More Related Content
Similar to IPS Test Methodology (20)
IPS Test Methodology
- 1. Rethink Intrusion Prevention System Testing
Rethink Intrusion Prevention System Testing
A Methodology to measure the performance, security, and stability of intrusion prevention systems
(IPS) under real-world conditions
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 1
All other trademarks are the property of their respective owners.
- 2. Rethink Intrusion Prevention System Testing
Table of Contents
Introduction .................................................................................................................................................................................................................... 3
Baseline Application Performance: Maximum Connections ......................................................................................................................... 5
Baseline Application Performance: Throughput ............................................................................................................................................... 20
Baseline Attack Mitigation: SYN Flood .................................................................................................................................................................. 35
Baseline Attack Mitigation: Malicious Traffic ....................................................................................................................................................... 45
Application Traffic with SYN Flood ......................................................................................................................................................................... 55
Application Traffic with Malicious Traffic .............................................................................................................................................................. 65
Application Traffic with Malicious Traffic and SYN Flood................................................................................................................................ 76
Jumbo Frames ................................................................................................................................................................................................................ 88
IP, UDP and TCP Fuzzing ............................................................................................................................................................................................. 98
Protocol Fuzzing ............................................................................................................................................................................................................ 109
Evasion Techniques ...................................................................................................................................................................................................... 121
Negative Testing ............................................................................................................................................................................................................ 133
About BreakingPoint ................................................................................................................................................................................................... 147
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 2
All other trademarks are the property of their respective owners.
- 3. Rethink Intrusion Prevention System Testing
Introduction
With more and more corporate data being placed on corporate networks, it is vitally important to protect that data from malicious activities.
An Intrusion Prevention System (IPS) is designed to detect malicious activities and drop or sanitize the packets while allowing legitimate
traffic to access the corporate network. Thoroughly testing IPS devices is essential to ensuring that they work properly. If the IPS device is
not working properly, malicious traffic containing viruses, worms and backdoors can easily gain access to the corporate network and cause
a great deal of problems, potentially bringing down the network.
Performing a series of measurements using the BreakingPoint Storm CTM on the IPS will help determine the actual performance, security
and stability of the IPS under real world conditions. For instance, the IPS device might be able to detect and mitigate malicious activity
when network traffic is light. However, when network traffic becomes heavy, the IPS device might detect significantly less malicious activity.
Using the BreakingPoint Storm CTM you can expose previously impossible to detect vulnerabilities in your IPS before they are exploited to
compromise your customer data, corporate assets, brand reputation and even nation security.
The test environment should emulate the actual deployment environment as closely as possible. Directly connected devices such as routers,
switches and firewalls will have an effect on packet loss, latency and data integrity. The number of advertised host IP and MAC addresses,
VLAN Tagging, and NAT will also affect the performance of an IPS.
If it is not feasible to fully recreate the deployment environment, the BreakingPoint Storm CTM should be connected directly to the IPS.
All IPS devices and builds being evaluated must use the same test environment to ensure consistent results.
Baseline Application Performance: Maximum Connections
Determine the number of connections per second that the IPS is able to handle. This will validate the performance of the IPS when
sending only good traffic with an “Allow All” policy. The TCP setup time will be analyzed to determine how a greater number of TCP
connections per second affect the time it takes to establish the TCP connection.
Baseline Application Performance: Throughput
Determine the throughput that the IPS is able to handle. This will validate the throughput performance the IPS is able to handle when
sending only good traffic with an “Allow All” policy. The overall throughput that the IPS is able to support will be determined.
Baseline Attack Mitigation Traffic: SYN Flood
Determine a baseline measurement for how the IPS performs when handling a SYN flood. Once a baseline has been established, it will
be compared with the results from the tests that blend both application and malicious traffic. The number of attempted sessions for the
SYN flood will be determined as well as the number of attempted sessions for the SYN flood that were blocked by the IPS.
Baseline Attack Mitigation Traffic: Malicious Traffic
Determine the ability of the IPS to remain stable while vulnerabilities, worms and backdoors are transmitted through it. To
perform this test, the BreakingPoint Storm CTM will be configured to use an Attack Series that includes high-risk vulnerabilities, worms and
backdoors. IPS devices have functionality that may block some of the attacks. The number of attacks blocked by the IPS will be determined
as well as the number of attacks that were able to pass through the IPS.
Application Traffic with SYN Flood
Determine a baseline measurement for how the IPS performs when handling a malicious SYN flood. Once a baseline has been
established, it will be compared with the results from the tests that blend both application and malicious traffic. The number of attempted
sessions for the SYN flood will be determined as well as the number of attempted sessions for the SYN flood that were blocked by the IPS.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 3
All other trademarks are the property of their respective owners.
- 4. Rethink Intrusion Prevention System Testing
Application Traffic with Malicious Traffic
Determine the ability of the IPS to remain stable while vulnerabilities, worms and backdoors are transmitted through it. To
perform this test, the BreakingPoint Storm CTM will be configured to use an Attack Series that includes high-risk vulnerabilities, worms and
backdoors.
Application Traffic with Malicious Traffic and SYN Flood
This test determines the ability of the IPS to handle application traffic, a SYN flood and malicious traffic. The results will be compared
to both the Throughput Test and the SYN Flood Test. Again, the IPS’s ability to detect and mitigate a SYN flood will be determined. Also, the
effect of the malicious traffic on the application traffic’s throughput, latency time-to-open, and time-to-close will be analyzed. Finally, the
IPS’s ability to detect and mitigate the same number of attacks as in the previous Security tests will be tested.
Jumbo Frames
This test uses the Throughput test, except the Maximum Segment Size (MMS) parameter will be increased. The maximum
transmission unit (MTU) size of the port will be verified and increased if needed. This test will determine if the IPS was able to perform
better, worse or the same when handling jumbo frames. These results will be compared to those from the Throughput Test.
