NSS Group logo

Radware DefensePro-3000 V2.43

Executive Summary

Radware offers a range of DefensePro appliances from 200Mbps to 3Gbps throughput. The DefensePro-3000 is based on a layer 7 switching architecture, providing a high port density appliance, with protection for up to 11 segments in a single box, enabling multi-Gigabit protection across multiple network segments with a single device.  

The DefensePro appliance performs bi-directional, stateful, deep packet inspection and hardware-accelerated signature matching to block intrusions. Dynamic traffic shaping ensures the continuity of mission critical applications by controlling end-to-end bandwidth to guarantee service levels. It also controls the bandwidth usage of various applications such as P2P, e-mail, Web, DNS, ERP, CRM and more

Overall, the performance of DefensePro is very good. Although recognition rates and resistance to false positives could be improved, throughput and latency are excellent under almost all network loads and across all packet sizes. We also found DefensePro to be very stable, surviving our extended reliability tests without missing a beat, and without blocking any legitimate traffic or succumbing to common evasion techniques. 

The device can be managed via a command-line interface (CLI), a basic Web-based management (WBM) utility, or via the more extensive Configware Insite (CWIS). All configuration and log capabilities are supported by all management options. When using CWIS, management, alert handling and reporting are relatively restricted, with no central policy deployment and limited alert handling capabilities. A new version is under development with more extensive reporting capabilities. 

Architecture

There are four main components to the Radware DefensePro system: 

  • DefensePro Appliance
  • Web-Based Management (WBM) interface
  • Command Line Interface (CLI)
  • Configware Insite central management system (CWIS) 

The DefensePro appliances can be managed via CLI, WBM or CWIS (or a mixture of the three), using standard and secure communication channels: Telnet or SSH, HTTP or HTTPS and SNMP V1, 2C and 3. All configuration and log capabilities are supported by all management options.

DefensePro

The DefensePro appliance is offered in three different models: 

  • DefensePro-3000 - Designed for deployment at the core of large enterprise networks, data centres and carrier links. This device offers a maximum of 3Gbps throughput, with protection for up to three Gigabit Ethernet segments and eight Fast Ethernet segments
  • DefensePro-1000 - Designed for deployment at the core of enterprise networks and data centres. This device offers a maximum of 1Gbps throughput, with protection for up to two Gigabit Ethernet segments and eight Fast Ethernet segments
  • DefensePro-200 - Designed for deployment at the enterprise perimeter. This devices offers a maximum of 200Mbps throughput, with protection for up to two Gigabit Ethernet segments and eight Fast Ethernet segments. 

The device submitted for testing was the DefensePro-3000. Based on a layer 7 switch, this is a 1U appliance which sports 7 fibre Gigabit ports and 16 copper Fast Ethernet ports on the front panel. Management can be via any of the detection ports, or via the dedicated serial console port. 

There is no redundancy built in to the device (other than dual power supplies), and nor is there any High Availability solution on offer at present. Radware does, however, offer optional copper and fibre bypass devices to allow traffic to pass unimpeded should the DefensePro appliance fail. 


Figure 1 - DefensePro: Hardware architecture

Inside the appliance is 512MB of RAM, together with the four main components of the DefensePro hardware architecture: 

  • Switching Fabric and Switching ASICs
  • Network Processors
  • StringMatch Engine
  • Power PC RISC Processor  

44 Gbps Switching Fabric

DefensePro’s non-blocking 44 Gigabit backplane is based on a multi-layered distributed switching architecture using ASICs that ensure wire speed switching for the seven Gigabit ports and 16 Fast Ethernet ports. 

Network Processors

The two network processors work in parallel and are capable of processing multiple packets simultaneously to provide accelerated layer 4-7 security switching. Between them they handle all tasks related to packet processing - including traffic forwarding and blocking, traffic shaping, and delayed binding for protection against SYN flooding - all at multi-Gigabit speeds.  

Prevention of Denial of Service attacks and SYN floods can be performed at a rate of up to 1 million SYNs per second. Detection and protection against layer 4 exploits is completed by the network processors and helps boost the performance when protecting against these type of exploits.

If deeper packet inspection is required (i.e. layer 7 scanning), then packets are forwarded to the StringMatch Engine - a dedicated hardware card designed specifically to provide accelerated signature and pattern matching - for signature identification. Based on the StringMatch pattern matching result, which determines whether the packet is legitimate or part of a malicious attack, the network processor either forwards the packet or drops it and resets the session.  

In addition to cleaning all suspect traffic, the network processors enable end-to-end traffic shaping, managing bandwidth allocation to ensure continuous service levels for all secure traffic, guaranteeing the continuity and QoS of mission critical applications even under attack.

