Sorry for late response to my own thread :)

After almost 2 years I got same performance issues. I have 2 test
boxes (i5 CPU 650 @ 3.20GHz, 3192.42 MHz and i5-3470 CPU @ 3.20GHz,
3193.26 MHz) both with AES-NI support and this time I have a chance to
reply with  my results.

1) Without IPSEC I'm getting ± 920 Mbit/sec
2) With IPSEC and aes-128 or aes-256 enc I'm getting ± 270 Mbits/sec
3) With IPSEC and aes-128-gcm or aes-256-gcm enc I'm getting ± 600 Mbits/sec

All tests were done on -stable which is 5.6 GENERIC.MP#0 amd64.

I did traffic generation on same boxes I have IPSEC peers, this
resulted to high CPU usage on CPU0 on both boxes (± 80% on client and
± 55% on server), so this test is not 100% accurate from maximum
possible performance of view.

Did anybody have significantly better results? Any luck to improve
ipsec performance today?

Power of Proof:
Screenshot with my test results http://snag.gy/EmrTw.jpg
Screenshot top during test: http://snag.gy/p0HJT.jpg

cat ipsec.conf

ike esp from 192.168.7.226 to 192.168.8.114 \
        main auth hmac-sha1 enc aes-256 group modp1024 \
        quick enc aes-256-gcm group modp1024 \
        psk "12345678"

--
Evgeniy Sudyr

On Mon, Jul 22, 2013 at 11:42 AM, Evgeniy Sudyr <[email protected]> wrote:
> Thank you alot! I will try to repeat testing with -gcm today.
>
>
> On Mon, Jul 22, 2013 at 10:16 AM, BARDOU Pierre <[email protected]> wrote:
>>
>> Hi,
>>
>> The testbed has been reused since I ran the tests, but the config was
>> something standard like :
>>
>> ike esp from a.b.c.d/24  to e.f.g.h/24 peer i.j.k.l \
>>         main auth hmac-sha1 enc aes-256 \
>>         quick auth hmac-sha1 enc aes-256 psk "secret"
>>
>> If I remember well, for AES-GCM, there is no AUTH parameter, and it is
>> phase 2 only. So it was something like :
>> ike esp from a.b.c.d/24  to e.f.g.h/24 peer i.j.k.l \
>>         main auth hmac-sha1 enc aes-256 \
>>         quick enc aes-256-gcm psk "secret"
>>
>> If I've made syntax errors ipssecctl will tell you quickly btw.
>>
>> --
>> Cordialement,
>> Pierre BARDOU
>>
>> De : Evgeniy Sudyr [mailto:[email protected]]
>> Envoyé : dimanche 21 juillet 2013 13:17
>> À : BARDOU Pierre
>> Cc : [email protected]
>> Objet : Re: OpenBSD ipsec performance on modern HW
>>
>> All,
>>
>> during my tests I seen that CPU on all cores and memory usage was very
>> low.
>> Just interesting if there are any bottlenecks and how to fix them.
>> 1) Does anybody care tcp stack tuning for high speed IPSEC ?
>> 2) Can I run IPSEC (that's isakmpd ?) on other cores?
>>
>> Pierre,
>> can you share your ipsec config to check same on my side.
>>
>
>
>
> --
> --
> With regards,
> Eugene Sudyr



-- 
--
With regards,
Eugene Sudyr

Reply via email to