UL SUBJECT 2825-2011 OUTLINE OF INVESTIGATION FOR RESILIENCY OF NETWORK INFRASTRUCTURE COMPONENTS (Issue Number 1)《网络基础设施组件弹性调查大纲》.pdf
《UL SUBJECT 2825-2011 OUTLINE OF INVESTIGATION FOR RESILIENCY OF NETWORK INFRASTRUCTURE COMPONENTS (Issue Number 1)《网络基础设施组件弹性调查大纲》.pdf》由会员分享,可在线阅读,更多相关《UL SUBJECT 2825-2011 OUTLINE OF INVESTIGATION FOR RESILIENCY OF NETWORK INFRASTRUCTURE COMPONENTS (Issue Number 1)《网络基础设施组件弹性调查大纲》.pdf(10页珍藏版)》请在麦多课文档分享上搜索。
1、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULJanuary 31, 20111SUBJECT 2825OUTLINE OF INVESTIGATIONFORRESILIENCY OF NETWORK INFRASTRUCTURE COMPONENTSIssue Number: 1JANUARY 31, 2011Summary of TopicsThis is the first issue of the Outline of In
2、vestigation for Resiliency ofNetwork Infrastructure Components, Subject 2825. This outline describesthe test standard by which network infrastructure devices are evaluatedagainst published vulnerabilities that affect a particular device. The deviceis expected to continue to operate as intended while
3、 subjected toexploits of published vulnerabilities. An example of a publishedvulnerability from National Institute of Standards and Technology NationalVulnerability Database (NVD) may describe multiple buffer overflows in aparticular device. This outline does not evaluate the effectiveness of aprodu
4、ct to defend against or counter an exploit of a publishedvulnerability but its ability to continue to operate as intended per themanufacturers claims of performance while subjected to the exploit(s)under the test criteria of the published vulnerabilities.COPYRIGHT 2011 UNDERWRITERS LABORATORIES INC.
5、UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULJANUARY 31, 2011SUBJECT 28252No Text on This PageUL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULCONTENTSINTRODUCTION1 Scope .42 General 4
6、2.1 Units of Measurement .42.2 Undated References 43 Glossary .5PERFORMANCE4 General 64.1 Test Samples and Data .64.2 Physical Connection 65 Frames 76 Normal Throughput Test .87 Exception Test 88 Resiliency Test .99 Markings 10JANUARY 31, 2011 SUBJECT 2825 3UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR
7、 FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM ULINTRODUCTION1 Scope1.1 This network device resiliency outline applies to the performance of individual network infrastructureequipment. It is intended to determine the ability of such equipment to continue to operate as intendedper manuf
8、acturers claims of performance under specific network traffic while being subjected to exploitsof published vulnerabilities.1.2 This outline applies to the following key network infrastructure components: switches, routers, proxies, firewalls, intrusion prevention systems, load balancers, universal
9、threat management devices, and converged network server equipment.2 General2.1 Units of Measurement2.1.1 Values stated without parentheses are the requirement. Values in parentheses are explanatory orapproximate information.2.2 Undated References2.2.1 Any undated reference to a code or standard appe
10、aring in the requirements of this standard shallbe interpreted as referring to the latest edition of that code or standard.JANUARY 31, 2011SUBJECT 28254UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL3 Glossary3.1 CONVERGED NETWORK SERVER EQUI
11、PMENT A device offering converged network andserver capabilities. A device that may have the combined abilities of a switch, router, firewall, intrusionprevention system, load balancer, proxy or universal threat management device and typical server typecapabilities, including server virtualization.3
12、.2 FIREWALL A network device that applies security policies to traffic.3.3 INTRUSION PREVENTION SYSTEM A data link layer network device that connects to segmentsof a network layer, detects attacks and attempts to counter the attacks.3.4 LOAD BALANCER A device that directs incoming traffic to one or
13、more servers along multipleroutes.3.5 MANUFACTURERS CLAIM OF PERFORMANCE The network performance specifications of theproduct, against which the product is tested. Network throughput performance specifications included inthe operating instructions and/or product literature is considered to be manufa
14、cturer claims.3.6 NETWORK TRAFFIC Network data streams comprised of multiple application types.3.7 PROXY An intermediate device that translates a request for services from its input andregenerates the request via its output.3.8 ROUTER A networking device that connects and directs packets between dif
15、ferent data linklayer networks.3.9 SWITCH A data link layer networking device that connects different segments on the samenetwork layer.3.10 TEST EQUIPMENT Specialized test equipment to perform the testing.3.11 UNIVERSAL THREAT MANAGEMENT DEVICE A network layer device that can performseveral functio
16、ns of a switch, router, firewall, intrusion prevention system, load balancer or proxy to thenetwork traffic including security.3.12 VULNERABILITY A description of an individual product or individual technologys security flawthat has the potential to allow a negative behavior in the product. Vulnerab
17、ilities are discovered eithervia research or in the field.3.13 VULNERABILITY DATABASE A public repository of vulnerability descriptions (e.g. NISTNational Vulnerability Database).JANUARY 31, 2011 SUBJECT 2825 5UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PER
18、MISSION FROM ULPERFORMANCE4 General4.1 Test Samples and Data4.1.1 All network devices to be used for all tests must be fully representative of production units at thetime of the test.4.1.2 No substitute devices or components can be used and no accessories can be used if not intendedto be used with t
19、he product in service.4.1.3 The following samples are to be provided for testing:a) One sample of completed assembly provided in production form.b) Installation and operating instructions.c) Detailed configuration instructions as provided by the manufacturer to support independentconfigurations of t
20、he product.4.1.4 All network traffic will be applied sequentially and continuously during the course of testing. Networktraffic will be applied to match relevant vendor throughput performance specifications including data,connection rate and total connections.4.1.5 Each product shall be tested with
21、every valid software option enabled simultaneously, as per themanufacturers instructions.4.1.6 Each product shall be separately tested in every valid hardware configuration, as per themanufacturers instructions.4.2 Physical Connection4.2.1 For all tests, the product is connected through ANSI/TIA/EIA
22、 568A-5 unshielded twisted pair ULtested and verified copper cabling (commonly called CAT-5e), or ANSI/TIA/EIA 568-B.1 unshieldedtwisted pair UL tested and verified copper cabling (commonly called CAT-6), or single mode fiber opticcabling UL tested and verified.4.2.2 The network cable shall be at a
23、minimum 25 feet in length.4.2.3 Each physical network port on a given product used for functionality will be tested. When more thanone physical port exists, the tests will be performed on each individual port as both an input and an output.A random sampling of multiple ports shall be designated as i
24、nput and a random sampling as output fornormal bidirectional testing. A dedicated network management port is not required to be tested.JANUARY 31, 2011SUBJECT 28256UL COPYRIGHTED MATERIAL NOT AUTHORIZED FOR FURTHER REPRODUCTION ORDISTRIBUTION WITHOUT PERMISSION FROM UL5 Frames5.1 Frames shall be use
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ULSUBJECT28252011OUTLINEOFINVESTIGATIONFORRESILIENCYOFNETWORKINFRASTRUCTURECOMPONENTSISSUENUMBER1 网络

链接地址:http://www.mydoc123.com/p-1069353.html