Radware StringMatch Engine

The Radware StringMatch Engine is a dedicated hardware card designed specifically to provide accelerated deep packet inspection and signature matching. The StringMatch Engine consists of up to 8 ASICs, enabling 256,000 parallel string searches, and a high end Power PC RISC processor for scheduling and running the parallel search algorithms. Theoretically, the StringMatch engine provides 9 Gigabits of free-range searches and 16 Gigabits of fixed offset searches for unmatched performance.  


Figure 2 - DefensePro: Web-Based Management

CPU

DefensePro sports a 1GHz RISC processor Motorola PPC 7457 to manage and prioritise all security sessions.  

The CPU identifies all current attacks and controls active operations across the StringMatch Engine and the Network processors to isolate, block and prevent attacks, while overseeing all security updates and networking requirements.

Web-Based Management Interface

Each DefensePro appliance can be managed directly via a Web-Based Management (WBM) interface running on the built-in Web server.  

This provides access to all the main management, configuration, and alert handling functions via a browser-based GUI which can be used to connect to, and manage, a single device at a time. 

Command Line Interface (CLI)

A text-based CLI is provided for direct management via the serial console or Telnet/SSH connections.

All configuration operations can be performed via the CLI, including attacks filter creation, policy configurations, etc. Reports are also available for CLI users, including top attack reports and detailed event logs. 

Configware Insite

Configware Insite is a Java-based site-wide SNMP software management tool that is designed to enable unified administration, visibility and control of IP application performance and security across the enterprise.  


Figure 3 - DefensePro: Configware Insite

Based on an easy-to-use site map interface, Configware Insite allows the administrator to draw his network on-screen, configure Radware Intelligent Application Switching devices, and set-up SynApps ‘Application Aware’ Services, to address end-to-end IP application service requirements. Devices are simply placed, connected and configured in a visual environment to create site-wide topologies, establish device redundancies and set-up device networking parameters.

Configware Insite’s statistics module provides real-time and historical views of actual application performance levels for monitoring site wide operations and simple pinpointing of vulnerabilities and failures. This affords complete visibility and control over the performance of Web and application servers, security tools, cache servers, and Internet links.

Configware Insite enables the configuration of SynApps application aware services, extending control over application requirements across layers 4-7 including: 

  • Health Monitoring & Traffic Redirection: Establishing performance criteria and thresholds for device health and set-up of network traffic redirection and routing preferences.
  • Load balancing: Configuration of enterprise traffic flow and device utilization settings.
  • Bandwidth Management: Creation of bandwidth service level policies to prioritize traffic by applications and users.
  • DoS Protection and Intrusion Prevention: Configuration of real-time security checks and attack signature registry. 

Within this context, DefensePro appliances can be added to the Configware Insite site map, following which they can be configured and managed along with all other Radware devices on the network. Security alerts are handled in the same way as other device alerts on the Configware Insite screen. 

Configware Insite can operate in two-tier architecture or three-tier using client-server mode. The client-server mode allows system administrators to manage remote Radware devices while reducing the amount of SNMP traffic flowing through the WAN.

Performance

The aim of this section is to verify that the sensor is capable of detecting and blocking exploits when subjected to increasing loads of background traffic up to the maximum bandwidth supported as claimed by the vendor.  

For each type of background traffic, we also determine the maximum load the IPS can sustain before it begins to drop packets/miss alerts. It is worth noting that devices which demonstrate 100 per cent blocking but less than 100 per cent detection in these tests will be prone to blocking legitimate traffic under similar loads. 

The DefensePro is rated by Radware at 3Gbps, and was tested to 1Gbps in this test. It turned in a good performance in almost all the tests, indicating that it can easily handle 1Gbps (and more) of normal network traffic. 

DefensePro detected and, more importantly, blocked all attacks even when subjected to extreme loads, and under all other load conditions it performed well. At the more extreme loads (approaching 1Gbps at the higher connection rates), the device did exhibit slightly higher HTTP response times, and the occasional failed TCP connection. We also noted an inability to process the full 20,000 connections per second at 1Gbps, or the full 10,000 delayed connections per second at 1Gbps (see Test Results section for full details).  

Despite this, we would rate DefensePro as a true 1Gbps device.

DefensePro’s basic latency figures were excellent across the board under all traffic loads (probably due to the fact the device is based on a switching architecture), ranging from 117�s with 250Mbps of 256 byte packets, to 201�s with 1Gbps of 1000 byte packets.  

Behaviour throughout the tests with no background traffic was consistent and predictable, with minimal increases as additional network load was applied from 250Mbps to 1Gbps. There were also minor increases when placing the device under a half load of 500Mbps of HTTP traffic, rising from 117�s to 160�s with 256 byte packets, 140�s to 183�s with 550 byte packets, and from 179�s to 219�s with 1000 byte packets.  

