⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2647.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 3 页
字号:
Network Working Group                                       D. NewmanRequest for Comments: 2647                        Data CommunicationsCategory: Informational                                   August 1999           Benchmarking Terminology for Firewall PerformanceStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Table of Contents   1. Introduction...................................................2   2. Existing definitions...........................................2   3. Term definitions...............................................3   3.1 Allowed traffic...............................................3   3.2 Application proxy.............................................3   3.3 Authentication................................................4   3.4 Bit forwarding rate...........................................5   3.5 Circuit proxy.................................................6   3.6 Concurrent connections........................................6   3.7 Connection....................................................7   3.8 Connection establishment......................................9   3.9 Connection establishment time.................................9   3.10 Connection maintenance......................................10   3.11 Conection overhead..........................................11   3.12 Connection teardown.........................................11   3.13 Connection teardown time....................................12   3.14 Data source.................................................12   3.15 Demilitarized zone..........................................13   3.16 Firewall....................................................13   3.17 Goodput.....................................................14   3.18 Homed.......................................................15   3.19 Illegal traffic.............................................15   3.20 Logging.....................................................16   3.21 Network address translation.................................16   3.22 Packet filtering............................................17   3.23 Policy......................................................17   3.24 Protected network...........................................18   3.25 Proxy.......................................................19   3.26 Rejected traffic............................................19Newman                       Informational                      [Page 1]RFC 2647            Firewall Performance Terminology         August 1999   3.27 Rule set....................................................20   3.28 Security association........................................20   3.29 Stateful packet filtering...................................21   3.30 Tri-homed...................................................22   3.31 Unit of transfer............................................22   3.32 Unprotected network.........................................23   3.33 User........................................................23   4. Security considerations.......................................24   5. References....................................................25   6. Acknowledgments...............................................25   7. Contact Information...........................................25   8. Full Copyright Statement......................................261. Introduction   This document defines terms used in measuring the performance of   firewalls. It extends the terminology already used for benchmarking   routers and switches with definitions specific to firewalls.   Forwarding rate and connection-oriented measurements are the primary   metrics used in this document.   Why do we need firewall performance measurements? First, despite the   rapid rise in firewall deployment, there is no standard method of   performance measurement. Second, implementations vary widely, making   it difficult to do direct performance comparisons. Finally, more and   more organizations are deploying firewalls on internal networks   operating at relatively high speeds, while most firewall   implementations remain optimized for use over relatively low-speed   wide-area connections. As a result, users are often unsure whether   the products they buy will stand up to relatively heavy loads.2. Existing definitions   This document uses the conceptual framework established in RFCs 1242   and 2544 (for routers) and RFC 2285 (for switches). The router and   switch documents contain discussions of several terms relevant to   benchmarking the performance of firewalls. Readers should consult the   router and switch documents before making use of this document.   This document uses the definition format described in RFC 1242,   Section 2. The sections in each definition are: definition,   discussion, measurement units (optional), issues (optional), and   cross-references.Newman                       Informational                      [Page 2]RFC 2647            Firewall Performance Terminology         August 19993. Term definitions3.1 Allowed traffic   Definition:     Packets forwarded as a result of the rule set of the device under     test/system under test (DUT/SUT).   Discussion:     Firewalls typically are configured to forward only those packets     explicitly permitted in the rule set. Forwarded packets must be     included in calculating the bit forwarding rate or maximum bit     forwarding rate of the DUT/SUT. All other packets must not be     included in bit forwarding rate calculations.     