SlideShare a Scribd company logo
1 of 21
Download to read offline
NETWORK FIREWALL
                                         INDIVIDUAL TEST RESULTS

                                                 PALO ALTO NETWORKS PA-4020




                                                                 APRIL 2011
                                                   METHODOLOGY VERSION: 3.0




Licensed to: Purchaser (Single-User, INTERNAL USE ONLY)
To receive a licensed copy or report misuse,
please contact NSS Labs at: +1 (760) 270-9852
or advisor@nsslabs.com.
©2011 NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied,
stored on a retrieval system, or transmitted without the express written consent of the authors.

Please note that access to or use of this report is conditioned on the following:

1. The information in this report is subject to change by NSS Labs without notice.
2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of
   publication, but is not guaranteed. All use of and reliance on this report are at the reader‘s sole
   risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any
   error or omission in this report.
3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY THE NSS LABS. ALL IMPLIED
   WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
   PARTICULAR PURPOSE, AND NON-INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS
   LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR
   INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR
   OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.
4. This report does not constitute an endorsement, recommendation, or guarantee of any of the
   products (hardware or software) tested or the hardware and software used in testing the products.
   The testing does not guarantee that there are no errors or defects in the products or that the
   products will meet the reader‘s expectations, requirements, needs, or specifications, or that they
   will operate without interruption.
5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any
   organizations mentioned in this report.
6. All trademarks, service marks, and trade names used in this report are the trademarks, service
   marks, and trade names of their respective owners.




CONTACT INFORMATION
NSS Labs, Inc.
P.O. Box 130573
Carlsbad, CA 92013 USA
+1 (760) 270-9852
info@nsslabs.com
www.nsslabs.com




Network Firewall Test Results – Palo Alto Networks PA-4020
©2011 NSS Labs, Inc. All rights reserved.
TABLE OF CONTENTS
1     Introduction ................................................................................ 1
    1.1 The Need for Firewalls ...................................................................... 1
    1.2 Product Summary ............................................................................. 1
    1.3 About NSS Labs................................................................................. 2

2 Security Effectiveness .................................................................. 3
    2.1 Firewall Policy Enforcement .............................................................. 3

3 Performance ................................................................................ 7
4 Stability & Reliability ................................................................. 11
5 Total Cost of Ownership & Value ................................................ 13
6 Test Scorecard ........................................................................... 15
Appendix A: Special Thanks ............................................................ 17




Network Firewall Test Results – Palo Alto Networks PA-4020
©2011 NSS Labs, Inc. All rights reserved.
TABLE OF FIGURES
Figure   1:   Rated Throughput (MBPS) ........................................................................................... 7
Figure   2:   Maximum Concurrent Connections vs. HTTP Transactions & TCP Connections per Second .... 8
Figure   3:   Maximum HTTP Connections per Second with Various Size Payloads ................................. 9
Figure   4:   Maximum Throughput (MBPS) with Various Size Payloads ............................................... 9
Figure   5:   UDP Throughput (MBPS) ............................................................................................10
Figure   6:   3 year TCO ...............................................................................................................14




Network Firewall Test Results – Palo Alto Networks PA-4020
©2011 NSS Labs, Inc. All rights reserved.
1 INTRODUCTION
1.1 THE NEED        FOR   FIREWALLS
Firewall technology has been around for at least 25 years, and has undergone several stages of
development; from early packet and circuit firewalls to application layer and dynamic packet firewalls.
Across these stages, the goal has continued to be to provide a protective barrier between internal and
external networks, while allowing for productive communications to pass from one side to the other.

In order to establish a secure perimeter, a basic network firewall must provide granular control based
upon the source and destination IP Addresses and ports. As firewalls will be deployed at critical choke-
points in the network, the stability and reliability of a firewall is imperative. And it must not degrade
network performance or it will never be installed. The following capabilities are considered essential
as part of a firewall:

       Basic packet filtering
       Stateful multi-layer inspection
       Network Address Translation (NAT)
       Highly Stable
       Ability to operate at layer 3

NSS Labs‘ test reports are designed to address the challenges faced by IT professionals in selecting
and managing security products. The scope of this report is focused on:

       Security effectiveness
       Performance
       Stability
       Total Cost of Ownership (TCO)



1.2 PRODUCT SUMMARY
During Q1 2011, NSS Labs performed the industry‘s most rigorous test of leading network firewall
solutions. This report has been produced for our enterprise subscribers, as part of NSS Labs‘
independent testing information services. Leading vendors were invited to participate fully at no cost,
and NSS Labs received no vendor funding.

As part of our Network Firewall Group Test, Palo Alto Networks submitted the Palo Alto Networks PA-
4020.

                                NSS Labs’ Rating: Recommended

                                                 Max UDP         NSS Labs Rated
                      Product
                                                Throughput         Throughput

                      PA-4020                   8,000 Mbps         5,207 Mbps



Palo Alto Networks is a new entrant in the firewall category, focusing primarily on the Next-Gen
firewall market. The PA-4020 has been rated by Palo Alto as a 2 Gbps firewall, a very conservative
number based upon NSS Labs rating of 5,207 Mbps.

Network Firewall Test Results – Palo Alto Networks PA-4020                                             1
©2011 NSS Labs, Inc. All rights reserved.
The PA-4030 was one of only three products that was able to withstand our stability test and remain
functional. However, it failed to properly handle TCP Split Handshake attack.

Update: Palo Alto issued update (4.0.2) on Monday April 18, and NSS Labs has confirmed that they
now block the attack. As a result, we have upgraded the PA-4020 to Recommended. Palo Alto
Networks customers should update at the earliest opportunity.



1.3 ABOUT NSS L ABS
NSS Labs, Inc. is the world‘s leading independent information security research and testing
organization. Its expert analyses provide information technology professionals with the unbiased data
they need to select the right product for their organizations. Pioneering intrusion detection and
prevention system testing with the publication of the first such test criteria in 2001, NSS Labs also
evaluates firewall, unified threat management, anti-malware, encryption, web application firewall, and
other technologies on a regular basis. The firm‘s real-world test methodology is the only one to assess
security products against live Internet threats. NSS Labs tests are considered the most aggressive in
the industry and its recommendations are highly regarded by enterprises. Founded in 1991, the
company has offices in Carlsbad, California and Austin, Texas.




Network Firewall Test Results – Palo Alto Networks PA-4020                                           2
©2011 NSS Labs, Inc. All rights reserved.
2 SECURITY EFFECTIVENESS
This section verifies that the Device Under Test (DUT) is capable of enforcing a specified security
policy effectively. NSS Labs‘ firewall analysis is conducted by incrementally building upon a baseline
configuration (simple routing with no policy restrictions and no content inspection) to a complex real
world multiple zone configuration supporting many addressing modes, policies, applications, and
inspection engines.

At each level of complexity, test traffic is passed across the firewall to ensure that only specified traffic
is allowed and the rest is denied, and that appropriate log entries are recorded.

The firewall must support stateful firewalling either by managing state tables to prevent ―traffic
leakage‖ or as a stateful proxy. The ability to manage firewall policy across multiple interfaces/zones
is a required. At a minimum, the firewall must provide a ―trusted‖ internal interface, an ―untrusted‖
external/Internet interface, and (optionally) one or more DMZ interfaces. In addition, a dedicated
management interface (virtual or otherwise) is preferred.


2.1 FIREWALL POLICY ENFORCEMENT
Policies are rules that are configured on a firewall to permit or deny access from one network resource
to another based on identifying criteria such as: source, destination, and service. A term typically
used to define the demarcation point of a network where policy is applied is a demilitarized zone
(DMZ). Policies are typically written to permit or deny network traffic from one or more of the
following zones:

       Untrusted – This is typically an external network and is
        considered to be an unknown and non-secure. An example
        of an untrusted network would be the Internet.
       DMZ – This is a network that is being isolated by the
        firewall restricting network traffic to and from hosts
        contained within the isolated network.
       Trusted – This is typically an internal network; a network
        that is considered secure and protected.