IP, UDP and TCP Fuzzing
The BreakingPoint Storm CTM will be configured to use the Stack Scrambler component. This test component has the ability to
send malformed IP, UDP, TCP and Ethernet packets to the IPS. The fuzzing technique will modify parts of the packet, such as checksums
and protocol options, to generate the corrupted data. The IPS’s ability to handle malformed packets will be determined. Take notice if
the IPS crashes during the test, as this is the most important sign that the IPS is not able to appropriately handle the malformed packets.
Also, analyze the effects the malformed packets had on the application traffic and determine if the IPS’s attack detection and mitigation
capabilities were affected.
Protocol Fuzzing
This test will utilize the Security test component. This time the Security test component will fuzz application layer frames. The IPS’s ability
to handle malformed application layer frames will be determined.
Evasion Techniques
The Application Traffic with Malicious Traffic test will be used as a starting point for this test. The Security test component will have
changes made to its configuration. These changes will configure different evasion techniques that might create false negatives.
Negative Testing
The Maximum Connections test will be used as a starting point. Changes will then be made to a Super Flow. This Super Flow will then be
sent through the IPS. It will be determined how well the IPS unit was able to handle the negative testing.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 4
All other trademarks are the property of their respective owners.
- 5. Rethink Intrusion Prevention System Testing
Baseline Application Performance: Maximum Connections
RFC:
• RFC 793 – Transmission Control Protocol
Overview:
The specifications from the IPS data sheet will be used to determine if the IPS meets or exceeds the stated capacity. To determine the
capabilities, a Session Sender test component will be used to push the IPS beyond its stated supported limits.
Objective:
To evaluate the IPS’s ability to create and maintain sessions.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 5
All other trademarks are the property of their respective owners.
- 6. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, type your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 6
All other trademarks are the property of their respective owners.
- 7. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. Select Control Center Network Neighborhood.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 7
All other trademarks are the property of their respective owners.
- 8. Rethink Intrusion Prevention System Testing
5. Under the Network Neighborhoods heading, click the Create a new network neighborhood button.
6. In the Give the new network neighborhood a name box enter IPS Tests as the name and click OK.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 8
All other trademarks are the property of their respective owners.
- 9. Rethink Intrusion Prevention System Testing
7. Notice four Interface tabs are available for configuration. Only two are required for the tests. The first interface tab
should be selected; click the X to delete this interface. When prompted about removing the interface click Yes. The
remaining interfaces will be renamed. Repeat this process unitl only two interfaces are left.
8. With Interface 1 selected, configure the Network IP Address, Netmask, Gateway IP Address, Router IP Address, the
Minimum IP Address, and the Maximum IP Address. Click Apply Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 9
All other trademarks are the property of their respective owners.
- 10. Rethink Intrusion Prevention System Testing
9. Select the Interface 2 tab. Configure the Network IP Address, Netmask and the Gateway IP Address. Using the Type
drop-down menu select Host. Finally the Minimum IP Address and the Maximum IP Address can be configured. Click
Apply Changes, then, click Save Network.
10. Now that the Network Neighborhood has been created, the test can be configured. Select Test New Test.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 10
All other trademarks are the property of their respective owners.
- 11. Rethink Intrusion Prevention System Testing
11. Under the Test Quick Steps, click Select the DUT/Network.
12. In the Choose a device under test and network neighborhood window under the Device Under Test(s) section, verify
BreakingPoint Default is selected. Under Network Neighborhood(s), verify that the newly created one is selected. Click
Accept.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 11
All other trademarks are the property of their respective owners.
- 12. Rethink Intrusion Prevention System Testing
13. When prompted about switching Network Neighborhoods because the current setup contains more interfaces, click
Yes.
14. Under Test Quick Steps, click Add a Test Component.
15. In the Select a component type window, click Session Sender (L4).
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 12
All other trademarks are the property of their respective owners.
- 13. Rethink Intrusion Prevention System Testing
16. Under the Information tab enter a name of Maximum Connections and click Apply Changes.
17. Select the Interfaces tab. Verify that only Interface 1 Client and Interface 2 Server are enabled.
18. Select the Parameters tab. Several parameters will be change in this section. The first parameter that needs to be
changed is the TCP Session Duration (segments) to a value of 4. Click Apply Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 13
All other trademarks are the property of their respective owners.
- 14. Rethink Intrusion Prevention System Testing
19. Under the Data Rate section, change Minimum data rate to 90% of the total bandwidth possible, and click Apply
Changes.
20. Next under the Session Ramp Distribution tab, several parameters will be changed. First, using the Ramp Up Behavior
drop-down menu, select Full Open + Data + Close. Next, change Ramp Up Seconds to 30 and change Steady-State
Seconds to 120. Finally, change Ramp Down Duration to 30 and click Apply Changes. Scrolling may be required in
order to change some of the parameters.
21. The last parameters that need to be changed are in the Session Configuration section. The Maximum Simultaneous
Sessions should be changed to 33% of the IPS’s stated maximum. The Maximum Sessions Per Second should be
changed to 200% of the IPS’s ability. Click Apply Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 14
All other trademarks are the property of their respective owners.
- 15. Rethink Intrusion Prevention System Testing
22. If desired, enter a description for the test under the Test Information section.
23. Verify that the Test Status has a green checkmark. If it does not have a green checkmark, click Test Status and make
the required changes.
24. Before running the test, the test component needs to be saved as a preset. This will allow for quicker and easier
configuration later. Right-click on the test component and select Save Component As Preset.
25. When prompted for a name to save the preset as, enter IPS Maximum Connections and click Save.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 15
All other trademarks are the property of their respective owners.
