IPSec Evaluation

Page 1

IPSec Evaluation


IPSec Evaluation • Evaluation of IPSEC devices. – The aim of this evaluation is support acreditation processes.

– Tools: • Our own tools, simulating: – Negotiations. – Destructions. – Network Delays. – Different topologies.

© 2010 evalues

•Commercial tools (IXIA). - Standard conformity. •Reports and Methodology. -Our own evaluation methodology.

Titulo Presentación

2


Category Evaluation Tests IPSec Evaluation

Conformity tests

Functional tests

ESP Protocol

Cipher suit

AH Protocol

Authentication method

ISAKMP Protocol

Negotiation modes

Penetration Tests

Performance Tests

Inexpert Attacker

Tunnel Negotiation

Expert Attacker

Tunnel Destruction

Advance Attacker

Routing capacities

PFS

漏 2010 evalues

Titulo Presentaci贸n

3


IPSEC Evaluation Topology

2010 EVALUES - Seguridad en Sistemas de Informaci贸n

4


Performance Evaluation Topology

2010 EVALUES - Seguridad en Sistemas de Informaci贸n

5


Network Profiles; Examples Profile

Protocol

Message size

Direction

Latency

% Lost

% Retransmission

Max. BandWidth.

UDP

MTU

Bidirectional

0 ms

0%

0%

Red Saturada

UDP

MTU

Bidiretcional

1500 ms

40%

65%

Custom Use

90% TCP 9% UDP 1% ICMP

250 bytes

Bidirectional

0 ms

1%

2%

Asim. TCP Input

TCP

MTU

Toward E.I.

0 ms

1%

2%

Asim TCP Output

TCP

MTU

Toward E.I.

0 ms

1%

2%

2010 EVALUES - Seguridad en Sistemas de Informaci贸n

6


Evaluation fulfilled • Nokia • Cisco • Teldat

2010 EVALUES - Seguridad en Sistemas de Información

7


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.