The NSS Labs Firewall certification tests performance and the ability
to enforce policy between the following:

       Trusted to Untrusted
       Untrusted to DMZ

Trusted to DMZNote: Firewalls must provide at a minimum one
DMZ interface in order to provide a DMZ or ―transition point‖
between untrusted and trusted networks.




Network Firewall Test Results – Palo Alto Networks PA-4020                                                 3
©2011 NSS Labs, Inc. All rights reserved.
2.1.1 BASELINE POLICY
Routed configuration with an ―allow all‖ policy

 Product                          Result
 Palo Alto PA-4020                PASS



2.1.2 SIMPLE POLICIES
Simple outbound and inbound policies allowing basic browsing and e-mail access for internal clients
and no external access

 Product                          Result
 Palo Alto PA-4020                PASS



2.1.3 COMPLEX POLICIES
Complex outbound and inbound policies consisting of many rules, objects, and services.

 Product                          Result
 Palo Alto PA-4020                PASS



2.1.4 STATIC NAT (NETWORK ADDRESS TRANSLATION )
Inbound Network Address Translation (NAT) to DMZ using fixed IP address translation with one-to-one
mapping.

 Product                          Result
 Palo Alto PA-4020                PASS



2.1.5 DYNAMIC/HIDE NAT (NETWORK ADDRESS TRANSLATION )
Outbound Network Address Translation (NAT) (from Internal to External) where all outbound traffic
―hides‖ behind the IP Address of the External Interface of the Firewall utilizing a pool of high ports to
manage multiple connections.

 Product                          Result
 Palo Alto PA-4020                PASS



2.1.6 SYN FLOOD PROTECTION
The basis of a SYN Flood attack is to not complete the 3-way handshake necessary to establish
communication. Specifically the attacker (client machine A in fig. 6) refusing to send the ACK signal to
the host server (B) after receiving the SYN/ACK from Host B. Such a connection is called a half open
connection.




Network Firewall Test Results – Palo Alto Networks PA-4020                                             4
©2011 NSS Labs, Inc. All rights reserved.
Instead of sending an ACK, attacker A sends another SYN signal to the victim server. The server again
acknowledges it with a SYN/ACK and B again refuses to send the final ACK signal. By repeating this
several times the attacker tries to overflow the data structure of the host server. The data structure is
built in the memory of the host server with the purpose of keeping records of connections to be
completed (or half open connections). Since the data structure is of a finite size, it is possible to
overflow it by establishing a large number of open connections.

Once overflow occurs the host server will not be able to accept new connections thus resulting in a
denial of service. There is however a time-out associated with each of the connections (approximately
3 minutes) after which the host server will automatically drop the half open connections and can start
accepting new connections. If the attacker can request connections at a rate higher than the victim
servers ability to expire the pending connections then it is possible to crash the server.

Thus the objective of SYN flooding is to disable one side of the TCP connection which will result in one
or more of the following:

       The server is unable to accept new connections.
       The server crashes or becomes inoperative.
       Authorization between servers is impaired.

The firewall is expected to protect against SYN Floods.

 Product                          Result
 Palo Alto PA-4020                PASS



2.1.7 IP ADDRESS SPOOFING
This test attempts to confuse the firewall into allowing traffic to pass from one network segment to
another. Each IP packet header contains the source and destination address of the packet. The source
address is normally the address that the packet was sent from. By forging the header so it contains a
different source address, an attacker can make it appear that the packet was sent by a different
(trusted) machine. The machine that receives spoofed packets will send response back to the forged
source address.



Network Firewall Test Results – Palo Alto Networks PA-4020                                             5
©2011 NSS Labs, Inc. All rights reserved.
The firewall is expected to protect against IP Address spoofing.

    Product                       Result
    Palo Alto PA-4020             PASS



2.1.8 TCP SPLIT HANDSHAKE SPOOF
This test attempts to confuse the Firewall into allowing traffic to pass from one network segment to
another. The TCP Split handshake blends features of both the three way handshake and the
simultaneous-open connection. The result is a TCP Spoof that allows an attacker to bypass the firewall
by having the attacker instruct the target to ―initiate‖ the session back with the attacker. Popular
TCP/IP networking stacks respect this handshaking method, including Microsoft, Apple, and Linux
stacks, with no modification.1

TCP spoofing attacks have been around for years, and presumed ―cured‖ by modern firewalls. What
makes this particular attack different is that it targets the client.

The firewall is expected to protect against TCP Split Handshake spoofing.

                                  Original Result   Updated Result
    Product                                         (April 20, 2011)
    Palo Alto PA-4020                   FAIL               PASS2




1
  The TCP Split Handshake: Practical Effects on Modern Network Equipment, Tod Alien Beardsley & Jin
Qian, http://www.macrothink.org/journal/index.php/npa/article/view/285
2
  Palo Alto issued update (4.0.2) on Monday April 18, and NSS Labs has confirmed that they now block
the attack.


Network Firewall Test Results – Palo Alto Networks PA-4020                                          6
©2011 NSS Labs, Inc. All rights reserved.
3 PERFORMANCE
NSS Labs collected extensive performance metrics during this test, according to our established
methodology. The volumes of data produced by these tests are designed to capture maximum
capacities or ―the edge of performance‖ that may be obtainable for a given metric. In addition, our
real-world traffic mix testing methods enable us to more accurately estimate the performance users
can expect in their environments. Due to space considerations and the number of different products,
we have summarized some of the most important figures that a network administrator should consider
when sizing a deployment.

3.1.1 RATED THROUGHPUT
NSS Labs rates product performance based upon the average of three traffic types: 21KB HTTP
response traffic, a mix of perimeter traffic common in enterprises, and a mix of internal ―core‖ traffic
common in enterprises. Details of these traffic mixes are available in the Firewall Test Methodology.




             Palo Alto PA-4020                                                         5,207




                                 0       1,000    2,000   3,000     4,000      5,000       6,000




                                     FIGURE 1: RATED THROUGHPUT (MBPS)

3.1.2 CONNECTION DYNAMICS
Beyond overall throughput of the device, connection dynamics can play an important role in sizing a
security device that will not unduly impede the performance of a system or an application. Maximum
Connection and transaction rates help size a device more accurately than simply looking at
throughput. By knowing the maximum connections per second, it possible to predict maximum
throughput based upon the traffic mix in a given enterprise environment. For example, if the device
maximum HTTP CPS is 2,000, and average traffic size is 44KB such that 2,500 CPS = 1Gbps, then the
tested device will achieve a maximum of 800 Mbps ((2,000/2,500) x 1,000 Mbps)) = 800 Mbps.
Following is a subset of figures from our performance tests.

The aim of these tests is to stress the device and determine how it copes with large numbers of TCP
connections per second, application layer transactions per second, and concurrent open connections.
All packets contain valid payload and address data and these tests provide an excellent representation
of a live network at various connection/transaction rates.




Network Firewall Test Results – Palo Alto Networks PA-4020                                            7
©2011 NSS Labs, Inc. All rights reserved.
Note that in all tests, the following critical ―breaking points‖—where the final measurements are
taken—are used:

Excessive concurrent TCP connections - latency within the firewall is causing unacceptable
increase in open connections on the server-side.

Excessive response time for HTTP transactions/SMTP sessions - latency within the firewall is
causing excessive delays and increased response time to the client.

Unsuccessful HTTP transactions sessions – normally, there should be zero unsuccessful
transactions. Once these appear, it is an indication that excessive latency within the firewall is causing
connections to time out.

Maximum Capacity


                                          Theoretical Max.                Maximum TCP            Maximum HTTP
                                          Concurrent TCP                 Connections Per        Transactions Per
 Product                                Connections w/Data                   Second                 Second
 Palo Alto PA-4020                             523,000                       22,400                     158,000



The following chart depicts the relationship between the maximum concurrent connections and the
number of HTTP transactions per second that can be transmitted and received through the device.