- 16. Rethink Intrusion Prevention System Testing
26. Under Test Quick Steps, click Save and Run.
27. When prompted for a name to save the test as, enter IPS Maximum Connections and click Save.
The Summary tab initially will be displayed. A great amount of information is seen on this screen from the TCP Connection Rate to the
Cumulative TCP Connections to the Bandwidth being used.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 16
All other trademarks are the property of their respective owners.
- 17. Rethink Intrusion Prevention System Testing
28. Select the TCP tab. This will display the TCP Connections per Second and allow the ability to determine the current
number of Attempted and Successful TCP Connection Rate. Using this view determine the maximum number of new
sessions per second open during the ramp-up phase, the maximum maintained during the steady-state phase and the
maximum opened during the steady-state phase.
29. Once the test completes, a window will appear, stating the test passed. Click Close to continue.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 17
All other trademarks are the property of their respective owners.
- 18. Rethink Intrusion Prevention System Testing
30. Next, select the View the report button.
31. Expand the Test Results for Maximum Connections folder, and select TCP Setup Time. The shorter the TCP setup
time, the better, as the DUT is able to quickly react and handle the incoming connection requests.
32. Next, select TCP Response Time. The shorter the response time, the better, as the DUT is able to quickly respond to
requests and continue normal operation.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 18
All other trademarks are the property of their respective owners.
- 19. Rethink Intrusion Prevention System Testing
33. Select TCP Close Time. The shorter the TCP Close Time the better, as the DUT is able to close out the current
connection quickly and free resources to be able to open a new connection.
34. Select Frame Latency. The shorter the frame latency, the better, as this means the frames are arriving quickly without
much delay in the network.
Other tests can also be performed. The following are some examples that can be run:
• Vary the TCP Segment size.
• Change the Distribution type to random.
• Change the TCP Session Duration (segments).
• Increase the test time for a longer test.
• If Hot Standby is going to be used, perform a test that shows how traffic is affected.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 19
All other trademarks are the property of their respective owners.
- 20. Rethink Intrusion Prevention System Testing
Baseline Application Performance: Throughput
RFC:
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
Overview:
A similar test setup as the previous one will be used. An Application Simulator test component will be used to generate, at maximum, 33%
of the effective session capacity of the IPS as determined in the previous test, while trying to maximize throughput.
Objective:
To evaluate the IPS’s ability to forward a wide variety of application traffic and the overall rate that it is able to do so.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 20
All other trademarks are the property of their respective owners.
- 21. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 21
All other trademarks are the property of their respective owners.
- 22. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. Select Test New Test.
5. Under Test Quick Steps, click Select the DUT/Network.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 22
All other trademarks are the property of their respective owners.
- 23. Rethink Intrusion Prevention System Testing
6. In the Choose a device under test and network neighborhood window, make sure BreakingPoint Default is select under
Device Under Test(s) and IPS Tests is selected under Network Neighborhood(s). Once completed click Accept.
7. When prompted that the current test setup contains more interfaces, click Yes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 23
All other trademarks are the property of their respective owners.
- 24. Rethink Intrusion Prevention System Testing
8. Under Test Quick Steps, click Add a Test Component.
9. In the Select a component type, click Application Simulator (L7).
10. Under the Information tab enter a name of Maximum Throughput and click Apply Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 24
All other trademarks are the property of their respective owners.
- 25. Rethink Intrusion Prevention System Testing
11. Select the Interfaces tab. Verify that Interface 1 Client is enabled and Interface 2 Server is enabled.
12. Select the Presets tab and select Enterprise Apps. Once completed, click Apply Changes.
13. Select the Parameters tab. Several parameters will need to be changed. The first parameter that needs to be changed
is in the Data Rate section. Change the Minimum data rate to 90% of the total available bandwidth, and click Apply
Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 25
All other trademarks are the property of their respective owners.
- 26. Rethink Intrusion Prevention System Testing
14. Next under the Session Ramp Distribution section, several parameters will be changed. First, using the Ramp Up
Behavior drop-down menu, select Full Open + Data + Close. Next, change Ramp Up Seconds to 30 and change Steady-
state Seconds to 120. Finally, change Ramp Down Duration to 30 and click Apply Changes. Scrolling may be required
to change some of the parameters.
15. The next parameters that need to be changed are in the Session Configuration section. Change Maximum Simultaneous
Sessions to 33% of the session capacity of the DUT. Also, change the Maximum Sessions Per Second to 25% of the
ability of the DUT.
16. If desired, enter a description for the test under the Test Information section.
17. Verify that the Test Status has a green checkmark. If it does not have a green checkmark, click Test Status and make
the required changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 26
All other trademarks are the property of their respective owners.
- 27. Rethink Intrusion Prevention System Testing
18. Before running the test, the test component needs to be saved as a preset. This will allow for quicker and easier
configuration later. Right-click on the test component, and select Save Component As Preset.
19. Enter IPS Maximum Throughput as the name, and click Save.
20. Under Test Quick Steps, click Save and Run.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 27
All other trademarks are the property of their respective owners.
- 28. Rethink Intrusion Prevention System Testing
21. When prompted to save the test, enter a name of IPS Maximum Throughput and click Save.
22. The Summary tab will initially be displayed. A great amount of information is seen on this screen: TCP Connection
Rate, Cumulative TCP Connections and Interface Bandwidth.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 28
All other trademarks are the property of their respective owners.
- 29. Rethink Intrusion Prevention System Testing
23. Select the TCP tab. This will display the TCP Connections per Second and allow the ability to determine the Attempted
TCP Connection Rate and Successful TCP Connection Rate.
.
24. Select the Application tab. Detailed results about each protocol may be viewed. Use the drop-down menus to select
different applications.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 29
All other trademarks are the property of their respective owners.
- 30. Rethink Intrusion Prevention System Testing
25. Once the test completes, a window will appear, stating the test passed. Click Close.
26. Next, select the View the report button.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 30
All other trademarks are the property of their respective owners.