100Mbps of SYN flood traffic was barely registered by the device, resulting in negligible (less than 10�s) increases in latency compared with the base figures. HTTP response times were very good overall and, once again, the addition of a 100Mbps SYN flood attack had a negligible effect on the performance. 

Overall, latency figures were considered to be excellent for a device of this type under all load conditions and packet sizes. Clearly this device can be placed anywhere on the corporate network - from the perimeter to a heavily-loaded high-speed backbone - without significantly impacting overall network performance in any way. 

DefensePro performed consistently and completely reliably throughout our tests. Under eight hours of extended attack (comprising millions of exploits mixed with genuine traffic) it continued to block 100 per cent of attack traffic, whilst passing 100 per cent of legitimate traffic.  

Exposing the sensor interface to ISIC-generated traffic had no adverse effect, and the device continued to detect and block all other exploits throughout and following the ISIC attack.  

Please refer to the Testing Methodology section for full details of the methodology used and performance results. 

Security Effectiveness

We installed one sensor with the latest updates, and enabled all signatures except for Protocol Anomalies and the Archive group (i.e. retired signatures).  

Signature recognition was improved to 88 per cent following the application of a signature update after 24 hours, increased from a barely adequate 71 per cent out of the box. Blocking performance was one per cent higher throughout, due to one exploit being consistently blocked without an alert being raised. We consider this level of performance to be only just acceptable. 

Performance in our “false negative” tests was poor out of the box, and although it improved following the signature update, there were still five misses out of the 14 test cases. This could indicate that many signatures are written for specific exploits rather than for the underlying vulnerability - perhaps an over-reliance on basic pattern matching rather than protocol decode.

A major concern in deploying an IPS is the blocking of legitimate traffic. All the tests passed successfully upon signature file update, although DefensePro turned in a less than perfect performance out of the box, failing in 5 out of 17 test cases. 

Resistance to known evasion techniques was very good, with the DefensePro achieving a clean sweep across the board in most of our evasion tests.  

Fragroute and Whisker both failed to deceive the device into ignoring valid attacks, and many of the attempts were decoded accurately. Of the miscellaneous evasion techniques, changing ports on Trojan programs and using RPC fragmentation both proved troublesome. 

Out of the box, Radware claims that DefensePro can handle approximately 1,100,000 open connections with IP and TCP reassembly disabled (the default is 800,000). We did not attempt to verify this in our tests since we believe such anti-evasion features should always be enabled. We were able to verify up to 500,000 connections without tuning, but it was not possible to increase this to 1 million, since the device did not have enough memory to support this level of open connections with IP and TCP reassembly enabled. We also felt that the session ageing time was too low, causing state to be lost too early. 

Stateless “exploits” are not alerted upon (this is correct behaviour in order to be resistant to Stick and Snot tools) and mid-flows are blocked by default (a mid-flow violation alert is raised). It is, however, possible to configure the device to allow mid-flows, and there is a configurable “grace period” where they are not enforced following a power-cycle to prevent blocking of legitimate traffic should the device come on-line in mid session.

Please refer to the Testing Methodology section for full details of the methodology used and performance results. 

Usability

This part of the test procedure consists of a subjective evaluation of the features and capabilities of the product, and covers installation, configuration, policy editing, alert handling, and reporting and analysis

Installation

Initial configuration of networking parameters is carried out via the serial console, following which the management software is installed. 

In addition to the text-based command-line interface (CLI), DefensePro can be managed via the built-in Web Based Management (WBM) interface, which provides immediate and very comprehensive graphical two-tier management for a single device over a standard HTTP/HTTPS connection.  

However, Configware Insite provides more extensive multi-device management and reporting capabilities via SNMP. Rather than focusing on a single device, Configware Insite presents the entire network configuration in a graphical format (the network diagram can be created on-screen), with settings and configuration options organised in a logically related manner.

Once the software has been installed, the DefensePro First Time Wizard enables the administrator to configure a blank DefensePro device from scratch with relevant protection polices that match his required network design and deployment scenario.  

As the Wizard progresses, the administrator is prompted to enter the port configuration and the security policy to use initially, selected from a list including corporate gateway, DMZ, DMZ mail, DMZ Web, corporate LAN, carrier/POP, or university LAN. Each of these policies provides a basic configuration of signatures/filters which Radware feels is suitable for the intended deployment scenario. 


Figure 4 - DefensePro: First Time Wizard

Finally, the administrator specifies the network and VLAN configuration, and the reporting target (remote or local database where alerts are stored for analysis). The device is then ready to connect to the network and is enabled using a policy suitable for the deployment scenario specified in the Wizard. 