  600,000
                                                                                        Palo Alto PA-4020
  500,000

  400,000

  300,000

  200,000

  100,000

       -
            -    20,000   40,000   60,000   80,000   100,000   120,000    140,000   160,000   180,000

  FIGURE 2: MAXIMUM CONCURRENT CONNECTIONS VS. HTTP TRANSACTIONS & TCP CONNECTIONS PER SECOND

3.1.3 MAXIMUM HTTP CAPACITY
These tests aim to stress the HTTP detection engine in order to determine how the sensor copes with
detecting and blocking exploits under network loads of varying average packet size and varying
connections per second. By creating genuine session-based traffic with varying session lengths, the
sensor is forced to track valid TCP sessions, thus ensuring a higher workload than for simple packet-
based background traffic.




Network Firewall Test Results – Palo Alto Networks PA-4020                                                         8
©2011 NSS Labs, Inc. All rights reserved.
35,000

                      30,000

                      25,000
   HTTP CPS




                      20,000

                      15,000

                      10,000

                        5,000

                           -
                                       44KB           21KB          10KB          4.5KB         1.7KB
              Palo Alto PA-4020       18,400         18,600        21,000         25,500        33,000


                      FIGURE 3: MAXIMUM HTTP CONNECTIONS PER SECOND WITH VARIOUS SIZE PAYLOADS

Each transaction consists of a single HTTP GET request and there are no transaction delays (i.e. the
web server responds immediately to all requests). All packets contain valid payload (a mix of binary
and ASCII objects) and address data. This test provides an excellent representation of a live network
(albeit one biased towards HTTP traffic) at various network loads.

                        8,000

                        7,000

                        6,000

                        5,000
   Mbps




                        4,000

                        3,000

                        2,000

                        1,000

                           -
                                      44KB           21KB           10KB          4.5KB         1.7KB
              Palo Alto PA-4020       7,360          3,720          2,100         1,275          825


                               FIGURE 4: MAXIMUM THROUGHPUT (MBPS) WITH VARIOUS SIZE PAYLOADS




3.1.4 RAW PACKET PROCESSING PERFORMANCE (UDP T RAFFIC)
The aim of this test is purely to determine the raw packet processing capability of each in-line port
pair of the device. It is not real world, and can be misleading. It is included here primarily for legacy
purposes.




Network Firewall Test Results – Palo Alto Networks PA-4020                                               9
©2011 NSS Labs, Inc. All rights reserved.
This traffic does not attempt to simulate any form of ―real-world‖ network condition. No TCP sessions
are created during this test, and there is very little protocol or content analysis to perform.

                    8,200



                    8,000



                    7,800



                    7,600
   Mbps




                    7,400



                    7,200



                    7,000



                    6,800
                               128            256           512         1024            1514
          Palo Alto PA-4020   7,300          8,000         8,000        8,000           8,000

                                      FIGURE 5: UDP THROUGHPUT (MBPS)




Network Firewall Test Results – Palo Alto Networks PA-4020                                        10
©2011 NSS Labs, Inc. All rights reserved.
4 STABILITY & RELIABILITY
Long term stability is particularly important for an in-line device, where failure can produce network
outages. These tests verify the stability of the DUT along with its ability to maintain security
effectiveness while under normal load and while passing malicious traffic. Products that are not able to
sustain legitimate traffic (or crash) while under hostile attack will not pass.

The DUT is required to remain operational and stable throughout these tests, and to block 100 per
cent of previously blocked traffic, raising an alert for each. If any non-allowed traffic passes
successfully - caused by either the volume of traffic or the DUT failing to bypass for any reason - this
will result in a FAIL.

4.1.1 BLOCKING UNDER EXTENDED ATTACK
The DUT is exposed to a constant stream of security policy violations over an extended period of time.
The device is configured to block and alert, and thus this test provides an indication the effectiveness
of both the blocking and alert handling mechanisms.

A continuous stream of security policy violations mixed with legitimate traffic is transmitted through
the device at a maximum of 100Mbps (max 50,000 packets per second, average packet sizes in the
range of 120-350 bytes) for 8 hours with no additional background traffic. This is not intended as a
stress test in terms of traffic load (covered in the previous section) - merely a reliability test in terms
of consistency of blocking performance.

The device is expected to remain operational and stable throughout this test, and to block 100 per
cent of recognizable violations, raising an alert for each. If any recognizable policy violations are
passed - caused by either the volume of traffic or the sensor failing open for any reason - this will
result in a FAIL.


 Product                   Result

 Palo Alto PA-4020          PASS



4.1.2 PASSING L EGITIMATE TRAFFIC UNDER EXTENDED ATTACK
This test is identical to 4.1.1, where the external interface of the device is exposed to a constant
stream of attacks over an extended period of time.

The device is expected to remain operational and stable throughout this test, and to pass most/all of
the legitimate traffic. If an excessive amount of legitimate traffic is blocked throughout this test -
caused by either the volume of traffic or the DUT failing for any reason - this will result in a FAIL.


 Product                   Result
 Palo Alto PA-4020          PASS




4.1.3 PROTOCOL FUZZING & MUTATION
This test stresses the protocol stacks of the DUT by exposing it to traffic from various protocol
randomizer and mutation tools. Several of the tools in this category are based on the ISIC test suite
and the BreakingPoint Stack Scrambler component.




Network Firewall Test Results – Palo Alto Networks PA-4020                                              11
©2011 NSS Labs, Inc. All rights reserved.
Traffic load is a maximum of 350Mbps and 60,000 packets per second (average packet size is 690
bytes). Results are presented as a PASS/FAIL - the device is expected to remain operational and
capable of detecting and blocking attacks throughout the test.

                          Result
 Product
 Palo Alto PA-4020         PASS


It is important to note that when a service or device to crashes it is most often due to a software
vulnerability. And while not all vulnerabilities can be exploited, most can. Therefore we urge vendors
whose devices failed this test to fix their devices at the earliest opportunity.


       NSS Labs considers a product to have failed this test if it becomes unstable and ―falls over‖ –
        crashing and not allowing any traffic to flow. In effect, the firewall becomes a doorstop and
        must be power-cycled to recover.
       NSS Labs considers a ―severe fail‖ if upon failure, all traffic is allowed to to pass through the
        firewall, or if the firewall itself is breached upon failure.




Network Firewall Test Results – Palo Alto Networks PA-4020                                            12
©2011 NSS Labs, Inc. All rights reserved.
5 TOTAL COST OF OWNERSHIP & VALUE
Firewall implementations can be complex projects with several factors affecting the overall cost of
deployment, maintenance and upkeep. All of these should be considered over the course of the useful
life of the solution.

    1. Fees paid to the vendor for the initial product and yearly maintenance
    2. Labor costs for installation, upkeep and tuning

No two network security products deliver the same security effectiveness or throughput, making
‗apples to apples‘ comparisons extremely difficult. In order to capture the relative value of devices on
the market and facilitate such comparisons, NSS Labs has developed a unique metric to enable value-
based comparisons:

         Price per protected megabit/sec = Cost / (security effectiveness * throughput).

Developed in 2009 by NSS Labs, this metric is used extensively in the sections below to evaluate cost
of security, throughput and 3-year TCO. The figures here are based on list prices provided by vendors.
NSS Labs clients can gain access to our TCO spreadsheets in order to customize comparisons based on
special-offer pricing.

5.1.1 LABOR PER PRODUCT (IN HOURS)
With the shortage of skilled and experienced practitioners, it is important to consider the required time
and resources to properly install, maintain and manage the solution. Failure to do so could result in
products not achieving their full security potential.

This table estimates the annual labor required to maintain each device. There are three main
components to be considered:

    1. Installation – the time required to take the device out of the box, configure it, put it into the
       network, apply updates and patches, initial tuning, and set up desired logging and reporting.
    2. Upkeep – the time required to apply periodic updates and patches from vendors, including
       hardware, software, and protection (signature/filter/rules) updates.