- 31. Rethink Intrusion Prevention System Testing
27. Expand the Test Results for Maximum Throughput folder, and select Setup Time. The shorter the TCP setup time, the
better, as the DUT is able to quickly react and handle the incoming connection requests.
28. Next, select Response Time. The shorter the response time, the better, as the DUT is able to quickly respond to
requests and continue normal operation.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 31
All other trademarks are the property of their respective owners.
- 32. Rethink Intrusion Prevention System Testing
29. Select TCP Close Time. The shorter the TCP close time, the better, as the DUT is able to close out the current
connection quickly and free resources to be able to open a new connection.
30. Select Frame Latency. The shorter the frame latency, the better, as this means the frames are arriving quickly without
much delay in the network.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 32
All other trademarks are the property of their respective owners.
- 33. Rethink Intrusion Prevention System Testing
31. Select Transmitted Frame Size. This provides a breakdown of frame sizes that were transmitted.
32. Next, expand the Detail folder and also expand the App Concurrent Flows: by protocol folder. Select the first item, App
Concurrent Flows: protocol aol, and determine how the different protocols were handles. View the entire list.
33. Repeat the previous step with App Transaction Rates: by protocol, App Response Time: by protocol, and App Failures:
by protocol. Determine how all the protocols were handled by the DUT.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 33
All other trademarks are the property of their respective owners.
- 34. Rethink Intrusion Prevention System Testing
34. Select Frame Data Rate and determine the maximum throughput the DUT was able to handle.
Other variations of this test can be run. The following are a few examples:
• Increase both Maximum Simultaneous Sessions and Maximum Sessions per Second by 10%, until 80% has been reached.
• Use different presets, such as the Service Provider App or a custom application profile.
• Increase the duration of the test time.
• If Hot Standby is going to be used, perform a test that shows how traffic is affected.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 34
All other trademarks are the property of their respective owners.
- 35. Rethink Intrusion Prevention System Testing
Baseline Attack Mitigation: SYN Flood
RFC:
• RFC 793 – Transmission Control Protocol
• RFC 4987 – TCP SYN Flooding Attacks and Common Mitigations
Overview:
A SYN Flood is when a client starts a TCP connection but never sends an ACK and keeps trying to initiate TCP connections. This is harmful
to an IPS, as it has to provide resources to the TCP connection requests. The IPS likely has the ability to detect and prevent the SYN Flood. A
Session Sender test component will be used to create a SYN Flood to attack the IPS.
Objective:
To evaluate the IPS’s ability to detect and mitigate a SYN flood.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 35
All other trademarks are the property of their respective owners.
- 36. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 36
All other trademarks are the property of their respective owners.
- 37. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. Select Test New Test.
5. Under Test Quick Steps, click Select the DUT/Network.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 37
All other trademarks are the property of their respective owners.
- 38. Rethink Intrusion Prevention System Testing
6. In the Choose a device under test and network neighborhood window, make sure BreakingPoint Default is selected
under Device Under Test(s) and IPS Tests is selected under Network Neighborhood(s). Once completed, click Accept.
7. When prompted that the current test setup contains more interfaces click Yes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 38
All other trademarks are the property of their respective owners.
- 39. Rethink Intrusion Prevention System Testing
8. Under Test Quick Steps, click Add a Test Component.
9. In the Select a component type window click Session Sender (L4).
10. The Information tab should already be selected. Change the name of the test component to SYN Flood and click Apply
Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 39
All other trademarks are the property of their respective owners.
- 40. Rethink Intrusion Prevention System Testing
11. Select the Parameters tab. Several parameters will be changed in this section. The first one that needs to be changed
is TCP Sessions Duration (segments) to 0. Click Apply Changes once completed.
12. In the Data Rate section, change the Minimum data rate to 10% of overall bandwidth, and click Apply Changes.
13. Next, in the Session Ramp Distribution section, use the Ramp Up Behavior drop-down menu and select SYN Only.
Change Ramp Up Seconds to 120, Steady-State Seconds to 0 and Ramp Down Seconds to 0. Scrolling down will be
required to update some of the parameters. Click Apply Changes once complete.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 40
All other trademarks are the property of their respective owners.
- 41. Rethink Intrusion Prevention System Testing
14. Finally, in the Session Configuration section, verify Maximum Simultaneous Sessions is set to 1,000,000. Change
Maximum Sessions Per Second to 45,000. Click Apply Changes once completed.
15. If desired, change the test Description under the Test Information section.
16. Verify that the Test Status has a green checkmark. If it does not, click Test Status and make the needed changes.
17. Before running the test the test component needs to be saved as a preset for use in later tests (saving as a preset allows
for quicker and easier configuration). Right-click on the test component, and select Save Component As Preset.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 41
All other trademarks are the property of their respective owners.
- 42. Rethink Intrusion Prevention System Testing
18. When prompted for a name to save the preset as, type IPS SYN Flood and click Save.
19. Finally, under Test Quick Steps, click Save and Run.
20. When prompted to save test, type IPS SYN Flood as a name.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 42
All other trademarks are the property of their respective owners.
- 43. Rethink Intrusion Prevention System Testing
21. Under the Summary tab it is possible to determine how the IPS is handling the SYN Flood attack. Under TCP
Connection Rate under Client, there should be a value only for Attempted. For Cumulative TCP Connections, a value
should be present only for Client Attempted. The Bandwidth for Rx should be very low, if not 0.
22. Select the TCP tab. No Successful connections should be present; this is another way of verifying that the IPS is
successfully handling the SYN Flood attack.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 43
All other trademarks are the property of their respective owners.
- 44. Rethink Intrusion Prevention System Testing
23. When the test finishes, a new window will appear, stating the test failed. This is expected, as no connections were
successfully made. Click Close.
