250 likes | 461 Views
Do your Web-Applications Deliver on Expectations? SVWG November 2003. Agenda. Framework Key Enterprise Challenges Comprehensive Testing Helps Summary. Internet . Router. Perimeter Security. IDS. Firewall. Enterprise Intranet . Firewall. SSL. SLB. Finance . Server Farm .
E N D
Do your Web-Applications Deliver on Expectations?SVWG November 2003
Agenda • Framework • Key Enterprise Challenges • Comprehensive Testing Helps • Summary Do not redistribute without permission
Internet Router Perimeter Security IDS Firewall Enterprise Intranet Firewall SSL SLB Finance Server Farm Engineering What are We Trying to Solve? Do not redistribute without permission
Enterprise Challenges New Applications New Attacks Performance Degradations Daily maintenance Do More with Less ?! Do not redistribute without permission
The Easy Way Out Do not redistribute without permission
A “Realistic” Approach Web Application Developers Enterprise Security Network IT Infrastructure • Regression Testing • Deployment Testing • Vulnerability Testing • Risk Mitigation • Asset Management • Uptime: 24x7xforever COMPREHENSIVE Testing is key to all three focus areas Do not redistribute without permission
Web-application Rollout Process Evaluate solutions to new business drivers Application Requirements New Drivers Requirements Deployment Lab Evalulation Feedback from live deployments “Realism” Simulations Highest Risk: Lab Evaluations to Live Deployments Do not redistribute without permission
Web Application Firewall Load Balancer Router SSL Scaler Web Server Application Server Database Server What are “Web Applications” 3 tiers by 3 tiers Do not redistribute without permission
Web Applications: Challenges • Inability to scale across more users • Asymmetric load across multiple tiers • Tuning issues • Resource allocation issues • Bottleneck and fault isolation in 3 tiers • Bad user experience: adaptability to load and devices • Plus: Security + IT infrastructure challenges Do not redistribute without permission
Web Applications: Example • DMV in Mid-West • Customer wanted to roll-out to handle 100s of requests per second • Architected solution for that • Brought us in to test • Actual result – handled only 10s of requests per second • Had to re-architect entire site - application server was not fast enough! Do not redistribute without permission
Other Effects: Example - Link Speeds * Source: Nielsen/Netratings, July 2001 Do not redistribute without permission
The Effect of Link Speed * Source: Caw Networks Realism Study, February 2002 Do not redistribute without permission
Effect of Link Speed on Users Average Application Response Time (ms) 16000 14371 14000 12000 10000 milliseconds 8000 4821 6000 4000 2616 1081 2000 352 86 19 0 9.6 Kbps 28.8 53 Kbps 128 384 1.5 100 WAP Kbps Dialup Kbps Kbps Mbps T1 Mbps Dialup ISDN DSL LAN Do not redistribute without permission
Aspects of Security • Security Policies = Processes + People + Network + Applications Focus on: Network and Application-layer security Do not redistribute without permission
Security Implementation Challenges • Enterprise-wide buy in to policies • Wrong choice of topology • Incorrect choice of devices • Poor configurations Do not redistribute without permission
Security Testing Solutions • An example of a real live benchmark for a security consulting company: • Testing with data • Testing with multiple protocols • Testing at realistic load points • Candidate: • High-end 10,000 connections per second firewall Do not redistribute without permission
Max CPS with Data With HTTP FW able to accomplish 2234 CPS Breakpoint Do not redistribute without permission
Multi protocol: HTTP and FTP CPS Addition of FTP cuts performance by more than 75%!!! Most Network administrators would Never even test for this Real traffic, Real applications make a difference Do not redistribute without permission
Effect of Open Connections IncompleteTransactions at 100K open Do not redistribute without permission
Net Result: Poor User Experience Unfortunately most experience timeout Do not redistribute without permission
What are “IT Infrastructures”? Do not redistribute without permission
Recommended Testing Practices • Key methodologies: • Device testing • Network testing • End to end system testing • Test before deployment • Test every change • Test with realism! Do not redistribute without permission
IT Infrastructure Impact • What can go wrong? • Unknown bottlenecks in end-to-end devices • Bad firmware/software updates • Guessing during rearchitecture/consolidation • Inability to localize faults quickly • Availability under attack Do not redistribute without permission
Summary • Web Applications are more than Web Applications • Identify and mitigate risk with comprehensive testing • Actually do more with less! Do not redistribute without permission
Thank You! Contact us: hgodbole@spirentcom.com rchua@spirentcom.com