This table estimates the annual labor required to maintain each device. Since vendors sent their very
best engineers to tune, NSS Labs‘ assumptions are based upon the time required by a highly
experienced security engineer ($75 per hour fully loaded). This allowed us to hold the talent cost
variable constant and measure only the difference in time required to tune.

                      Product             Installation (Hrs)   Upkeep / Year (Hrs)

                      Palo Alto PA-4020           8                    25




Network Firewall Test Results – Palo Alto Networks PA-4020                                            13
©2011 NSS Labs, Inc. All rights reserved.
5.1.2 PURCHASE PRICE AND TOTAL C OST OF OWNERSHIP
TCO incorporates the labor costs for each product over three years as described above with the fees
paid to the vendor for purchase and maintenance licensing. Calculations are made as follows:


                     Value                     Description of Calculation
                                          Initial Purchase Price + Maintenance
                1 Year TCO
                                      + (Installation + Upkeep) * Labor rate ($/hr)
                2 Year TCO                              1 Year TCO
                                          + (Upkeep hours) * Labor rate ($/hr)
                                                        2 Year TCO
                3 Year TCO
                                          + (Upkeep hours) * Labor rate ($/hr)

Each vendor provided pricing information. When possible, we selected the 24/7 maintenance and
support option with 24-hour replacement as this is the option most organizations will select.

                                             Maintenance /
 Product                        Purchase                      1 Year TCO    2 Year TCO     3 Year TCO
                                                      year

 Palo Alto PA-4020                $35,000            $4,200      $41,675       $47,750         $53,825




5.1.3 THREE-YEAR TOTAL COST OF OWNERSHIP PER PROTECTED MBPS
The following table illustrates the relative cost per unit of work performed. This is helpful in
understanding value (Mbps of protected traffic). The least expensive product will not be the best value
if it does not block attacks nor provide sufficiently high throughput.


 Product                        Throughput              3 Year TCO           Price / Mbps-Protected
 Palo Alto PA-4020                 5,207                  $53,825                        $10

                                       FIGURE 6 - 3 YEAR TCO




Network Firewall Test Results – Palo Alto Networks PA-4020                                          14
©2011 NSS Labs, Inc. All rights reserved.
6 TEST SCORECARD
The following table lists the individual tests NSS Labs performed on each of the DUTs. Direct
references are provided to NSS Labs Test IDs from Sections 3 through 6 of NSS Labs‘ Firewall Test
Methodology v3.0.

      Test ID                                    Description
    3           Security Effectiveness
    3.1         Firewall Policy Enforcement
    3.1.1       Baseline Policy                                                        PASS
    3.1.2       Simple Policy                                                          PASS
    3.1.3       Complex Policy                                                         PASS
    3.1.4       Static NAT                                                             PASS
    3.1.5       Dynamic / Hide NAT                                                     PASS
    3.1.6       Syn Flood Protection                                                   PASS
    3.1.7       Address Spoofing Protection                                            PASS
    3.1.8       Session Hijacking Protection                                           PASS
    3.1.9       TCP Split Handshake                                                    PASS3
    4           Performance
    4.1         Raw Packet Processing Performance (UDP Traffic)                        Mbps
    4.1.1       128 Byte Packets                                                       7,300
    4.1.2       256 Byte Packets                                                       8,000
    4.1.3       512 Byte Packets                                                       8,000
    4.1.4       1024 Byte Packets                                                      8,000
    4.1.5       1514 Byte Packets                                                      8,000
    4.2         Latency - UDP
    4.2.1       128 Byte Packets                                                       12.5
    4.2.2       256 Byte Packets                                                       14.2
    4.2.3       512 Byte Packets                                                       17.5
    4.2.4       1024 Byte Packets                                                      23.5
    4.2.5       1514 Byte Packets                                                      31.0
    4.3         Maximum Capacity
    4.3.1       Theoretical Max. Concurrent TCP Connections                           523,000
    4.3.2       Theoretical Max. Concurrent TCP Connections w/Data                    505,000
    4.3.3       Stateful Protection at Max Concurrent Connections                       PASS
    4.3.4       Maximum TCP Connections Per Second                                     22,400
    4.3.5       Maximum HTTP Connections Per Second                                    21,600
    4.3.6       Maximum HTTP Transactions Per Second                                  158,000
    4.4         HTTP Capacity With No Transaction Delays
    4.4.1       2.500 Connections Per Second – 44Kbyte Response                       18,400
    4.4.2       5,000 Connections Per Second – 21Kbyte Response                       18,600
    4.4.3       10,000 Connections Per Second – 10Kbyte Response                      21,000
    4.4.4       20,000 Connections Per Second – 4.5Kbyte Response                     25,500
    4.4.5       40,000 Connections Per Second – 1.7Kbyte Response                     33,000
    4.5         ―Real World‖ Traffic
    4.5.1       ―Real World‖ Protocol Mix (Perimeter)                                  8,000
    4.5.2       ―Real World‖ Protocol Mix (Core)                                       3,900
    5           Stability & Reliability
    5.1         Blocking Under Extended Attack                                          Yes
    5.2         Passing Legitimate Traffic Under Extended Attack                        Yes




3
 Palo Alto originally failed the TCP Split Handshake, but issued update (4.0.2) on Monday April 18,
and NSS Labs has confirmed that they now block the attack.


Network Firewall Test Results – Palo Alto Networks PA-4020                                      15
©2011 NSS Labs, Inc. All rights reserved.
Test ID                                     Description
5.3           Protocol Fuzzing & Mutation                    Resilient
6             Total Cost of Ownership & Value
6.1           Ease of Use
6.1.1         Initial Setup (Hours)                              8
6.1.2         Time Required for Upkeep (Hours per Year)         25
6.2           Expected Costs
6.2.1         Initial Purchase                               $35,000
6.2.2         Ongoing Maintenance & Support (Annual)          $4,200
6.2.3         Installation Labor Cost (@$75/hr)                $600
6.2.4         Management Labor Cost (per Year @$75/hr)        $1,875
6.3           Total Cost of Ownership
6.3.1         Year 1                                         $41,675
6.3.2         Year 2                                          $6,075
6.3.3         Year 3                                          $6,075
6.3.4         3 Year Total Cost of Ownership                 $53,825




Network Firewall Test Results – Palo Alto Networks PA-4020               16
©2011 NSS Labs, Inc. All rights reserved.
APPENDIX A: SPECIAL THANKS
Special thanks go to our test infrastructure partners who provide much of the equipment, software,
and support that make this testing possible.




Network Firewall Test Results – Palo Alto Networks PA-4020                                     17
©2011 NSS Labs, Inc. All rights reserved.

More Related Content

What's hot

Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...Vishal Sharma, Ph.D.
 
2010-12 SCAP Explained
2010-12 SCAP Explained 2010-12 SCAP Explained
2010-12 SCAP Explained Raleigh ISSA
 
Junos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guideJunos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guidescottjohanson
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET Journal
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherLancope, Inc.
 