In Static Forwarding mode DefensePro functions as a completely transparent network device. Scanning ports have a one-to-one forwarding ratio, where the traffic that comes from the receiving port is always sent out from its corresponding transmitting port. The ports are paired, meaning one port receives traffic while another transmits traffic. For each pair of ports the administrator selects the physical inbound port and the physical outbound port, plus the operation mode of the pair.  

There are two available operation modes: Switch and Process. When a port pair is set to operate in the Switch mode, the traffic is switched straight through the device without any inspection. When the ports are set to operate in the Process mode, the traffic passes through the inspection engine where it is inspected for attacks, bandwidth control, and so on.

The processing of the traffic is performed by means of the various Bandwidth Management and Security filters. Both the inbound and outbound traffic to the organisation are processed, allowing the application of security policies and traffic shaping rules on traffic in both directions. 

Scanning/detection ports are “invisible” to the network and thus can not have IP addresses . Any of the other physical ports on the device can be configured as a management port and will have an IP address allocated. Traffic received on the management port is not forwarded to any other ports, but is handled by the device itself.  

A detailed User Guide is provided in electronic format only. This document is very comprehensive, and appears to be accurate and well written. The User Guide provides far more than basic instructions on using the GUI. It also offers plenty of background information covering the functions of the various options and parameters in depth, as well as good advice on deployment.  

Configuration

Although DefensePro includes both a CLI and a direct basic Web-Based Management system as part of the product, this paper will concentrate purely on the more advanced Configware Insite product, which is also included out of the box. 


Figure 5 - DefensePro: Configuring management access

On first entering Configware Insite the administrator is presented with a graphical display of the site, which can be populated with icons of switches, routers, and other network elements as well as DefensePro units. These can be linked together to highlight physical or logical network links, and any of the DefensePro devices can be managed from here providing the administrator is authorised to do so.

However, it is still necessary to connect to individual devices in order to manage them or view alerts and reports - no consolidated view of all devices is available, and nor is it possible to define a single policy and push to all devices simultaneously or in groups. Site layouts can be saved for later recall. 

Any number of users can be defined, and these can be allocated to Configware Insite as a whole (to allow use of the management interface) and to individual DefensePro appliances within the site. Thus separate administrators can be assigned different IPS devices to manage. Two levels of granularity only are available for user accounts: administrator and operator

New DefensePro devices can be added quickly and easily in the site map by defining the IP address and port parameters (which ports are used for detection, management, etc.). The administrator defines which communications services are running on the management port (Telnet, HTTP, HTTPS or SSH), and can also configure basic device monitoring (checking availability of devices) with alerts appearing on the site map. 

The Signature File Update feature provides constant updates of the Signature database (this is an extra-cost maintenance option). During the update process Configware Insite connects to the Radware Web site to acquire the file for the specified device. An updated Signature file can be found on the Radware website every Monday, though the site can be updated on any other day if an emergency update is required.  

Updating of the Signatures file can be performed via an automatic download and update process, or can be performed manually on demand. 

Policy Management

Protection policies are defined in the Connect & Protect table. This has a number of rows, giving it the appearance of a typical firewall rules table, and a set of global configuration parameters that apply across all policies.  

The following general security settings can be applied in the Security Parameters window:  

  • Application Security - A mechanism that provides advanced attack detection and prevention capabilities, checking the traffic on a packet-by-packet basis. This mechanism is used by the following security modules to provide maximum protection for network elements, hosts and applications: Intrusions, Anomalies, Application Security for DoS/DDoS. TCP reassembly can be enabled/disabled here.
  • DoS Shield - The DoS Shield mechanism implements the sampling algorithm, and accommodates traffic flooding targeted to adversely affect network services. This mechanism is included in the DoS/DDoS security module.
  • Protocol Anomaly Protection - The Protocol Anomaly Protection parameters are the general parameters of the Anomalies security module. Parameters include maximum URI length, minimum fragmented URI packet size, and minimum fragment size
  • Reporting - Configures how and where alerts should be sent. It is possible to configure the reporting interval, maximum number of alerts to transmit per report (to prevent flooding of the console), and the transmission protocol (SNMP traps, e-mails, log entries, console echo)
  • Packet Reporting - How and where raw packet data should be sent
  • IP Fragments - Configures the IP fragmentation reassembly status and the minimum fragment protection status.

Every row in the Connect & Protect Table represents a policy. A security policy contains security profiles that are activated within predefined ranges of ports/VLANs, or within a predefined network. The first task, therefore, is to define the scope of each policy in terms of IP address range, VLAN tag, inbound or outbound traffic, and so on. 

