Performance Evaluation and Comparative Analysis of Network Firewalls
Performance Evaluation and Comparative Analysis of Network Firewalls
Network Firewalls
Chirag Sheth Rajesh Thakker
Tata Consultancy Services Limited, Electronics & Commu Dept,
Info-Tower-1, Infocity, Gandhinagar – 382009, India Vishwakarma Govt. Engg. College,
[email protected] Chandkheda, Gandhinagar – 382424, India
[email protected]
Abstract— Firewalls are no longer just perimeter devices for the is to examine each packet that passes through the entrance and
data center, but should be weaved into the fabric of the network decide whether to accept the packet and allow it to proceed or
from edge to edge such as to offer security layered in-depth and to discard the packet. A firewall's basic task is to regulate
ubiquitous. The next evolution of the firewall has to combine some of the flow of traffic between computer networks of
dynamic policy-based security with performance, rapid scaling, different trust levels. Typical examples are the Internet which
high availability and application intelligence. Today, increasing
is a zone with no trust and an internal network which is a zone
attention is paid to network firewall design quality due to
regulations such as the Sarbanes-Oxley act, CobiT framework, of higher trust. A zone with an intermediate trust level,
the Payment-Card Industry Data Security Standard (PCI DSS) situated between the Internet and a trusted internal network, is
and the NIST standard. All these regulations include specific often referred to as a "perimeter network" or Demilitarized
sections dealing with firewall configuration, management and zone (DMZ).
audit. A firewall’s configuration contains a large set of access
This paper is a humble attempt to examine various control rules, each specifying source addresses, destination
types of firewalls operational as on today and cross reference addresses, source ports, destination ports, one or multiple
each firewall operation with causes and effects of weaknesses in protocol ids, and an appropriate action. The action is typically
their operation. In addition, we analyze reported problems with
“accept” or “deny.” Some firewalls can support other types of
existing firewalls. Detailed analysis and comparison is done in
terms of cost, security, operational ease and implementation of actions such as sending a log message, applying a proxy, and
Open source packet filter (PF) firewall, Checkpoint SPLAT and passing the matched packets into a VPN tunnel. For most
Cisco ASA in a testing environment with laboratory generated firewalls, the rule set is order-sensitive. An incoming packet
traffic. Various throughputs and connections statistics were used will be checked against the ordered list of rules. The rule that
as benchmark for performance comparison. The results matches first decides how to process the packet. Due to the
indicated that Cisco ASA outperforms its peers in most multidimensional nature of the rules (including
performance criterions. Checkpoint SPLAT and OpenBSD PF source/destination addresses and ports), the performance of a
also provides reasonably good and competitive performance. The firewall degrades as the number of rules increases.
results reported in this paper will also be useful in comparing
Commercially deployed firewalls often carry tens of
vendors to procure firewall based on one’s own organizational
business requirements. thousands of rules, creating performance bottlenecks in the
network. More importantly, the empirical fact shows that the
Keywords— Network Security, Distributed Firewall, Checkpoint
number of configuration errors on a firewall increases sharply
NGX, Cisco ASA, OpenBSD PF along with the size of the rule set. A complex rule set can
easily lead to mistakes and mal-configuration [1-3].
I. INTRODUCTION Despite their critical role, firewalls have traditionally been
“Cyber Attacks Hit 75% of Global Enterprises in 2009” tested without well-defined and effective methodologies.
[Symantec, Feb-2010] Currently, a diverse set of firewalls are being used. Because it
As enterprises take on the Internet as a new business tool - is infeasible to examine each firewall separately for all
whether to sell, to collaborate or to communicate - web potential problems, a general mechanism is required to
applications have become the new weakest link in the understand firewall vulnerabilities in the context of firewall
organization's security strategy. Technological innovations are operations. The firewall data flow model presented in this
fundamentally changing the way people live, work, play, report gives an overall description of firewalls by detailing the
share information and communicate with each other. operations they perform (depicted in figure 1). When a packet
Network Firewalls protect a trusted network from an un- is received by a firewall, it first undergoes link layer filtering.
trusted network by filtering traffic according to a specified Then, it is checked against a dynamic rule set. The packet then
security policy. A firewall is often placed at the entrance of undergoes packet legality checks, and IP and port filtering.
each private network in the Internet. The function of a firewall Finally, network/port address translation is performed.