Mpole system introduction 2018
Mpole system introduction 2018Mpole system introduction 2018
Mpole system introduction 2018Guisun Han
 
ITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking DevicesITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking Devicesc3i
 
TuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineerTuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineerTuan Vu
 

What's hot (10)

Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
 
Testbed For Ids
Testbed For IdsTestbed For Ids
Testbed For Ids
 
2010-12 SCAP Explained
2010-12 SCAP Explained 2010-12 SCAP Explained
2010-12 SCAP Explained
 
Junos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guideJunos pulse-secure-access-service-dmi-solution-guide
Junos pulse-secure-access-service-dmi-solution-guide
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
IRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit FrameworkIRJET- A Study on Penetration Testing using Metasploit Framework
IRJET- A Study on Penetration Testing using Metasploit Framework
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
Mpole system introduction 2018
Mpole system introduction 2018Mpole system introduction 2018
Mpole system introduction 2018
 
ITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking DevicesITSAC 2011 SCAP for Inter-networking Devices
ITSAC 2011 SCAP for Inter-networking Devices
 
TuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineerTuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineer
 

Similar to Nss labs-report-Palo_Alto_Networks-2011

Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10Usman Arif
 
Sdwan comp 2018
Sdwan comp 2018Sdwan comp 2018
Sdwan comp 2018dborsan
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013juliankanarek
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Ifthekharul Islam
 
Download PCNSE Dumps PDF - Pass4sureClub.com
Download PCNSE Dumps PDF - Pass4sureClub.comDownload PCNSE Dumps PDF - Pass4sureClub.com
Download PCNSE Dumps PDF - Pass4sureClub.comllise7401
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_altoGreg Hanchin
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)chhoup
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Analyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsAnalyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsLarry Suto
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architectureFeras Ajjawi
 
Mahesh_Uttaradi_WLAN_SQA
Mahesh_Uttaradi_WLAN_SQAMahesh_Uttaradi_WLAN_SQA
Mahesh_Uttaradi_WLAN_SQAMahesh Uttaradi
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Anand Raj
 

Similar to Nss labs-report-Palo_Alto_Networks-2011 (20)

Fact vs-hype top10
Fact vs-hype top10Fact vs-hype top10
Fact vs-hype top10
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sdwan comp 2018
Sdwan comp 2018Sdwan comp 2018
Sdwan comp 2018
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
 
Download PCNSE Dumps PDF - Pass4sureClub.com
Download PCNSE Dumps PDF - Pass4sureClub.comDownload PCNSE Dumps PDF - Pass4sureClub.com
Download PCNSE Dumps PDF - Pass4sureClub.com
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
Analyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsAnalyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application Firewalls
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architecture
 
CV Steve Shawcross
CV Steve ShawcrossCV Steve Shawcross
CV Steve Shawcross
 
Mahesh_Uttaradi_WLAN_SQA
Mahesh_Uttaradi_WLAN_SQAMahesh_Uttaradi_WLAN_SQA
Mahesh_Uttaradi_WLAN_SQA
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
Ema best practices_for_utilizing_network_monitoring_switches_in_cisco_environ...
 

More from He Hariyadi

Pcdvpcu en ex9200-customer-presentation-1
Pcdvpcu en ex9200-customer-presentation-1Pcdvpcu en ex9200-customer-presentation-1
Pcdvpcu en ex9200-customer-presentation-1He Hariyadi
 
Nutanix vdi workshop presentation
Nutanix vdi workshop presentationNutanix vdi workshop presentation
Nutanix vdi workshop presentationHe Hariyadi
 
Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access SolutionIntroducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access SolutionHe Hariyadi
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesHe Hariyadi
 
Extreme networks-pbt2034
Extreme networks-pbt2034Extreme networks-pbt2034
Extreme networks-pbt2034He Hariyadi
 
Fabric Arch Compet
Fabric Arch CompetFabric Arch Compet
Fabric Arch CompetHe Hariyadi
 

More from He Hariyadi (6)

Pcdvpcu en ex9200-customer-presentation-1
Pcdvpcu en ex9200-customer-presentation-1Pcdvpcu en ex9200-customer-presentation-1
Pcdvpcu en ex9200-customer-presentation-1
 
Nutanix vdi workshop presentation
Nutanix vdi workshop presentationNutanix vdi workshop presentation
Nutanix vdi workshop presentation
 
Introducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access SolutionIntroducing ACX Series and the Universal Access Solution
Introducing ACX Series and the Universal Access Solution
 
Application usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countriesApplication usage risk_report_2011-05-countries
Application usage risk_report_2011-05-countries
 
Extreme networks-pbt2034
Extreme networks-pbt2034Extreme networks-pbt2034
Extreme networks-pbt2034
 
Fabric Arch Compet
Fabric Arch CompetFabric Arch Compet
Fabric Arch Compet
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Nss labs-report-Palo_Alto_Networks-2011