24. Click the View the Report button.
25. Expand the Test Results for SYN Flood folder and select TCP Summary. Verify that Client attempted has a value and
that both Client established and Server established are 0. This means that the IPS was able to successfully handle the
SYN Flood.
Other test variations can also be run. The following are a couple of variations:
• Increase the test length for a longer SYN attack.
• If Hot Standby is going to be used, perform a test that shows how traffic is affected.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 44
All other trademarks are the property of their respective owners.
- 45. Rethink Intrusion Prevention System Testing
Baseline Attack Mitigation: Malicious Traffic
RFC:
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
Overview:
It is important to evaluate how malicious traffic will affect the performance of an IPS. A Security test component will be used in this test.
Five default attack series are available to use, but during this test only Security Level 1 will be used. Security Level 1 includes high-risk
vulnerabilities in services often exposed to the Internet.
Objective:
To evaluate the IPS’s ability to detect and mitigate vulnerabilities, worms and backdoors.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 45
All other trademarks are the property of their respective owners.
- 46. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 46
All other trademarks are the property of their respective owners.
- 47. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. Select Test New Test.
5. Under Test Quick Steps, click Select the DUT/Network.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 47
All other trademarks are the property of their respective owners.
- 48. Rethink Intrusion Prevention System Testing
6. In the Choose a device under test and network neighborhood window, make sure BreakingPoint Default is select under
Device Under Test(s) and IPS Tests is selected under Network Neighborhood(s). Once completed, click Accept.
7. When prompted that the current test setup contains more interfaces, click Yes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 48
All other trademarks are the property of their respective owners.
- 49. Rethink Intrusion Prevention System Testing
8. Under Test Quick Steps, click Add a Test Component.
9. In the Select a component type window, select the Security test component.
10. Under the Information tab, enter the name Malicious Traffic and click Apply Changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 49
All other trademarks are the property of their respective owners.
- 50. Rethink Intrusion Prevention System Testing
11. Select the Interfaces tab and verify Interface 1 Client is enabled and Interface 2 Server is enabled.
12. Select the Presets tab, and select Security Level 1. Click Apply Changes.
13. Select the Parameters tab. The defaults are all okay if repeatable strikes are required, change the RandomSeed to a
value higher than 0.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 50
All other trademarks are the property of their respective owners.
- 51. Rethink Intrusion Prevention System Testing
14. If desired, change the test Description under the Test Information section.
15. Verify that the Test Status has a green checkmark. If it does not, click Test Status and make the needed changes.
16. Before running the test, the test component needs to be saved as a preset for use in later tests (saving as a preset
allows for quicker and easier configuration). Right-click on the test component, and select Save Component As
Preset.
17. When prompted for a name to save the preset as, type IPS Malicious Traffic and click Save.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 51
All other trademarks are the property of their respective owners.
- 52. Rethink Intrusion Prevention System Testing
18. Finally, under Test Quick Steps, click Save and Run.
19. When prompted to save the test, type IPS Malicious Traffic as a name.
20. Select the Attacks tab. This provides a view that shows the number of blocked attacks and the number of attacks that
have been allowed to pass through the DUT.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 52
All other trademarks are the property of their respective owners.
- 53. Rethink Intrusion Prevention System Testing
21. When the test completes, a window will appear, stating that malicious traffic was able to pass through the DUT. Click
Close.
22. When the test completes, click the View the report button.
23. Expand the Test Results for Malicious Traffic folder and select Strike Results. Determine the number of strikes that
were allowed to pass through the DUT and the number that were blocked.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 53
All other trademarks are the property of their respective owners.
- 54. Rethink Intrusion Prevention System Testing
Other variations of this test can be performed. Below is a list of some of the other tests:
• Increase the test length for a longer malicious traffic attack.
• Change the Security Level.
• Use different presets, such as the Service Provider App or a custom application profile.
• Use a different random seed.
• If Hot Standby is going to be used, perform a test that shows how traffic is affected.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 54
All other trademarks are the property of their respective owners.
- 55. Rethink Intrusion Prevention System Testing
Application Traffic with SYN Flood
RFC:
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
• RFC 4987 – TCP SYN Flooding Attacks and Common Mitigations
Overview:
Since tests for application performance and a SYN Flood have already been configured and saved as presets, they will be used in this test.
Two test components will be used during this test, an Application Simulator and a Session Sender component.
Objective:
To combine application traffic with SYN flood traffic and compare the results against the results from the Throughput Test and the SYN
Flood Test.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 55
All other trademarks are the property of their respective owners.
- 56. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 56
All other trademarks are the property of their respective owners.
- 57. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. Use a previous test as a starting point for this test. Select Test Open Recent Tests IPS Maximum Throughput.
5. Before continuing with configuration of the test, click Save As.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 57
All other trademarks are the property of their respective owners.
- 58. Rethink Intrusion Prevention System Testing
6. When prompted for a name to save the test as, type App Traff with SYN Flood and click Save.
7. Under the Test Quick Steps, click Add a Test Component.
8. In the Select a component type window, select the Session Sender (L4).
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 58
All other trademarks are the property of their respective owners.
- 59. Rethink Intrusion Prevention System Testing
9. The Information tab should be selected. Type the name SYN Flood and click Apply Changes.
10. Select the Presets tab, and select the IPS SYN Flood preset. Click Apply Changes once complete.
11. If desired, change the test Description under the Test Information section.
12. Verify that the Test Status has a green checkmark. If it does not, click Test Status and make the needed changes.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 59
All other trademarks are the property of their respective owners.
- 60. Rethink Intrusion Prevention System Testing
13. Under Test Quick Steps, click Save and Run.
The Summary tab will be visible and provides a great deal of information about the current running test and results. The Summary
tab provides information about the application flows, TCP connections and overall bandwidth currently being utilized.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 60
All other trademarks are the property of their respective owners.
