Browse Prior Art Database

Benchmarking Terminology for Firewall Performance (RFC2647)

IP.com Disclosure Number: IPCOM000003235D
Original Publication Date: 1999-Aug-01
Included in the Prior Art Database: 2000-Sep-13
Document File: 22 page(s) / 42K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

D. Newman: AUTHOR

Abstract

This document defines terms used in measuring the performance of firewalls. It extends the terminology already used for benchmarking routers and switches with definitions specific to firewalls.

This text was extracted from a ASCII document.
This is the abbreviated version, containing approximately 6% of the total text.

Network Working Group D. Newman

Request for Comments: 2647 Data Communications

Category: Informational August 1999

Benchmarking Terminology for Firewall Performance

Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1999). All Rights Reserved.

Table of Contents

1. Introduction...................................................2

2. Existing definitions...........................................2

3. Term definitions...............................................3

3.1 Allowed traffic...............................................3

3.2 Application proxy.............................................3

3.3 Authentication................................................4

3.4 Bit forwarding rate...........................................5

3.5 Circuit proxy.................................................6

3.6 Concurrent connections........................................6

3.7 Connection....................................................7

3.8 Connection establishment......................................9

3.9 Connection establishment time.................................9

3.10 Connection maintenance......................................10

3.11 Conection overhead..........................................11

3.12 Connection teardown.........................................11

3.13 Connection teardown time....................................12

3.14 Data source.................................................12

3.15 Demilitarized zone..........................................13

3.16 Firewall....................................................13

3.17 Goodput.....................................................14

3.18 Homed.......................................................15

3.19 Illegal traffic.............................................15

3.20 Logging.....................................................16

3.21 Network address translation.................................16

3.22 Packet filtering............................................17

3.23 Policy......................................................17

3.24 Protected network...........................................18

3.25 Proxy.......................................................19

3.26 Rejected traffic............................................19

3.27 Rule set....................................................20

3.28 Security associati...