IPS功能更严格的看法,我们把从穆动力,攻击生成和报告工具慕-4000安全分析器设备。对于沐-4000测试中,我们专注于公布漏洞的攻击。我们分手了我们的测试分为两个方向:客户机到服务器,并且服务器到客户端。由于PA-4020似乎是最适合于保护客户,我们想分离出的客户端保护(其中有一个更高的分数),从服务器的保护。这也从去年的平行我们的UTM试验。在客户端保护的情况下,我们所盼望的PA-4020,以保护谁是浏览互联网或下载文件的用户,因此很容易受到某些类型的攻击集中在客户端应用程序,如Web浏览器和PDF阅读器。在服务器的情况下,我们的测试主要集中在基于Web,电子邮件和其他类型的服务器的攻击。
像大多数入侵防御,pa - 4020多级protections, dropping attacks into buckets labeled "Critical," "High," "Medium," "Low" and "Informational." The PA-4020 also separates out attack protections specifically into client and server attacks. For the server-to-client test, we set the PA-4020 to block Critical, High and Medium attacks on clients; for the client-to-server test, Critical, High and Medium attacks on servers. Then, we tested each profile using the Mu-4000 to see the percentage of attacks blocked by the IPS. The client profile had approximately 550 attacks, while the server profile had approximately 630. We believe that Palo Alto has had access to the Mu-4000 analyzer as well, so it is possible that the very high results achieved in this test (higher than any in ourUTM防火墙测试) are a result of adjusting the signature database specifically to match the Mu-4000 attacks.
<返回测试:帕洛阿尔托提供了极大的可见性网络威胁>
了解更多关于这个话题
©2008足球竞彩网下载