rfc9411v2.txt   rfc9411.txt 
skipping to change at line 98 skipping to change at line 98
7.3. HTTP Throughput 7.3. HTTP Throughput
7.3.1. Objective 7.3.1. Objective
7.3.2. Test Setup 7.3.2. Test Setup
7.3.3. Test Parameters 7.3.3. Test Parameters
7.3.4. Test Procedures and Expected Results 7.3.4. Test Procedures and Expected Results
7.4. HTTP Transaction Latency 7.4. HTTP Transaction Latency
7.4.1. Objective 7.4.1. Objective
7.4.2. Test Setup 7.4.2. Test Setup
7.4.3. Test Parameters 7.4.3. Test Parameters
7.4.4. Test Procedures and Expected Results 7.4.4. Test Procedures and Expected Results
7.5. Concurrent TCP/HTTP Connection Capacity 7.5. Concurrent TCP Connection Capacity with HTTP Traffic
7.5.1. Objective 7.5.1. Objective
7.5.2. Test Setup 7.5.2. Test Setup
7.5.3. Test Parameters 7.5.3. Test Parameters
7.5.4. Test Procedures and Expected Results 7.5.4. Test Procedures and Expected Results
7.6. TCP or QUIC Connections per Second with HTTPS Traffic 7.6. TCP or QUIC Connections per Second with HTTPS Traffic
7.6.1. Objective 7.6.1. Objective
7.6.2. Test Setup 7.6.2. Test Setup
7.6.3. Test Parameters 7.6.3. Test Parameters
7.6.4. Test Procedures and Expected Results 7.6.4. Test Procedures and Expected Results
7.7. HTTPS Throughput 7.7. HTTPS Throughput
skipping to change at line 540 skipping to change at line 540
Note 3: In the event that the DUT/SUT is designed to not use ACLs, it Note 3: In the event that the DUT/SUT is designed to not use ACLs, it
is acceptable to conduct tests without them. However, this MUST be is acceptable to conduct tests without them. However, this MUST be
noted in the test report. noted in the test report.
4.2.1. Security Effectiveness Configuration 4.2.1. Security Effectiveness Configuration
The selected security features (defined in Tables 2 and 3) of the The selected security features (defined in Tables 2 and 3) of the
DUT/SUT MUST be configured effectively to detect, prevent, and report DUT/SUT MUST be configured effectively to detect, prevent, and report
the defined security vulnerability sets. This section defines the the defined security vulnerability sets. This section defines the
selection of the security vulnerability sets from the Common selection of the security vulnerability sets from the Common
Vulnerabilities and Exposures (CVEs) list for testing. The Vulnerabilities and Exposures (CVEs) list [CVE] for testing. The
vulnerability set should reflect a minimum of 500 CVEs from no older vulnerability set should reflect a minimum of 500 CVEs from no older
than 10 calendar years to the current year. These CVEs should be than 10 calendar years to the current year. These CVEs should be
selected with a focus on in-use software commonly found in business selected with a focus on in-use software commonly found in business
applications, with a Common Vulnerability Scoring System (CVSS) applications, with a Common Vulnerability Scoring System (CVSS)
Severity of High (7-10). Severity of High (7-10).
This document is primarily focused on performance benchmarking. This document is primarily focused on performance benchmarking.
However, it is RECOMMENDED to validate the security features However, it is RECOMMENDED to validate the security features
configuration of the DUT/SUT by evaluating the security effectiveness configuration of the DUT/SUT by evaluating the security effectiveness
as a prerequisite for performance benchmarking tests defined in as a prerequisite for performance benchmarking tests defined in
skipping to change at line 1827 skipping to change at line 1827
The test equipment MUST start to measure and record all specified The test equipment MUST start to measure and record all specified
KPIs. Continue the test until all traffic profile phases are KPIs. Continue the test until all traffic profile phases are
completed. completed.
Within the test results validation criteria, the DUT/SUT MUST reach Within the test results validation criteria, the DUT/SUT MUST reach
the desired value of the target objective in the sustain phase. the desired value of the target objective in the sustain phase.
Measure the minimum, average, and maximum values of the TTFB and Measure the minimum, average, and maximum values of the TTFB and
TTLB. TTLB.
7.5. Concurrent TCP/HTTP Connection Capacity 7.5. Concurrent TCP Connection Capacity with HTTP Traffic
7.5.1. Objective 7.5.1. Objective
Determine the number of concurrent TCP connections that the DUT/SUT Determine the number of concurrent TCP connections that the DUT/SUT
sustains when using HTTP traffic. sustains when using HTTP traffic.
7.5.2. Test Setup 7.5.2. Test Setup
The testbed setup MUST be configured as defined in Section 4. Any The testbed setup MUST be configured as defined in Section 4. Any
specific testbed configuration changes (number of interfaces, specific testbed configuration changes (number of interfaces,
skipping to change at line 2666 skipping to change at line 2666
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
10.2. Informative References 10.2. Informative References
[CVE] CVE, "Current CVSS Score Distribution For All
Vulnerabilities", <https://www.cvedetails.com/>.
[fastly] Oku, K. and J. Iyengar, "QUIC vs TCP: Which is Better?", [fastly] Oku, K. and J. Iyengar, "QUIC vs TCP: Which is Better?",
April 2020, <https://www.fastly.com/blog/measuring-quic- April 2020, <https://www.fastly.com/blog/measuring-quic-
vs-tcp-computational-efficiency>. vs-tcp-computational-efficiency>.
[RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for [RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for
Network Interconnect Devices", RFC 2544, Network Interconnect Devices", RFC 2544,
DOI 10.17487/RFC2544, March 1999, DOI 10.17487/RFC2544, March 1999,
<https://www.rfc-editor.org/info/rfc2544>. <https://www.rfc-editor.org/info/rfc2544>.
[RFC2647] Newman, D., "Benchmarking Terminology for Firewall [RFC2647] Newman, D., "Benchmarking Terminology for Firewall
 End of changes. 4 change blocks. 
3 lines changed or deleted 6 lines changed or added

This html diff was produced by rfcdiff 1.48.