- 61. Rethink Intrusion Prevention System Testing
Detailed results about each protocol can be viewed under the Application tab. Use the drop down menus to display results from
different protocols.
14. Once the test completes, a new window will appear, stating that the test failed. This is expected, as the IPS should be
blocking a majority of the protocols being transmitted. Click Close to continue.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 61
All other trademarks are the property of their respective owners.
- 62. Rethink Intrusion Prevention System Testing
15. Select the View the report button. This will open more detailed results in a Web browser.
16. To determine the ability of the IPS to handle a SYN flood while also processing legit traffic, expand Test Results for SYN
Flood and select TCP Summary. Verify that no client was able to establish a connection and that no servers established
connections either. Once done viewing these results, for easier navigation minimize Test Results for SYN Flood.
17. Expand Test Results for Maximum Throughput and select TCP Setup Time. Again, the quicker the setup times, the
better, as the IPS is able to react and respond to the incoming request. Determine the effect the SYN flood had on the
TCP setup time of the application traffic.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 62
All other trademarks are the property of their respective owners.
- 63. Rethink Intrusion Prevention System Testing
18. Select TCP Response Time. Just as with TCP Setup Time, the quicker the response times, the better. Determine the
effect the SYN flood had on the TCP response time of the application traffic.
19. Next, select TCP Close Time. The quicker the IPS is able to close the TCP connection, the quicker it frees up those
resources and can use them to start a new connection. Determine the affect the SYN flood had on the TCP close time of
the application traffic.
20. Select Frame Latency, and determine how the SYN flood affects the latency of the application traffic.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 63
All other trademarks are the property of their respective owners.
- 64. Rethink Intrusion Prevention System Testing
21. Expand the Detail folder and also expand the App Throughput: by protocol folder. Select the first item, App
determine how each protocol was handled.
Throughput: protocol aol and determine if any traffic was able to pass through the IPS. View the entire list to
22. Repeat the previous step with App Transaction Rates: by protocol, App Response Time: by protocol, and App Failures:
by protocol. Determine if transmitting blended traffic had an effect on any of the protocols.
23. Compare all the results collected from the current test with the baseline tests to determine any differences.
24. If any test variations were run with either the Baseline Application Perfromance: Throughput or the Baseline Attack
Mitigation: SYN Flood tests, make sure to run those variations on this test too.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 64
All other trademarks are the property of their respective owners.
- 65. Rethink Intrusion Prevention System Testing
Application Traffic with Malicious Traffic
RFC:
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
Overview:
Since tests for application performance and malicious traffic have already been configured and saved as presets, they will be used in this
test. Two test components will be used during this test, an Application Simulator and a Security component.
Objective:
To combine application traffic with malicious traffic and compare the results with the results from the security test.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 65
All other trademarks are the property of their respective owners.
- 66. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 66
All other trademarks are the property of their respective owners.
- 67. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. Use a previous test as a starting point for this test. Select Test Open Recent Tests IPS Maximum Throughput.
5. Before continuing with configuration of the test, click Save Test As.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 67
All other trademarks are the property of their respective owners.
- 68. Rethink Intrusion Prevention System Testing
6. When prompted for a name to save the test as, type App Traff Malicious Traffic and click Save.
7. Under the Test Quick Steps, click Add a Test Component.
8. In the Select a component type window, select the Security test component.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 68
All other trademarks are the property of their respective owners.
- 69. Rethink Intrusion Prevention System Testing
9. The Information tab should be selected. Type Malicious Traffic for the name, and click Apply Changes.
10. Select the Presets tab. Select IPS Malicious Traffic, and click Apply Changes.
11. If desired, enter a test Description under the Test Information section.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 69
All other trademarks are the property of their respective owners.
- 70. Rethink Intrusion Prevention System Testing
12. Verify that Test Status has a green checkmark next to it. If it does not have a green checkmark, click Test Status and
make the required changes.
13. Under Test Quick Steps, click Save and Run.
The Summary tab will be visible and provides a great deal of information about the current running test and results. The Summary
tab provides information about the application flows, TCP connections and the overall bandwidth currently being utilized.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 70
All other trademarks are the property of their respective owners.
- 71. Rethink Intrusion Prevention System Testing
Detailed results about each protocol can be viewed under the Application tab. Use the drop-down menus to display results from
different protocols.
14. Select the Attacks tab. This will provide real-time information about how the IPS is performing with the malicious
traffic. As can be seen in the image below, some attacks have been allowed.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 71
All other trademarks are the property of their respective owners.
- 72. Rethink Intrusion Prevention System Testing
15. When the test completes, a window will appear saying the test failed. Click Close.
16. Select the View the report button. This will open up more detailed results in the browser.
17. Expand the Test results for Malicious Traffic folder and select Strike Results. Determine how well the DUT was able
to handle the different strikes and maintain blocking them while still transmitting regular traffic. Once completed,
collapse Test results for Malicious Traffic.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 72
All other trademarks are the property of their respective owners.
- 73. Rethink Intrusion Prevention System Testing
18. Expand the Test Results for Generic Traffic folder, and select TCP Setup Time. The quicker the IPS is able to react
and setup the TCP connection the better. Determine the effect the malicious traffic had on the TCP setup time.
19.
Next, select TCP Response Time. Again, the quicker the IPS is able to respond to the incoming connection, the better,
as the connection can be established quicker.
20. Select TCP Close Time. The ability of the IPS to quickly terminate a connection allows the IPS to quickly free those
resources.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 73
All other trademarks are the property of their respective owners.
- 74. Rethink Intrusion Prevention System Testing
21. Select Frame Latency, and determine the affect malicious traffic had on the overall latency.
22. Next, expand the Details folder and also expand the App Throughput: by protocol folder. Select the first item, App
determine how each protocol was handled.