Although this may seem trivial, it does actually give rise to a very powerful feature of the DefensePro system, since it is possible to define many different policies and have each one apply to only a subset of the protected network (right down to individual hosts, if required). For example, it would be possible to define a global policy which applies every protection feature, and then turn off DDOS protection and anti-scanning protection for a subset of hosts. 


Figure 6 - DefensePro: Creating policies in the Connect & Protect table

Once the scope has been defined, the rest of the policy row is divided into columns representing the various security subsystems: 

  • Intrusion module
  • DoS/DDoS module
  • SYN Flood module
  • Anomaly module
  • Anti-Scanning module  

Clicking within any of the security modules allows protection profiles to be added to that module to process traffic in a specific way. One or more profiles can be created for each security module and the profiles can then be associated with a policy.

The administrator is able to choose from an extensive range of signatures to add to a profile, and signatures are grouped together to make this process easier - for example, providing the ability to create a “Web” profile, and then select three or four groups of signatures dealing purely with Web exploits.  

Where the pre-defined groups are not acceptable, the administrator can duplicate them and edit the duplicates to add or remove signatures as required. Unfortunately, there is no search facility, making it difficult to identify and locate individual signatures or groups of signatures when creating custom groups. 

Once a group has been added to a profile, it is no longer possible to enable or disable individual signatures within it. Instead, it is possible only to enable or disable entire groups within the profile.  

This is a shame, since it makes it very difficult to fine tune profiles without having to completely recreate the groups of signatures which comprise them. It would be preferable for each group and each signature within a group to have a check box against it in order to be able to enable or disable as required within a profile. 


Figure 7 - DefensePro: Configuring SYN Flood Protection policy

Individual signatures have a range of editable parameters: 

  • Tracking Time - Sets the amount of time (in milliseconds) in which a Threshold is measured (where applicable)
  • Threshold - Sets the maximum number of attack packets that are allowed in each Tracking Time unit (where applicable)
  • Tracking Type - Defines how the device decides which traffic to block or drop, when under an attack of this type. Values can be:
  • Drop All: Drop all packets, for when each packet of the defined attack is harmful.
  • Target Attack: For when the defined attack is destination-based, meaning the hacker is attacking a specific destination such as a Web server.
  • Source and Target Attack: For when the attack type is a source and destination based attack, meaning the hacker is attacking from a specific source IP to a specific destination IP.
  • Source Attack: For when the defined attack is source-based, meaning the attack can be recognized according to its source address.
  • Packet Report - To specify capture of raw packet data
  • Action Mode - When an attack is detected, one of the following actions can be taken:
  • Report Only: The packet is forwarded to the defined destination.
  • Drop: The packet is discarded.
  • Reset Source: Sends a TCP Reset packet to the packet Source IP.
  • Reset Destination: Sends a TCP Reset packet to the destination address.
  • Reset Bi-directional: Sends a TCP Reset packet to both the source and destination IP.
  • Risk - Attack risk can be defined as High, Medium, or Low depending on the severity of the damage that the attack can cause  

These can be set on a per-signature basis, but unfortunately there is no way to apply bulk edits - say amending all IIS signatures to High severity. Conversely, the ability to drop a bad session (i.e. drop malicious packet and then mark the remaining session as bad) is only available as a global setting, and cannot be set on a per-signature basis. This should be made available as an additional Action Mode alongside the Drop Packet option. 

Custom signatures can be created from scratch if required, and assigned to custom groups before being added to a profile. Signature definition is not for the faint-hearted, but Radware has produced a good interface here which makes it as straightforward as it is possible to be. 


Figure 8 - DefensePro: Configuring global security parameters

Once Profiles have been created for each of the security modules required, the overall Action parameter can be specified for the Policy:

  • Block - The packet is identified as an attack and the action taken to prevent the attack is the action that was defined in the Block Action parameter of each security module.
  • Forward - The packet is forwarded to the defined destination
  • Mixed - When the Action parameter of a security module is changed using Web Based Management, the Action mode may appear as Mixed, since it is possible to merge Policies with different Action parameters into a single line in the Connect & Protect table. This seems to be unnecessarily confusing, and it would be preferable for each line of the Connect & Protect policy to remain separate. 

As mentioned before, multiple Policies can be defined within the same Connect & Protect table, each with different signature Profiles and actions, and each applying to different hosts or ranges of IP addresses. This is an extremely powerful and flexible system that provides very fine-grained control over a corporate security policy. 

It is a shame that in larger deployments it is not possible to define a single policy and then apply to multiple devices. This would seem to be a basic requirement in an enterprise IPS management platform. 