  • 1. NETWORK FIREWALL INDIVIDUAL TEST RESULTS PALO ALTO NETWORKS PA-4020 APRIL 2011 METHODOLOGY VERSION: 3.0 Licensed to: Purchaser (Single-User, INTERNAL USE ONLY) To receive a licensed copy or report misuse, please contact NSS Labs at: +1 (760) 270-9852 or advisor@nsslabs.com.
  • 2. ©2011 NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader‘s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY THE NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader‘s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. CONTACT INFORMATION NSS Labs, Inc. P.O. Box 130573 Carlsbad, CA 92013 USA +1 (760) 270-9852 info@nsslabs.com www.nsslabs.com Network Firewall Test Results – Palo Alto Networks PA-4020 ©2011 NSS Labs, Inc. All rights reserved.
  • 3. TABLE OF CONTENTS 1 Introduction ................................................................................ 1 1.1 The Need for Firewalls ...................................................................... 1 1.2 Product Summary ............................................................................. 1 1.3 About NSS Labs................................................................................. 2 2 Security Effectiveness .................................................................. 3 2.1 Firewall Policy Enforcement .............................................................. 3 3 Performance ................................................................................ 7 4 Stability & Reliability ................................................................. 11 5 Total Cost of Ownership & Value ................................................ 13 6 Test Scorecard ........................................................................... 15 Appendix A: Special Thanks ............................................................ 17 Network Firewall Test Results – Palo Alto Networks PA-4020 ©2011 NSS Labs, Inc. All rights reserved.
  • 4. TABLE OF FIGURES Figure 1: Rated Throughput (MBPS) ........................................................................................... 7 Figure 2: Maximum Concurrent Connections vs. HTTP Transactions & TCP Connections per Second .... 8 Figure 3: Maximum HTTP Connections per Second with Various Size Payloads ................................. 9 Figure 4: Maximum Throughput (MBPS) with Various Size Payloads ............................................... 9 Figure 5: UDP Throughput (MBPS) ............................................................................................10 Figure 6: 3 year TCO ...............................................................................................................14 Network Firewall Test Results – Palo Alto Networks PA-4020 ©2011 NSS Labs, Inc. All rights reserved.
  • 5. 1 INTRODUCTION 1.1 THE NEED FOR FIREWALLS Firewall technology has been around for at least 25 years, and has undergone several stages of development; from early packet and circuit firewalls to application layer and dynamic packet firewalls. Across these stages, the goal has continued to be to provide a protective barrier between internal and external networks, while allowing for productive communications to pass from one side to the other. In order to establish a secure perimeter, a basic network firewall must provide granular control based upon the source and destination IP Addresses and ports. As firewalls will be deployed at critical choke- points in the network, the stability and reliability of a firewall is imperative. And it must not degrade network performance or it will never be installed. The following capabilities are considered essential as part of a firewall:  Basic packet filtering  Stateful multi-layer inspection  Network Address Translation (NAT)  Highly Stable  Ability to operate at layer 3 NSS Labs‘ test reports are designed to address the challenges faced by IT professionals in selecting and managing security products. The scope of this report is focused on:  Security effectiveness  Performance  Stability  Total Cost of Ownership (TCO) 1.2 PRODUCT SUMMARY During Q1 2011, NSS Labs performed the industry‘s most rigorous test of leading network firewall solutions. This report has been produced for our enterprise subscribers, as part of NSS Labs‘ independent testing information services. Leading vendors were invited to participate fully at no cost, and NSS Labs received no vendor funding. As part of our Network Firewall Group Test, Palo Alto Networks submitted the Palo Alto Networks PA- 4020. NSS Labs’ Rating: Recommended Max UDP NSS Labs Rated Product Throughput Throughput PA-4020 8,000 Mbps 5,207 Mbps Palo Alto Networks is a new entrant in the firewall category, focusing primarily on the Next-Gen firewall market. The PA-4020 has been rated by Palo Alto as a 2 Gbps firewall, a very conservative number based upon NSS Labs rating of 5,207 Mbps. Network Firewall Test Results – Palo Alto Networks PA-4020 1 ©2011 NSS Labs, Inc. All rights reserved.
  • 6. The PA-4030 was one of only three products that was able to withstand our stability test and remain functional. However, it failed to properly handle TCP Split Handshake attack. Update: Palo Alto issued update (4.0.2) on Monday April 18, and NSS Labs has confirmed that they now block the attack. As a result, we have upgraded the PA-4020 to Recommended. Palo Alto Networks customers should update at the earliest opportunity. 1.3 ABOUT NSS L ABS NSS Labs, Inc. is the world‘s leading independent information security research and testing organization. Its expert analyses provide information technology professionals with the unbiased data they need to select the right product for their organizations. Pioneering intrusion detection and prevention system testing with the publication of the first such test criteria in 2001, NSS Labs also evaluates firewall, unified threat management, anti-malware, encryption, web application firewall, and other technologies on a regular basis. The firm‘s real-world test methodology is the only one to assess security products against live Internet threats. NSS Labs tests are considered the most aggressive in the industry and its recommendations are highly regarded by enterprises. Founded in 1991, the company has offices in Carlsbad, California and Austin, Texas. Network Firewall Test Results – Palo Alto Networks PA-4020 2 ©2011 NSS Labs, Inc. All rights reserved.
  • 7. 2 SECURITY EFFECTIVENESS This section verifies that the Device Under Test (DUT) is capable of enforcing a specified security policy effectively. NSS Labs‘ firewall analysis is conducted by incrementally building upon a baseline configuration (simple routing with no policy restrictions and no content inspection) to a complex real world multiple zone configuration supporting many addressing modes, policies, applications, and inspection engines. At each level of complexity, test traffic is passed across the firewall to ensure that only specified traffic is allowed and the rest is denied, and that appropriate log entries are recorded. The firewall must support stateful firewalling either by managing state tables to prevent ―traffic leakage‖ or as a stateful proxy. The ability to manage firewall policy across multiple interfaces/zones is a required. At a minimum, the firewall must provide a ―trusted‖ internal interface, an ―untrusted‖ external/Internet interface, and (optionally) one or more DMZ interfaces. In addition, a dedicated management interface (virtual or otherwise) is preferred. 2.1 FIREWALL POLICY ENFORCEMENT Policies are rules that are configured on a firewall to permit or deny access from one network resource to another based on identifying criteria such as: source, destination, and service. A term typically used to define the demarcation point of a network where policy is applied is a demilitarized zone (DMZ). Policies are typically written to permit or deny network traffic from one or more of the following zones:  Untrusted – This is typically an external network and is considered to be an unknown and non-secure. An example of an untrusted network would be the Internet.  DMZ – This is a network that is being isolated by the firewall restricting network traffic to and from hosts contained within the isolated network.  Trusted – This is typically an internal network; a network that is considered secure and protected. The NSS Labs Firewall certification tests performance and the ability to enforce policy between the following:  Trusted to Untrusted  Untrusted to DMZ Trusted to DMZNote: Firewalls must provide at a minimum one DMZ interface in order to provide a DMZ or ―transition point‖ between untrusted and trusted networks. Network Firewall Test Results – Palo Alto Networks PA-4020 3 ©2011 NSS Labs, Inc. All rights reserved.
  • 8. 2.1.1 BASELINE POLICY Routed configuration with an ―allow all‖ policy Product Result Palo Alto PA-4020 PASS 2.1.2 SIMPLE POLICIES Simple outbound and inbound policies allowing basic browsing and e-mail access for internal clients and no external access Product Result Palo Alto PA-4020 PASS 2.1.3 COMPLEX POLICIES Complex outbound and inbound policies consisting of many rules, objects, and services. Product Result Palo Alto PA-4020 PASS 2.1.4 STATIC NAT (NETWORK ADDRESS TRANSLATION ) Inbound Network Address Translation (NAT) to DMZ using fixed IP address translation with one-to-one mapping. Product Result Palo Alto PA-4020 PASS 2.1.5 DYNAMIC/HIDE NAT (NETWORK ADDRESS TRANSLATION ) Outbound Network Address Translation (NAT) (from Internal to External) where all outbound traffic ―hides‖ behind the IP Address of the External Interface of the Firewall utilizing a pool of high ports to manage multiple connections. Product Result Palo Alto PA-4020 PASS 2.1.6 SYN FLOOD PROTECTION The basis of a SYN Flood attack is to not complete the 3-way handshake necessary to establish communication. Specifically the attacker (client machine A in fig. 6) refusing to send the ACK signal to the host server (B) after receiving the SYN/ACK from Host B. Such a connection is called a half open connection. Network Firewall Test Results – Palo Alto Networks PA-4020 4 ©2011 NSS Labs, Inc. All rights reserved.