This document assumes 1:1 correspondence of allowed traffic offered     to the DUT/SUT and forwarded by the DUT/SUT. There are cases where     the DUT/SUT may forward more traffic than it is offered; for     example, the DUT/SUT may act as a mail exploder or a multicast     server. Any attempt to benchmark forwarding rates of such traffic     must include a description of how much traffic the tester expects     to be forwarded.   Unit of measurement:     not applicable   Issues:   See also:     policy     rule set3.2 Application proxy   Definition:     A proxy service that is set up and torn down in response to a     client request, rather than existing on a static basis.   Discussion:     Circuit proxies always forward packets containing a given port     number if that port number is permitted by the rule set.     Application proxies, in contrast, forward packets only once a     connection has been established using some known protocol. When the     connection closes, a firewall using applicaton proxies rejects     individual packets, even if they contain port numbers allowed by a     rule set.Newman                       Informational                      [Page 3]RFC 2647            Firewall Performance Terminology         August 1999   Unit of measurement:     not applicable   Issues:     circuit proxy     rule sets   See also:     allowed traffic     circuit proxy     proxy     rejected traffic     rule set3.3 Authentication   Definition:     The process of verifying that a user requesting a network resource     is who he, she, or it claims to be, and vice versa.   Discussion:     Trust is a critical concept in network security. Any network     resource (such as a file server or printer) typically requires     authentication before granting access.     Authentication takes many forms, including but not limited to IP     addresses; TCP or UDP port numbers; passwords; external token     authentication cards; and biometric identification such as     signature, speech, or retina recognition systems.     The entity being authenticated might be the client machine (for     example, by proving that a given IP source address really is that     address, and not a rogue machine spoofing that address) or a user     (by proving that the user really is who he, she, or it claims to     be).  Servers might also authenticate themselves to clients.     Testers should be aware that in an increasingly mobile society,     authentication based on machine-specific criteria such as an IP     address or port number is not equivalent to verifying that a given     individual is making an access request. At this writing systems     that verify the identity of users are typically external to the     firewall, and may introduce additional latency to the overall SUT.   Unit of measurement:     not applicable   Issues:Newman                       Informational                      [Page 4]RFC 2647            Firewall Performance Terminology         August 1999   See also:     user3.4 Bit forwarding rate   Definition:     The number of bits per second of allowed traffic a DUT/SUT can be     observed to transmit to the correct destination interface(s) in     response to a specified offered load.   Discussion:     This definition differs substantially from section 3.17 of RFC 1242     and section 3.6.1 of RFC 2285.     Unlike both RFCs 1242 and 2285, this definition introduces the     notion of different classes of traffic: allowed, illegal, and     rejected (see definitions for each term). For benchmarking     purposes, it is assumed that bit forwarding rate measurements     include only allowed traffic.     Unlike RFC 1242, there is no reference to lost or retransmitted     data.  Forwarding rate is assumed to be a goodput measurement, in     that only data successfully forwarded to the destination interface     is measured.  Bit forwarding rate must be measured in relation to     the offered load.  Bit forwarding rate may be measured with     differed load levels, traffic orientation, and traffic     distribution.     Unlike RFC 2285, this measurement counts bits per second rather     than frames per second. Testers interested in frame (or frame-like)     measurements should use units of transfer.   Unit of measurement:     bits per second   Issues:     Allowed traffic vs. rejected traffic   See also:     allowed traffic     goodput     illegal traffic     rejected traffic     unit of transferNewman                       Informational                      [Page 5]RFC 2647            Firewall Performance Terminology         August 19993.5 Circuit proxy   Definition:     A proxy service that statically defines which traffic will be     forwarded.   Discussion:     The key difference between application and circuit proxies is that     the latter are static and thus will always set up a connection if     the DUT/SUT's rule set allows it. For example, if a firewall's rule     set permits ftp connections, a circuit proxy will always forward     traffic on TCP port 20 (ftp-data) even if no control connection was     first established on TCP port 21 (ftp-control).   Unit of measurement:     not applicable   Issues:     application proxy     rule sets   See also:     allowed traffic     application proxy     proxy     rejected traffic     rule set3.6 Concurrent connections   Definition:     The aggregate number of simultaneous connections between hosts     across the DUT/SUT, or between hosts and the DUT/SUT.   Discussion:     The number of concurrent connections a firewall can support is just     as important a metric for some users as maximum bit forwarding     rate.     