Alert Handling

When an attack is detected, the device creates a security event that includes the information relevant to this specific attack. Once an event has been created, the device reports it using several optional channels:

  • Security Logs - saved in flash memory (this log file can also be downloaded and examined within the management GUI if required)
  • SNMP traps - can be sent to Configware Insite and a management station
  • Syslog messages - can be sent to a Syslog server
  • E-mail messages - can be sent to specific users
  • Security Terminal Echo - echoed to appliance command line 

The Attack Log screen is divided into three panes. The alerts appear in the upper right pane, and selecting any alert displays detailed information about the exploit in the lower right pane. The pane running down the left hand side of the screen contains a number of pre-defined filters allowing the administrator to quickly and easily restrict the display to alerts classified as High, Medium or Low Severity, Anomalies, Anti-Scanning, DOS or Intrusions.  

This pane also allows the definition of simple custom filters which can be stored and applied by checking the boxes next to them. A nice touch here is that multiple custom filters can be applied by checking more than one box, thus it is possible to build more complex filters in this way (although complex combinations of filters cannot be saved for re-use later). 

Each alert entry shows the following information: 

  • Risk - The attack severity level: high, medium or low.
  • Date/Time - The date and time when the alert was generated.
  • Attack Name - The name of the attack that was detected.
  • Physical Port - The actual port on the device on which the attack arrived.
  • Action - The reported action can be:
  • Block: The packet is identified as an attack and the action taken to prevent the attack is the action that was defined in the Block Action parameter of the security module.
  • Forward: The packet is forwarded to the defined destination.
  • Category - The category of the attack: Anomalies, Anti-Scanning, DOS, or Intrusion.
  • Protocol - The transmission protocol used to send the attack: TCP/ UDP/ ICMP/IP.
  • Source Address - The IP address from which the attack arrived.
  • Source Port - TCP/UDP source port.
  • Destination Address - The IP address to which the attack is destined.
  • Destination Port - TCP/UDP destination port.
  • Radware Attack ID - Radware’s unique identifier of the attack.
  • Packet Count - The number of packets in the attack
  • Packet Bandwidth - The bandwidth of the attack since the latest trap was sent (KByte).  


Figure 9 - DefensePro: Attack Log

  • Status - The current status of the event. For Intrusions, Anomalies, Anti-Scanning attacks, and Application Security for DoS/ DDoS attacks the following status can appear:
  • Occurred: Each packet matched with signatures is reported as an attack and must be dropped.
  • Started/Terminated: When the number of packets that match with signatures, goes beyond the predefined threshold within the Tracking Time, the reported Attack Status is “Started”. When the number of packets that match with signatures is below the predefined threshold, the reported Attack Status becomes “Terminated”.
  • Ongoing: A status report which occurs between “Started” and “Terminated”.
  • For DoS Shield attacks the following status indicators can appear:
  • Alert: This status is reported when the number of packets that match with signatures goes beyond the predefined Warning Threshold.
  • Active: This status is reported when the number of packets that match with signature, goes beyond the predefined Activation Threshold.
  • Block: This status is reported when the number of packets that match with signatures goes beyond the predefined Drop Threshold.
  • De-al: The Deactivation Alert status is reported when the attack is about to be terminated.
  • De-ac: The Deactivation status is reported when the attack is terminated.
  • Device IP - The IP of the device with which the attack is associated.
  • VLAN Tag - VLAN Tag information 

When configured, it is also possible to view the raw packet data from the single packet which triggered the alert.

Reporting and Analysis

Alerts are transmitted from the IPS device to the management station - such as Configware Insite (as well as other third party products, if required) - via SNMP traps. Trap notification is set up through the device’s Target Address table where the administrator specifies SNMP parameters and selects which type of notification the target server will receive. In the Community Table, the administrator can designate that specific users have access to the traps. 

Security events are also logged to an all-purpose cyclic Log File. The device’s Log File can be obtained at any time, but is of limited size. When the number of entries is beyond the permitted limit, the oldest entries are overwritten. Notifications are raised when the file is 80 per cent utilised, and 100 per cent utilised. 

The Attack Reports Desktop allows the administrator to access all the reporting options. Attack reports provide attack performance and impact on the network in a graphical layout. Historical reports show attack activity over time, and it is possible to view the top ten attacks on the system and how they change over a specified period. 

Attack reports are created using information selected from security event logs. Radware provides a set of predefined reports to examine the type of attacks affecting the protected network, and their volume, bandwidth or severity. It is also possible to select individual bars or pie-sections on the graphical reports and drill down (one level only) to view the data behind them. 