  • 9. Instead of sending an ACK, attacker A sends another SYN signal to the victim server. The server again acknowledges it with a SYN/ACK and B again refuses to send the final ACK signal. By repeating this several times the attacker tries to overflow the data structure of the host server. The data structure is built in the memory of the host server with the purpose of keeping records of connections to be completed (or half open connections). Since the data structure is of a finite size, it is possible to overflow it by establishing a large number of open connections. Once overflow occurs the host server will not be able to accept new connections thus resulting in a denial of service. There is however a time-out associated with each of the connections (approximately 3 minutes) after which the host server will automatically drop the half open connections and can start accepting new connections. If the attacker can request connections at a rate higher than the victim servers ability to expire the pending connections then it is possible to crash the server. Thus the objective of SYN flooding is to disable one side of the TCP connection which will result in one or more of the following:  The server is unable to accept new connections.  The server crashes or becomes inoperative.  Authorization between servers is impaired. The firewall is expected to protect against SYN Floods. Product Result Palo Alto PA-4020 PASS 2.1.7 IP ADDRESS SPOOFING This test attempts to confuse the firewall into allowing traffic to pass from one network segment to another. Each IP packet header contains the source and destination address of the packet. The source address is normally the address that the packet was sent from. By forging the header so it contains a different source address, an attacker can make it appear that the packet was sent by a different (trusted) machine. The machine that receives spoofed packets will send response back to the forged source address. Network Firewall Test Results – Palo Alto Networks PA-4020 5 ©2011 NSS Labs, Inc. All rights reserved.
  • 10. The firewall is expected to protect against IP Address spoofing. Product Result Palo Alto PA-4020 PASS 2.1.8 TCP SPLIT HANDSHAKE SPOOF This test attempts to confuse the Firewall into allowing traffic to pass from one network segment to another. The TCP Split handshake blends features of both the three way handshake and the simultaneous-open connection. The result is a TCP Spoof that allows an attacker to bypass the firewall by having the attacker instruct the target to ―initiate‖ the session back with the attacker. Popular TCP/IP networking stacks respect this handshaking method, including Microsoft, Apple, and Linux stacks, with no modification.1 TCP spoofing attacks have been around for years, and presumed ―cured‖ by modern firewalls. What makes this particular attack different is that it targets the client. The firewall is expected to protect against TCP Split Handshake spoofing. Original Result Updated Result Product (April 20, 2011) Palo Alto PA-4020 FAIL PASS2 1 The TCP Split Handshake: Practical Effects on Modern Network Equipment, Tod Alien Beardsley & Jin Qian, http://www.macrothink.org/journal/index.php/npa/article/view/285 2 Palo Alto issued update (4.0.2) on Monday April 18, and NSS Labs has confirmed that they now block the attack. Network Firewall Test Results – Palo Alto Networks PA-4020 6 ©2011 NSS Labs, Inc. All rights reserved.
  • 11. 3 PERFORMANCE NSS Labs collected extensive performance metrics during this test, according to our established methodology. The volumes of data produced by these tests are designed to capture maximum capacities or ―the edge of performance‖ that may be obtainable for a given metric. In addition, our real-world traffic mix testing methods enable us to more accurately estimate the performance users can expect in their environments. Due to space considerations and the number of different products, we have summarized some of the most important figures that a network administrator should consider when sizing a deployment. 3.1.1 RATED THROUGHPUT NSS Labs rates product performance based upon the average of three traffic types: 21KB HTTP response traffic, a mix of perimeter traffic common in enterprises, and a mix of internal ―core‖ traffic common in enterprises. Details of these traffic mixes are available in the Firewall Test Methodology. Palo Alto PA-4020 5,207 0 1,000 2,000 3,000 4,000 5,000 6,000 FIGURE 1: RATED THROUGHPUT (MBPS) 3.1.2 CONNECTION DYNAMICS Beyond overall throughput of the device, connection dynamics can play an important role in sizing a security device that will not unduly impede the performance of a system or an application. Maximum Connection and transaction rates help size a device more accurately than simply looking at throughput. By knowing the maximum connections per second, it possible to predict maximum throughput based upon the traffic mix in a given enterprise environment. For example, if the device maximum HTTP CPS is 2,000, and average traffic size is 44KB such that 2,500 CPS = 1Gbps, then the tested device will achieve a maximum of 800 Mbps ((2,000/2,500) x 1,000 Mbps)) = 800 Mbps. Following is a subset of figures from our performance tests. The aim of these tests is to stress the device and determine how it copes with large numbers of TCP connections per second, application layer transactions per second, and concurrent open connections. All packets contain valid payload and address data and these tests provide an excellent representation of a live network at various connection/transaction rates. Network Firewall Test Results – Palo Alto Networks PA-4020 7 ©2011 NSS Labs, Inc. All rights reserved.
  • 12. Note that in all tests, the following critical ―breaking points‖—where the final measurements are taken—are used: Excessive concurrent TCP connections - latency within the firewall is causing unacceptable increase in open connections on the server-side. Excessive response time for HTTP transactions/SMTP sessions - latency within the firewall is causing excessive delays and increased response time to the client. Unsuccessful HTTP transactions sessions – normally, there should be zero unsuccessful transactions. Once these appear, it is an indication that excessive latency within the firewall is causing connections to time out. Maximum Capacity Theoretical Max. Maximum TCP Maximum HTTP Concurrent TCP Connections Per Transactions Per Product Connections w/Data Second Second Palo Alto PA-4020 523,000 22,400 158,000 The following chart depicts the relationship between the maximum concurrent connections and the number of HTTP transactions per second that can be transmitted and received through the device. 600,000 Palo Alto PA-4020 500,000 400,000 300,000 200,000 100,000 - - 20,000 40,000 60,000 80,000 100,000 120,000 140,000 160,000 180,000 FIGURE 2: MAXIMUM CONCURRENT CONNECTIONS VS. HTTP TRANSACTIONS & TCP CONNECTIONS PER SECOND 3.1.3 MAXIMUM HTTP CAPACITY These tests aim to stress the HTTP detection engine in order to determine how the sensor copes with detecting and blocking exploits under network loads of varying average packet size and varying connections per second. By creating genuine session-based traffic with varying session lengths, the sensor is forced to track valid TCP sessions, thus ensuring a higher workload than for simple packet- based background traffic. Network Firewall Test Results – Palo Alto Networks PA-4020 8 ©2011 NSS Labs, Inc. All rights reserved.
  • 13. 35,000 30,000 25,000 HTTP CPS 20,000 15,000 10,000 5,000 - 44KB 21KB 10KB 4.5KB 1.7KB Palo Alto PA-4020 18,400 18,600 21,000 25,500 33,000 FIGURE 3: MAXIMUM HTTP CONNECTIONS PER SECOND WITH VARIOUS SIZE PAYLOADS Each transaction consists of a single HTTP GET request and there are no transaction delays (i.e. the web server responds immediately to all requests). All packets contain valid payload (a mix of binary and ASCII objects) and address data. This test provides an excellent representation of a live network (albeit one biased towards HTTP traffic) at various network loads. 8,000 7,000 6,000 5,000 Mbps 4,000 3,000 2,000 1,000 - 44KB 21KB 10KB 4.5KB 1.7KB Palo Alto PA-4020 7,360 3,720 2,100 1,275 825 FIGURE 4: MAXIMUM THROUGHPUT (MBPS) WITH VARIOUS SIZE PAYLOADS 3.1.4 RAW PACKET PROCESSING PERFORMANCE (UDP T RAFFIC) The aim of this test is purely to determine the raw packet processing capability of each in-line port pair of the device. It is not real world, and can be misleading. It is included here primarily for legacy purposes. Network Firewall Test Results – Palo Alto Networks PA-4020 9 ©2011 NSS Labs, Inc. All rights reserved.
  • 14. This traffic does not attempt to simulate any form of ―real-world‖ network condition. No TCP sessions are created during this test, and there is very little protocol or content analysis to perform. 8,200 8,000 7,800 7,600 Mbps 7,400 7,200 7,000 6,800 128 256 512 1024 1514 Palo Alto PA-4020 7,300 8,000 8,000 8,000 8,000 FIGURE 5: UDP THROUGHPUT (MBPS) Network Firewall Test Results – Palo Alto Networks PA-4020 10 ©2011 NSS Labs, Inc. All rights reserved.