While "connection" describes only a state and not necessarily the     transfer of data, concurrency assumes that all existing connections     are in fact capable of transferring data. If a data cannot be sent     over a connection, that connection should not be counted toward the     number of concurrent connections.     Further, this definition assumes that the ability (or lack thereof)     to transfer data on a given connection is solely the responsibility     of the DUT/SUT. For example, a TCP connection that a DUT/SUT hasNewman                       Informational                      [Page 6]RFC 2647            Firewall Performance Terminology         August 1999     left in a FIN_WAIT_2 state clearly should not be counted. But     another connection that has temporarily stopped transferring data     because some external device has restricted the flow of data is not     necessarily defunct. The tester should take measures to isolate     changes in connection state to those effected by the DUT/SUT.   Unit of measurement:     Concurrent connections     Maximum number of concurrent connections   Issues:   See also:     connections     connection establishment time     connection overhead3.7 Connection   Definition:     A state in which two hosts, or a host and the DUT/SUT, agree to     exchange data using a known protocol.   Discussion:     A connection is an abstraction describing an agreement between two     nodes: One agrees to send data and the other agrees to receive it.     Connections might use TCP, but they don't have to. Other protocols     such as ATM also might be used, either instead of or in addition to     TCP connections.     What constitutes a connection depends on the application. For a     native ATM application, connections and virtual circuits may be     synonymous. For TCP/IP applications on ATM networks (where multiple     TCP connections may ride over a single ATM virtual circuit), the     number of TCP connections may be the most important consideration.     Additionally, in some cases firewalls may handle a mixture of     native TCP and native ATM connections. In this situation, the     wrappers around user data will differ. The most meaningful metric     describes what an end-user will see.     Data connections describe state, not data transfer. The existence     of a connection does not imply that data travels on that connection     at any given time, although if data cannot be forwarded on a     previously established connection that connection should not be     considered in any aggregrate connection count (see concurrent     connections).Newman                       Informational                      [Page 7]RFC 2647            Firewall Performance Terminology         August 1999     A firewall's architecture dictates where a connection terminates.     In the case of application or circuit proxy firewalls, a connection     terminates at the DUT/SUT. But firewalls using packet filtering or     stateful packet filtering designs act only as passthrough devices,     in that they reside between two connection endpoints. Regardless of     firewall architecture, the number of data connections is still     relevant, since all firewalls perform some form of connection     maintenance; at the  very least, all check connection requests     against their rule sets.     Further, note that connection is not an atomic unit of measurement     in that it does not describe the various steps involved in     connection setup, maintenance, and teardown. Testers may wish to     take separate measurements of each of these components.     When benchmarking firewall performance, it's important to identify     the connection establishment and teardown procedures, as these must     not be included when measuring steady-state forwarding rates.     Further, forwarding rates must be measured only after any security     associations have been established.     Though it seems paradoxical, connectionless protocols such as UDP     may also involve connections, at least for the purposes of firewall     performance measurement. For example, one host may send UDP packets     to another across a firewall. If the destination host is listening     on the correct UDP port, it receives the UDP packets. For the     purposes of firewall performance measurement, this is considered a     connection.   Unit of measurement:     concurrent connections     connection     connection establishment time     maximum number of concurrent connections     connection teardown time   Issues:     application proxy vs. stateful packet filtering     TCP/IP vs. ATM     connection-oriented vs. connectionless   See also:     data source     concurrent connections     connection establishmentNewman                       Informational                      [Page 8]RFC 2647            Firewall Performance Terminology         August 1999     connection establishment time     connection teardown     connection teardown time3.8 Connection establishment   Definition:     The data exchanged between hosts, or between a host and the     DUT/SUT, to initiate a connection.   Discussion:     Connection-oriented protocols like TCP have a proscribed     handshaking procedure when launching a connection. When     benchmarking firewall performance, it is import to identify this     handshaking procedure so that it is not included in measurements of     bit forwarding rate or UOTs per second.     Testers may also be interested in measurements of connection     establishment time through or with a given DUT/SUT.   Unit of measurement:     not applicable   See also:     connection     connection establishement time     connection maintenance     connection teardown   Issues:     not applicable3.9 Connection establishment time

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -