Fortinet Competitive Edge Sophos v2
Fortinet Competitive Edge Sophos v2
Fortinet Competitive Edge Sophos v2
While it is not entirely clear under what conditions these values were attained, these will be the
metrics that we will use to compare with actual results. Fortinet thoroughly and fairly tests its
own devices, and we will apply the same tests fairly to the SG135 to get the most apples-to-
apples, honest comparison possible. The tests are exactly the same as we use for customer-
facing FortiGate POCs – we are not trying to do anything special here to tilt the results in our
favor.
The underlying OS itself is running a Linux 3.12 kernel. There is a kernel module that does all
the packet filtering (stateful inspection) functions of the firewall, while a plethora of user space
programs (both open source and proprietary) performs all the deeper packet inspection.
The Tests and Methodology Concurrent Sessions Test – Measures how many connections
A standard set of performance tests was performed on the SG135 can be open simultaneously. The results of this test are mostly a
– the same tests Fortinet runs on all of its FortiGate appliances. The function of memory. To find the maximum concurrent sessions, we
tests were run on the device twice, once in Firewall-only mode and just have to be able to open connections, leave them open, transfer
again with the device in ‘Firewall + IPS’ mode. Certainly customers data, and then close the connections. All parts need to occur and
deploy firewalls in their networks in both modes, so we tested be successful. If any of them fails, it means we were unable to
the platform under both scenarios. Traffic for all the tests was open or maintain open some of the connections.
generated on an Ixia BreakingPoint device. Security Effectiveness Test – Measures how many attacks can
Specifically, the (8) tests performed include: be recognized and blocked by a device. The test we use is the
BreakingPoint Strike Level 3 test. It has 468 different attacks that it
– (1) Stateful/HTTP traffic throughput (32K file size)
tries to perform. In order to make sure that traffic is inspected fully,
– (4) Non-stateful/UDP traffic throughput (4 varying packet we run these attacks bidirectionally, giving us a total of 938 attacks.
sizes)
Firewall-Only Tests
For the firewall-only tests, we set up three port pairs of the 1 G
ports. Since the datasheet claims 6 G, three pairs should give us
that. At first, using link aggregation on the three pairs of links was
tried (one link agg per side). Unfortunately, that never would give
us above 4 Gbps of throughput. So instead we just used individual
port pairs with separate subnets.
SUMMARY OF RESULTS
Test FW Mode FW+IPS Comment
Mode
Stateful Throughput FAIL FAIL Constant application
HTTP-32K *(2.7 Gbps) *(141 Mbps) failure
Non-stateful Throughput FAIL FAIL Constant traffic failure
UDP-1518 Byte *(5.1 Gbps) *(1.8 Gbps)
Non-stateful Throughput 1.7 Gbps 420 Mbps No claim on datasheet
UDP-512 Byte
Figure 1
Non-stateful Throughput 300 Mbps 60 Mbps No claim on datasheet
UDP-64 Byte
Even reducing the throughput to 800 Mbps, we still saw strange
Non-stateful Throughput FAIL FAIL No claim on datasheet
drops of traffic during the test runs.
UDP - IMIX *(1.4 Gbps) *(420 Mbps)
Connections Per 7130 1840 No claim on datasheet Other packet sizes did not have the same kind of failures as the
Second UDP-1518B test. This leads us to believe it’s something about
Concurrent Connections 2M 1.1M No claim on datasheet handling large packets that gives the SG135 problems. While there
Security Effectiveness 2.3% 5.7% No claim on datasheet were no errors, the throughput results for the smaller packet sizes
were also correspondingly small.
We uncovered problems with the SG135 living up to its datasheet
For stateful throughput, the SG135 achieved zero, a failed result.
specs when we subjected it to just about any test that was on it.
No matter how little traffic was sent, there were always 10-40%
There are lots of tests and metrics which are not even listed on their
application failures that were occurring. Other devices did not
public datasheet. There seemed to be some fundamental problems
exhibit this behavior, but a different model Sophos device did, again
with the device’s ability to sustain any kind of traffic. During almost
leading us to believe it was a problem with the OS (see Figure 2).
every throughput-based test, there were intervals where the device
would stop passing traffic on one or more of its interface pairs.
