防火墙表现分析报告文档格式.docx
- 文档编号:3786722
- 上传时间:2023-05-02
- 格式:DOCX
- 页数:61
- 大小:33.83KB
防火墙表现分析报告文档格式.docx
《防火墙表现分析报告文档格式.docx》由会员分享,可在线阅读,更多相关《防火墙表现分析报告文档格式.docx(61页珍藏版)》请在冰点文库上搜索。
Hanover,MD21076
(410)850-5411
i
TableofContents
1.EXECUTIVESUMMARY.................................................................................................................1
2.INITIALFIREWALLCONFIGURATIONPARAMETERS..........................................................3
2.1USERPROCESSES................................................................................................................................3
2.2NETWORKPARAMETERS......................................................................................................................3
2.3REMAKINGTHEKERNEL......................................................................................................................3
2.4PROXYSOURCEMODIFICATION............................................................................................................4
2.5/ETC/INETD.CONFMODIFICATION.........................................................................................................5
3.TESTENVIRONMENT....................................................................................................................7
3.1LABCONFIGURATION..........................................................................................................................7
3.2PERFORMANCEANALYSISMETHODOLOGY...........................................................................................8
4.TESTSCENARIOS...........................................................................................................................9
4.1INDIVIDUALPERFORMANCETESTS.......................................................................................................9
4.1.1TELNET.....................................................................................................................................9
4.1.2FTP...........................................................................................................................................9
4.1.3HTTP........................................................................................................................................10
4.1.4E-mail.......................................................................................................................................11
4.2NETPERM-TABLELOOKUPTESTS.........................................................................................................12
5.TESTRESULTSANDANALYSIS..................................................................................................13
5.1TELNET..........................................................................................................................................13
5.1.1Results......................................................................................................................................13
5.1.2Analysis....................................................................................................................................13
5.2FTP..................................................................................................................................................14
5.2.1Results......................................................................................................................................14
5.2.2Analysis....................................................................................................................................15
5.3HTTP...............................................................................................................................................16
5.3.1Results......................................................................................................................................16
5.3.2Analysis....................................................................................................................................18
5.4E-MAIL.............................................................................................................................................19
5.4.1Results......................................................................................................................................19
5.4.2Analysis....................................................................................................................................19
5.5NETPERM-TABLELOOKUPTESTS.........................................................................................................20
5.5.1Results......................................................................................................................................20
5.5.2Analysis....................................................................................................................................20
6.CONCLUSIONS...............................................................................................................................22
7.PERFORMANCEENHANCEMENTRECOMMENDATIONS....................................................23
7.1FILESYSTEMPARTITIONING.................................................................................................................23
7.2NETWORKTOPOLOGY........................................................................................................................23
7.2.1MultipleFirewalls/MultipleConnections.................................................................................23
7.2.2T3Connection...........................................................................................................................24
7.3HTTPCACHINGPROXIES...................................................................................................................25
GLOSSARYOFTERMS......................................................................................................................27
ii
APPENDIXA—TESTSCRIPTS.....................................................................................................A-1
APPENDIXB—DATASETREPORTS...........................................................................................B-1
iii
ListofFigures
Figure1.ProxySourceCodeChangetothelisten()Call......................................................................5
Figure2./etc/inetd.confFile...................................................................................................................5
Figure3./etc/rc.localProxyStartup......................................................................................................5
Figure4.LaboratoryConfiguration......................................................................................................7
Figure5.ConnectionEstablishmentTimesfor128and256Connections...........................................13
Figure6.64SimultaneousFTPConnectionTimes...............................................................................15
Figure7.128SimultaneousFTPConnectionTimes.............................................................................15
Figure8.TransferTimesfor256and512HTTPGET'
sofa50KDocument.....................................17
Figure9.64SimultaneousHTTPConnectionTimes............................................................................17
Figure10.128SimultaneousHTTPConnectionTimes........................................................................18
Figure11.MultipleFirewallConfiguration.........................................................................................24
Figure12.T3Connectionwith100MbpsLANSegments...................................................................25
Figure13.CachingHTTPProxyEnvironment....................................................................................26
iv
ListofTables
Table1.GAUNTLETSourceCodeModification.................................................................................4
Table2.TestLabMachineArchitectures.............................................................................................7
Table3.FTPTestScenarios.................................................................................................................10
Table4.HTTPHighVolumeofConnectionsTestScenarios...............................................................10
Table5.HTTPHighVolumeofDataTestScenarios...........................................................................11
Table6.E-mailTestScenarios.............................................................................................................11
Table7.FilesTypesUsedinE-mailTests............................................................................................12
Table8.Netperm-tableRuleCount......................................................................................................12
Table9.ConnectionEstablishmentTime(inseconds)tothetn-gwProxy..........................................13
Table10.AverageFTPTransferTimes(inseconds)...........................................................................14
Table11.HTTPHighVolumeofConnectionsAverageTransferTimes............................................16
Table12.AverageHTTPTransferTimes(inseconds)........................................................................17
Table13.E-mailTestResults...............................................................................................................19
Table14.AverageConnectionTimetotn-gwProxy...........................................................................
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 防火墙 表现 分析 报告