The following predefined Attack Reports are available:  

  • Top Attacks - Graphs the top ten attacks according to packet count per attack.
  • Top Attacks by Category - Graphs the top ten attack groups (Intrusions, DoS, Anomalies, SYN Floods, and Anti-Scanning), calculated according to packet count per group.
  • Top Attack Targets - Graphs the top ten attack target destinations per IP Address.
  • Top Attack Sources - Graphs the top attacks according to attack sources per IP Address.
  • Top Attack Targets Bandwidth - Graphs the top ten attacks by bandwidth consumption.
  • Number of Attacks Over Time - Graphs the changes in total number of attacks over a specified time period.
  • Attacks by Severity - Graphs the attacks ranked by severity of risk: High/Medium/Low
  • Top Attacks by Module - Graphs the top ten policies in use, ranked by packet volume per policy, per module (Intrusions, DoS, Anomalies, SYN Floods, and Anti-Scanning). 

Along with predefined reports that provide pre-configured types of network analysis, it is possible to set filtering parameters to create custom reports for viewing attack activity. It is possible to create graphs for high-level views or more detailed drill-down views of network attacks, though, once again, it is not possible to save complex filter combinations as complete custom reports. 


Figure 10 - DefensePro: Reports

Executive Security reports can be generated and exported in HTML format. These reports allow the generation of reports that are composed of more than one graph.  

The Executive Report can include one or more of the following reports, all displayed as pie charts:  

  • Top 10 Attacks - Displays the top 10 attacks with packet count
  • Top 10 Attack Sources - Display the top 10 attack sources with packet count
  • Top 10 Attack Source and Destination - Displays the top ten attack source and destination addresses with packet count
  • Top Attack Destinations - Display the top 10 attacked destinations with packet count
  • Attacks by Category - Displays the top 10 attacks including their Category (Intrusions, Anomalies, etc.) with packet count.
  • Attacks by Risk - Displays the top 10 attacks including their Risk and packet count. 

Apart from the usual reports and graphs, Configware Insite provides a useful Security Dashboard feature providing a real time attack view displaying the most recent attack activity in the network.  

The Security Dashboard also provides extracts of key Attack Reports and the immediate status of specific attacks. These reports graph the most intensive (top) attacks by packet volume, and the Dashboard can be refreshed automatically at user-defined intervals. 


Figure 11 - DefensePro: Dashboard

The Dashboard has two panels. To the left is the Top Security Attacks Radar, which displays the most intensive attacks currently in the system, whilst to the right are four graphs which graph the top attacks in the network and their severity.  

These four graphs provide a more comprehensive picture of real-time attacks to the system by mapping the following:  

  • Total Number of Attacks - Shows the current total number of attacks and the total for the display period.
  • Attacks By Severity - Breakdown of attacks in the display period by severity: High, Medium, Low.
  • Top Attack Targets - IP addresses of the top five attack targets for the display period.
  • Top Attack Sources - IP addresses of the top five attack sources for the display period.

Verdict

Performance

The aim of this section is to verify that the sensor is capable of detecting and blocking exploits when subjected to increasing loads of background traffic up to the maximum bandwidth supported as claimed by the vendor.  

For each type of background traffic, we also determine the maximum load the IPS can sustain before it begins to drop packets/miss alerts. It is worth noting that devices which demonstrate 100 per cent blocking but less than 100 per cent detection in these tests will be prone to blocking legitimate traffic under similar loads. 

The DefensePro is rated by Radware at 3Gbps, and was tested to 1Gbps in this test. It turned in a good performance in almost all the tests, indicating that it can easily handle 1Gbps (and more) of normal network traffic. 

DefensePro detected and, more importantly, blocked all attacks even when subjected to extreme loads, and under all other load conditions it performed well. At the more extreme loads (approaching 1Gbps at the higher connection rates), the device did exhibit slightly higher HTTP response times, and the occasional failed TCP connection. We also noted an inability to process the full 20,000 connections per second at 1Gbps, or the full 10,000 delayed connections per second at 1Gbps (see Test Results section for full details). Despite this, we would rate DefensePro as a true 1Gbps device. 

DefensePro’s basic latency figures were excellent across the board under all traffic loads, ranging from 117�s with 250Mbps of 256 byte packets, to 201�s with 1Gbps of 1000 byte packets.  

Behaviour throughout the tests with no background traffic was consistent and predictable, with minimal increases as additional network load was applied from 250Mbps to 1Gbps. There were also minor increases when placing the device under a half load of 500Mbps of HTTP traffic, rising from 117�s to 160�s with 256 byte packets, 140�s to 183�s with 550 byte packets, and from 179�s to 219�s with 1000 byte packets.  

100Mbps of SYN flood traffic was barely registered by the device, resulting in negligible (less than 10�s) increases in latency compared with the base figures. HTTP response times were very good overall and, once again, the addition of a 100Mbps SYN flood attack had a negligible effect on the performance. 