  • 15. 4 STABILITY & RELIABILITY Long term stability is particularly important for an in-line device, where failure can produce network outages. These tests verify the stability of the DUT along with its ability to maintain security effectiveness while under normal load and while passing malicious traffic. Products that are not able to sustain legitimate traffic (or crash) while under hostile attack will not pass. The DUT is required to remain operational and stable throughout these tests, and to block 100 per cent of previously blocked traffic, raising an alert for each. If any non-allowed traffic passes successfully - caused by either the volume of traffic or the DUT failing to bypass for any reason - this will result in a FAIL. 4.1.1 BLOCKING UNDER EXTENDED ATTACK The DUT is exposed to a constant stream of security policy violations over an extended period of time. The device is configured to block and alert, and thus this test provides an indication the effectiveness of both the blocking and alert handling mechanisms. A continuous stream of security policy violations mixed with legitimate traffic is transmitted through the device at a maximum of 100Mbps (max 50,000 packets per second, average packet sizes in the range of 120-350 bytes) for 8 hours with no additional background traffic. This is not intended as a stress test in terms of traffic load (covered in the previous section) - merely a reliability test in terms of consistency of blocking performance. The device is expected to remain operational and stable throughout this test, and to block 100 per cent of recognizable violations, raising an alert for each. If any recognizable policy violations are passed - caused by either the volume of traffic or the sensor failing open for any reason - this will result in a FAIL. Product Result Palo Alto PA-4020 PASS 4.1.2 PASSING L EGITIMATE TRAFFIC UNDER EXTENDED ATTACK This test is identical to 4.1.1, where the external interface of the device is exposed to a constant stream of attacks over an extended period of time. The device is expected to remain operational and stable throughout this test, and to pass most/all of the legitimate traffic. If an excessive amount of legitimate traffic is blocked throughout this test - caused by either the volume of traffic or the DUT failing for any reason - this will result in a FAIL. Product Result Palo Alto PA-4020 PASS 4.1.3 PROTOCOL FUZZING & MUTATION This test stresses the protocol stacks of the DUT by exposing it to traffic from various protocol randomizer and mutation tools. Several of the tools in this category are based on the ISIC test suite and the BreakingPoint Stack Scrambler component. Network Firewall Test Results – Palo Alto Networks PA-4020 11 ©2011 NSS Labs, Inc. All rights reserved.
  • 16. Traffic load is a maximum of 350Mbps and 60,000 packets per second (average packet size is 690 bytes). Results are presented as a PASS/FAIL - the device is expected to remain operational and capable of detecting and blocking attacks throughout the test. Result Product Palo Alto PA-4020 PASS It is important to note that when a service or device to crashes it is most often due to a software vulnerability. And while not all vulnerabilities can be exploited, most can. Therefore we urge vendors whose devices failed this test to fix their devices at the earliest opportunity.  NSS Labs considers a product to have failed this test if it becomes unstable and ―falls over‖ – crashing and not allowing any traffic to flow. In effect, the firewall becomes a doorstop and must be power-cycled to recover.  NSS Labs considers a ―severe fail‖ if upon failure, all traffic is allowed to to pass through the firewall, or if the firewall itself is breached upon failure. Network Firewall Test Results – Palo Alto Networks PA-4020 12 ©2011 NSS Labs, Inc. All rights reserved.
  • 17. 5 TOTAL COST OF OWNERSHIP & VALUE Firewall implementations can be complex projects with several factors affecting the overall cost of deployment, maintenance and upkeep. All of these should be considered over the course of the useful life of the solution. 1. Fees paid to the vendor for the initial product and yearly maintenance 2. Labor costs for installation, upkeep and tuning No two network security products deliver the same security effectiveness or throughput, making ‗apples to apples‘ comparisons extremely difficult. In order to capture the relative value of devices on the market and facilitate such comparisons, NSS Labs has developed a unique metric to enable value- based comparisons: Price per protected megabit/sec = Cost / (security effectiveness * throughput). Developed in 2009 by NSS Labs, this metric is used extensively in the sections below to evaluate cost of security, throughput and 3-year TCO. The figures here are based on list prices provided by vendors. NSS Labs clients can gain access to our TCO spreadsheets in order to customize comparisons based on special-offer pricing. 5.1.1 LABOR PER PRODUCT (IN HOURS) With the shortage of skilled and experienced practitioners, it is important to consider the required time and resources to properly install, maintain and manage the solution. Failure to do so could result in products not achieving their full security potential. This table estimates the annual labor required to maintain each device. There are three main components to be considered: 1. Installation – the time required to take the device out of the box, configure it, put it into the network, apply updates and patches, initial tuning, and set up desired logging and reporting. 2. Upkeep – the time required to apply periodic updates and patches from vendors, including hardware, software, and protection (signature/filter/rules) updates. This table estimates the annual labor required to maintain each device. Since vendors sent their very best engineers to tune, NSS Labs‘ assumptions are based upon the time required by a highly experienced security engineer ($75 per hour fully loaded). This allowed us to hold the talent cost variable constant and measure only the difference in time required to tune. Product Installation (Hrs) Upkeep / Year (Hrs) Palo Alto PA-4020 8 25 Network Firewall Test Results – Palo Alto Networks PA-4020 13 ©2011 NSS Labs, Inc. All rights reserved.
  • 18. 5.1.2 PURCHASE PRICE AND TOTAL C OST OF OWNERSHIP TCO incorporates the labor costs for each product over three years as described above with the fees paid to the vendor for purchase and maintenance licensing. Calculations are made as follows: Value Description of Calculation Initial Purchase Price + Maintenance 1 Year TCO + (Installation + Upkeep) * Labor rate ($/hr) 2 Year TCO 1 Year TCO + (Upkeep hours) * Labor rate ($/hr) 2 Year TCO 3 Year TCO + (Upkeep hours) * Labor rate ($/hr) Each vendor provided pricing information. When possible, we selected the 24/7 maintenance and support option with 24-hour replacement as this is the option most organizations will select. Maintenance / Product Purchase 1 Year TCO 2 Year TCO 3 Year TCO year Palo Alto PA-4020 $35,000 $4,200 $41,675 $47,750 $53,825 5.1.3 THREE-YEAR TOTAL COST OF OWNERSHIP PER PROTECTED MBPS The following table illustrates the relative cost per unit of work performed. This is helpful in understanding value (Mbps of protected traffic). The least expensive product will not be the best value if it does not block attacks nor provide sufficiently high throughput. Product Throughput 3 Year TCO Price / Mbps-Protected Palo Alto PA-4020 5,207 $53,825 $10 FIGURE 6 - 3 YEAR TCO Network Firewall Test Results – Palo Alto Networks PA-4020 14 ©2011 NSS Labs, Inc. All rights reserved.
  • 19. 6 TEST SCORECARD The following table lists the individual tests NSS Labs performed on each of the DUTs. Direct references are provided to NSS Labs Test IDs from Sections 3 through 6 of NSS Labs‘ Firewall Test Methodology v3.0. Test ID Description 3 Security Effectiveness 3.1 Firewall Policy Enforcement 3.1.1 Baseline Policy PASS 3.1.2 Simple Policy PASS 3.1.3 Complex Policy PASS 3.1.4 Static NAT PASS 3.1.5 Dynamic / Hide NAT PASS 3.1.6 Syn Flood Protection PASS 3.1.7 Address Spoofing Protection PASS 3.1.8 Session Hijacking Protection PASS 3.1.9 TCP Split Handshake PASS3 4 Performance 4.1 Raw Packet Processing Performance (UDP Traffic) Mbps 4.1.1 128 Byte Packets 7,300 4.1.2 256 Byte Packets 8,000 4.1.3 512 Byte Packets 8,000 4.1.4 1024 Byte Packets 8,000 4.1.5 1514 Byte Packets 8,000 4.2 Latency - UDP 4.2.1 128 Byte Packets 12.5 4.2.2 256 Byte Packets 14.2 4.2.3 512 Byte Packets 17.5 4.2.4 1024 Byte Packets 23.5 4.2.5 1514 Byte Packets 31.0 4.3 Maximum Capacity 4.3.1 Theoretical Max. Concurrent TCP Connections 523,000 4.3.2 Theoretical Max. Concurrent TCP Connections w/Data 505,000 4.3.3 Stateful Protection at Max Concurrent Connections PASS 4.3.4 Maximum TCP Connections Per Second 22,400 4.3.5 Maximum HTTP Connections Per Second 21,600 4.3.6 Maximum HTTP Transactions Per Second 158,000 4.4 HTTP Capacity With No Transaction Delays 4.4.1 2.500 Connections Per Second – 44Kbyte Response 18,400 4.4.2 5,000 Connections Per Second – 21Kbyte Response 18,600 4.4.3 10,000 Connections Per Second – 10Kbyte Response 21,000 4.4.4 20,000 Connections Per Second – 4.5Kbyte Response 25,500 4.4.5 40,000 Connections Per Second – 1.7Kbyte Response 33,000 4.5 ―Real World‖ Traffic 4.5.1 ―Real World‖ Protocol Mix (Perimeter) 8,000 4.5.2 ―Real World‖ Protocol Mix (Core) 3,900 5 Stability & Reliability 5.1 Blocking Under Extended Attack Yes 5.2 Passing Legitimate Traffic Under Extended Attack Yes 3 Palo Alto originally failed the TCP Split Handshake, but issued update (4.0.2) on Monday April 18, and NSS Labs has confirmed that they now block the attack. Network Firewall Test Results – Palo Alto Networks PA-4020 15 ©2011 NSS Labs, Inc. All rights reserved.
  • 20. Test ID Description 5.3 Protocol Fuzzing & Mutation Resilient 6 Total Cost of Ownership & Value 6.1 Ease of Use 6.1.1 Initial Setup (Hours) 8 6.1.2 Time Required for Upkeep (Hours per Year) 25 6.2 Expected Costs 6.2.1 Initial Purchase $35,000 6.2.2 Ongoing Maintenance & Support (Annual) $4,200 6.2.3 Installation Labor Cost (@$75/hr) $600 6.2.4 Management Labor Cost (per Year @$75/hr) $1,875 6.3 Total Cost of Ownership 6.3.1 Year 1 $41,675 6.3.2 Year 2 $6,075 6.3.3 Year 3 $6,075 6.3.4 3 Year Total Cost of Ownership $53,825 Network Firewall Test Results – Palo Alto Networks PA-4020 16 ©2011 NSS Labs, Inc. All rights reserved.
  • 21. APPENDIX A: SPECIAL THANKS Special thanks go to our test infrastructure partners who provide much of the equipment, software, and support that make this testing possible. Network Firewall Test Results – Palo Alto Networks PA-4020 17 ©2011 NSS Labs, Inc. All rights reserved.