Figure 2
SUMMARY OF RESULTS
Test FW Mode FW+IPS Comment
Mode
Stateful Throughput FAIL FAIL Constant application
HTTP-32K *(2.7 Gbps) *(141 Mbps) failure
Non-stateful Throughput FAIL FAIL Constant traffic failure
UDP-1518 Byte *(5.1 Gbps) *(1.8 Gbps) Figure 5
Figure 6
Moving on to TCP throughput with IPS, the SG135 achieved only And finally, the final performance test, Firewall + IPS Concurrent
141 Mbps, and that was with 15% of the connections failing. Even Sessions, showed results less than the Firewall-only test – 1.1M
at these levels the test result was not stable. The CPU usage was connections. The interesting part here is that the memory usage
only 67% average, some cores were higher, some were lower. Not of other processes was a definite factor in this one. Because
all cores were used evenly (see Figure 7). these additional processes are taking up large chunks of memory,
it leaves less available for the system to use. There were a few
instances where the Web UI locked up entirely and had to be
rebooted.
Security Effectiveness
Performance aside, another important aspect of any security device
is security effectiveness. How much protection will this device give
you? In order to look at this, we run a standard set of security
attacks through the device to see what kind of results we get.
The test we use is the Breakingpoint Strike Level 3 test. It has 468
different attacks that it tries to perform. In order to make sure that
traffic is inspected fully, we run these attacks bidirectionally, giving
us a total of 938 attacks.
As a base line, we run the security attacks with firewall only first, as
there are some attacks that are blocked by the nature of a stateful
inspection firewall, then we run the test again with different security
Figure 7: IPS - HTTP-32K Test Result
features enabled.
These results are wholly unacceptable. While 141 Mbps is still
When running the base line test, we see that the Sophos SG135
below their claimed value of 750 Mbps (or even 1500 Mbps),
blocked 22 attacks out of 938 (2.3%). Not great, but most of these
having these kinds of application failures represent traffic in a
attacks occur at higher application levels than a stateful inspection
customer’s environment that would be dropped!
firewall is going to see (see Figure 9).
For the Firewall + IPS connection rate test, the maximum CPS that
was achieved with stability was 1840 connections per second.
Past that, we were getting connection failures. This test seemed to
have variable results when various reporting or logging processes
would kick in (see Figure 8).
Figure 9
Next, Intrusion Prevention was turned on and the test was run What the logs did show (sometimes) was that the connection was
again. The number went up from 22 attacks blocked to 53 out of blocked due to the URL being too long. This turns out to be a case
938 (5.7%). That is not a big improvement. Looking at the logs, a of the proxy blocking long URLs. Many attacks can be blocked
small number of the attacks that were blocked were logged with in this way because there’s a buffer overflow attempt. However,
what looked like something correct, but for the rest there was no these are NOT blocked because the SG135 detected this specific
log entry. Still, 5.7% is not a very good blocking rate (see Figure 10). attack. There’s no log message about the type of attack or any
According to the SG135, not all IPS rules are enabled. From the useful forensic information. There are also potentially false positives
Web UI, all signatures were enabled with no age restriction, but that generated because something does have a long URL.
does not enable all rules.
Conclusion
When evaluating security devices in the market, sometimes the
only information available is on a datasheet. Knowing that different
vendors test their devices in different ways makes it very difficult to
accurately draw comparisons to the datasheet or even between
multiple vendors. Being able to have the same tests run on
separate devices gives us a basis for comparison.
When even turning on just one of the functions of NGFW (IPS), the
performance drops dramatically. And while a performance drop
Figure 10
is expected even in the Sophos datasheet (from 6 Gbps down
As part of further testing, it was also decided to try turning on to 750 Mbps), the real value of 141 Mbps (with all its associated
Web Filter. This turns on the proxy function of the device, and transaction failures) is far below that.
leads to even more degraded performance. But when the security
When looking at actual testing of stateful TCP throughput, there
effectiveness test was run again, the blocking rate improved,
are even worse kinds of failures. Trying to transfer files that are
going from 53 attacks blocked to 395 out of 938 attacks blocked
over 5500 bytes in length causes massive amounts of transaction
(42.1%). This is a large improvement from before (though it’s still
failures. It’s not clear why this occurs, but this is something that
a VERY low block rate). It seems like turning on WF helped the
should never be placed into a real-world environment.
SG135 block more attacks, but looking at the logs showed no
Perhaps the only good thing that can be said about the Sophos
information about these attacks (see Figure 11).
SG135 is that during testing the IPv4 and IPv6 test results were
mostly similar. This is expected with a device that does everything
in CPU. There is an expectation that some performance may drop
slightly, which we see, though all the same problems that plague
IPv4 on this device are the same for IPv6.
Figure 11