Throughput: protocol aol and determine if any traffic was able to pass through the IPS. View the entire list to
23. Repeat the previous step with App Transaction Rates: by protocol, App Response Time: by protocol, and App Failures:
by protocol. Determine if transmitting blended traffic had an effect on any of the protocols.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 74
All other trademarks are the property of their respective owners.
- 75. Rethink Intrusion Prevention System Testing
24. Finally, select Frame Data Rate, and determine how the malicious traffic affects the data rate.
25. Compare all the results collected from the current test with the baseline tests to determine any differences.
26. If any test variations were run with either the Baseline Application Performance Test: Throughput or the Baseline
Attack Mitigation: SYN Flood, make sure to run those variations on this test too.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 75
All other trademarks are the property of their respective owners.
- 76. Rethink Intrusion Prevention System Testing
Application Traffic with Malicious Traffic and SYN Flood
RFC:
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
• RFC 4987 – TCP SYN Flooding Attacks and Common Mitigations
Overview:
Since tests for application performance, malicious traffic and a SYN Flood have already been configured and saved as presets, they will be
used in this test. Three test components will be used during this test, an Application Simulator, a Security component and a Session Sender
component. This test will determine the ability of the IPS to handle malicious traffic while also having to deal with a SYN Flood and allowing
good traffic to pass through.
Objective:
To send a blend of application traffic with a SYN Flood and malicious traffic to the IPS and to compare the results of this test against the
results of the baseline tests.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 76
All other trademarks are the property of their respective owners.
- 77. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 77
All other trademarks are the property of their respective owners.
- 78. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. We will use a previous test as a starting point for this test. Select Test Open Recent Tests App Traff with
Malicious Traffic.
5. Before continuing with configuration of the test, click Save Test As.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 78
All other trademarks are the property of their respective owners.
- 79. Rethink Intrusion Prevention System Testing
6. When prompted for a name to save the test as, type App Traff with Malicious Traffic and SYN Flood and click Save.
7. Under the Test Quick Steps, click Add a Test Component.
8. In the Select a component type window, select the Session Sender (L4) test component.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 79
All other trademarks are the property of their respective owners.
- 80. Rethink Intrusion Prevention System Testing
9. The Information tab should be selected. Type SYN Flood as the name and click Apply Changes.
10. Select the Presets tab. Locate IPS SYN Flood in the list, and click Apply Changes.
11. With the addition of the Session Sender test component, the interfaces have become oversubscribed. Select the
of the total available bandwidth, and click Apply Changes.
Maximum Throughput test component, and then select the Parameters tab. Change the Minimum data rate to 85%
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 80
All other trademarks are the property of their respective owners.
- 81. Rethink Intrusion Prevention System Testing
12. Verify that the Test Status has a green checkmark. If not, click on Test Status and make the required changes.
13. If desired, edit the test Description under the Test Information section.
14. Under the Test Quick Steps, click Save and Run.
The Summary tab will be visible and provides a great deal of information about the current running test and results. The Summary
tab provides information about the application flows, TCP connections and overall bandwidth currently being utilized.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 81
All other trademarks are the property of their respective owners.
- 82. Rethink Intrusion Prevention System Testing
Detailed results about each protocol can be viewed under the Application tab. Use the drop-down menus to display results from
different protocols.
15. Select the Attacks tab. This provides a real-time look into how the IPS is performing with the malicious traffic. As can
be seen from the image below, some of the attacks are being allowed to pass through the IPS.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 82
All other trademarks are the property of their respective owners.
- 83. Rethink Intrusion Prevention System Testing
16. Once the test completes, a new window will appear, stating the test criteria failed. Click Close to continue.
17. Click the View the report button. This will open detailed results in a browser window.
18. Expand Test Results for SYN Flood and select TCP Summary. Verify that no TCP connections were established.
Collapse Test Results for SYN Flood once completed.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 83
All other trademarks are the property of their respective owners.
- 84. Rethink Intrusion Prevention System Testing
19. Expand Test Results for Malicious Traffic and select Strike Results. Determine how well the IPS was able to block and
not allow different strikes to pass through. Again, collapse Test Results for Malicious Traffic once completed.
20. Expand Test Results for Maximum Throughput and select TCP Setup Time. The quicker the IPS is able to react and set
up the TCP connection, the better. Determine the effect the malicious traffic had on the TCP setup time. The TCP setup
time has been affected and has increased.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 84
All other trademarks are the property of their respective owners.
- 85. Rethink Intrusion Prevention System Testing
21. Next, select TCP Response Time. Again, the quicker the IPS is able to respond to the incoming connection, the better
as the connection can be established quicker. Again, the time for TCP response time has increased.
22. Select TCP Close Time. The ability of the IPS to quickly terminate a connection allows the IPS to free those resources.
The TCP close time has also increased compared to the baseline tests.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 85
All other trademarks are the property of their respective owners.
- 86. Rethink Intrusion Prevention System Testing
23. Select Frame Latency and determine the affect malicious traffic and the SYN flood had on the overall latency.
24. Next, expand the Details folder. Also, expand the App Throughput: by protocol folder. Select the first item, App
determine how each protocol was handled.
Throughput: protocol aol, and determine if any traffic was able to pass through the IPS. View the entire list to
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 86
All other trademarks are the property of their respective owners.
- 87. Rethink Intrusion Prevention System Testing
25. Repeat the previous step with App Transaction Rates: by protocol, App Response Time: by protocol, and App Failures:
by protocol. Determine if transmitting blended traffic had an effect on any of the protocols.
26. Finally, select Frame Data Rate and determine how the malicious traffic and SYN Flood affected the data rate.
27. Compare all the results collected from the current test with the baseline tests to determine any differences.
28. If any test variations were run with either the Baseline Application Performance Test: Throughput, the Baseline Attack
Mitigation: Malicious Traffic or Baseline Attack Mitigation: SYN Flood, make sure to run those variations on this test
too.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 87
All other trademarks are the property of their respective owners.