Overall, latency figures were considered to be excellent for a device of this type under all load conditions and packet sizes. Clearly this device can be placed anywhere on the corporate network - from the perimeter to a heavily-loaded high-speed backbone - without significantly impacting overall network performance in any way. 

DefensePro performed consistently and completely reliably throughout our tests. Under eight hours of extended attack (comprising millions of exploits mixed with genuine traffic) it continued to block 100 per cent of attack traffic, whilst passing 100 per cent of legitimate traffic.

Exposing the sensor interface to ISIC-generated traffic had no adverse effect, and the device continued to detect and block all other exploits throughout and following the ISIC attack.  

Security Effectiveness

We installed one sensor with the latest updates, and enabled all signatures except for Protocol Anomalies and the Archive group (i.e. retired signatures).  

Signature recognition was improved to 88 per cent following the application of a signature update after 24 hours, increased from a barely adequate 71 per cent out of the box. Blocking performance was one per cent higher throughout, due to one exploit being consistently blocked without an alert being raised. We consider this level of performance to be only just acceptable. 

Performance in our “false negative” tests was poor out of the box, and although it improved following the signature update, there were still five misses out of the 14 test cases. This could indicate that many signatures are written for specific exploits rather than for the underlying vulnerability - perhaps an over-reliance on basic pattern matching rather than protocol decode. 

A major concern in deploying an IPS is the blocking of legitimate traffic. All the tests passed successfully upon signature file update, although DefensePro turned in a less than perfect performance out of the box, failing in 5 out of 17 test cases. 

Resistance to known evasion techniques was very good, with the DefensePro achieving a clean sweep across the board in most of our evasion tests. Fragroute and Whisker both failed to deceive the device into ignoring valid attacks, and many of the attempts were decoded accurately. Of the miscellaneous evasion techniques, changing ports on Trojan programs and using RPC fragmentation both proved troublesome. 

Out of the box, Radware claims that DefensePro can handle approximately 1,100,000 open connections with IP and TCP reassembly disabled (the default is 800,000). We did not attempt to verify this in our tests since we believe such anti-evasion features should always be enabled. We were able to verify up to 500,000 connections without tuning, but it was not possible to increase this to 1 million, since the device did not have enough memory to support this level of open connections with IP and TCP reassembly enabled. We also felt that the session ageing time was too low, causing state to be lost too early. 

Stateless “exploits” are not alerted upon (this is correct behaviour in order to be resistant to Stick and Snot tools) and mid-flows are blocked by default (a mid-flow violation alert is raised). It is, however, possible to configure the device to allow mid-flows, and there is a configurable “grace period” where they are not enforced following a power-cycle to prevent blocking of legitimate traffic should the device come on-line in mid session. 

Usability

With multiple methods of managing the device DefensePro offers the administrator a choice of how to approach his management tasks.

The system offers a full-featured, text-based command-line interface, a two-tier system using a browser-based interface, and a three-tier system using a Java-based interface.  

We found the dashboard with “radar” display to be both attractive and useful, given that it also supports limited drill-down capabilities. 

DefensePro is straightforward to install and configure and manage on a daily basis. Policy creation is very flexible and powerful, though not always as intuitive as we might like.  

We would like to see some additional refinement of the policy editor, notably a search function for individual signatures and groups of signatures, and the ability to enable and disable individual signatures as well as groups once they have been added to a profile.  

The biggest issue, however, is the inability to manage multiple devices simultaneously. Although all devices can be managed from a central console, it is necessary to connect to each individual device in order to deploy policies. It should be possible to create a single policy for subsequent distribution to multiple DefensePro devices - this is a serous omission for an enterprise-class IPS system. 

Alert handling is adequate, but is missing the ability to select individual elements of the alerts and drill down or up to further analyse the attacks. For example, highlighting the source IP address on one alert, it would be useful to be able to right click, and generate a view of all attacks from that same source IP address. Radware is rolling out a new CWIS version that will support such drill-down capabilities. 

It would also be useful to be able to go straight into the appropriate signature within a policy from an alert to disable the signature or fine tune its configuration parameters. 

Reporting is adequate, with high-level graphical views offering the ability to drill down to the detail beneath, although we would prefer to be able to drill down more than one level. 

Contact Details

Company name: Radware
Email[email protected]
Internet: www.radware.com

Address:
22 Raoul Wallenberg Street
Tel Aviv 69710
Israel

Tel: +972 3 766 8666
Fax: +972 3 766 8655

Click here to return to the Radware questionnaire
Click here to return to the IPS Index Section

top         Home

Certification Programs

Group Test Reports

White Papers

On-Line Store

Contact The NSS Group

Home

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.