- 88. Rethink Intrusion Prevention System Testing
Jumbo Frames
RFC
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
• RFC 894– A Standard for the Transmission of IP Datagrams over Ethernet
Overview:
The Throughput test will be used as a starting point in this test. Once the test is opened, the Maximum Segment size will be changed to
4,000 to send jumbo frames.
Objective:
To analyze how the IPS handles jumbo frames.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 88
All other trademarks are the property of their respective owners.
- 89. Rethink Intrusion Prevention System Testing
1. Launch your favorite Web browser, and connect to the BreakingPoint Storm CTM. Click Start BreakingPoint Systems
Control Center once the page loads.
2. In the new window that appears, enter in your Login ID and Password. Click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 89
All other trademarks are the property of their respective owners.
- 90. Rethink Intrusion Prevention System Testing
3. Reserve the required ports to run the test.
4. We will use a previous test as a starting point for this test. Select Test Open Recent Tests IPS Maximum
Throughput.
5. Before continuing with configuration of the test, click Save Test As.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 90
All other trademarks are the property of their respective owners.
- 91. Rethink Intrusion Prevention System Testing
6. When prompted for a name to save the test as, type IPS Jumbo Frames.
7. Select the Parameters tab and under the TCP Configuration section, change the Maximum Segment Size (MSS) to a
value greater than 1500 but less than 9142. In this example, a 4000-byte packet was used. Once the changes have been
completed, click Apply Changes.
8. Next, select Control Center Device Status.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 91
All other trademarks are the property of their respective owners.
- 92. Rethink Intrusion Prevention System Testing
9. When prompted about saving the test due to changes, click Yes.
10. Right-click on a reserved port, and select Configure Port.
11. Verify that the MTU is large enough, and click Close. If needed, increase the MTU size, and click Apply. Repeat this
process for the other reserved port too.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 92
All other trademarks are the property of their respective owners.
- 93. Rethink Intrusion Prevention System Testing
12. To return to the test configuration, select Test Open Recent Tests IPS Jumbo Frames.
13. Under the Test Information section, edit the test Description.
14. Verify that the Test Status has a green checkmark. If it does not contain a green checkmark, click Test Status and make
the required changes.
15. Under Test Quick Steps, click Save and Run.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 93
All other trademarks are the property of their respective owners.
- 94. Rethink Intrusion Prevention System Testing
The Summary tab will be visible and provides a great deal of information about the current running test and results. The Summary
tab provides information about the application flows, TCP connections and overall bandwidth currently being utilized.
16. Once the test completes, a new window will appear stating that the test either passed or failed. Click Close to continue.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 94
All other trademarks are the property of their respective owners.
- 95. Rethink Intrusion Prevention System Testing
17. Click the View the report button. This will open a Webpage containing more detailed results.
18. Expand the Test Results for Maximum Throughput folder, and select App Bytes Transmitted. This will display a byte
count that each protocol transmitted.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 95
All other trademarks are the property of their respective owners.
- 96. Rethink Intrusion Prevention System Testing
19. Expand the Details folder, and select TCP Setup Time. The shorter the TCP setup time, the better, as the DUT is able to
quickly handle the requests and continue operating as expected.
20. Select TCP Response Time. Again, the shorter the TCP response time, the better, as the DUT is able to quickly respond
to requests and continue operating.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 96
All other trademarks are the property of their respective owners.
- 97. Rethink Intrusion Prevention System Testing
21. Expand the Detail folder. Select the Frame Data Rate, and determine the maximum transmit and receive rate using the
graph and the table.
22. To determine how each protocol was handled by the IPS, five different results will be viewed. Under the Detail folder,
expand and analyze the results of the following: App Concurrent Flows: by protocol, App Throughput: by protocol, App
Transaction Rates: by protocol, App Response Time: by protocol and App Failures: by protocol.
23. Using the results from the current test and the results from the Throughput test, determine if the IPS performed better,
worse or the same when handling jumbo frames.
Other test variations can also be run. The following are some test variation examples:
• Test several different sizes of jumbo frames, specifically making sure to test the 9,000-byte frame.
• Increase the test duration.
• If Hot Standby is going to be used, perform a test that shows how traffic is affected.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 97
All other trademarks are the property of their respective owners.
- 98. Rethink Intrusion Prevention System Testing
IP, UDP and TCP Fuzzing
RFC:
• RFC 768 – User Datagram Protocol
• RFC 791 – Internet Protocol
• RFC 793 – Transmission Control Protocol
Overview:
The Throughput test will be used as a starting point and a Stack Scrambler component will be used too. The Stack Scrambler tests the
integrity of different protocols by sending malformed IP, UDP, TCP and Ethernet packets to the IPS. The fuzzing technique will modify only a
single part of the packet to generate corrupt data.
Objective:
To send fuzzed traffic through the IPS and determine how it affects the IPS and other protocols.
Setup:
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 98
All other trademarks are the property of their respective owners.
- 99. Rethink Intrusion Prevention System Testing
1. Open your favorite Web browser, and connect to the BreakingPoint Storm CTM. Once the page has loaded, click Start
BreakingPoint Systems Control Center.
2. Log in to the BreakingPoint Storm CTM by entering your Login ID and Password. Once done, click Login.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 99
All other trademarks are the property of their respective owners.
- 100. Rethink Intrusion Prevention System Testing
3. Once logged in, reserve the required ports to run the test.
4. We will use a previous test as a starting point for this test. Select Test Open Recent Tests IPS Maximum
Throughput.
5. In the lower left, click Save Test As.
www.breakingpoint.com
© 2005 - 2010. BreakingPoint Systems, Inc. All rights reserved. The BreakingPoint logo is a trademark of BreakingPoint Systems, Inc. 100
All other trademarks are the property of their respective owners.