User Tools

Site Tools


documentation:examples:ipsec_performance_lab_of_an_ibm_system_x3550_m3_with_intel_82580

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

documentation:examples:ipsec_performance_lab_of_an_ibm_system_x3550_m3_with_intel_82580 [2017/01/22 16:45] (current)
Line 1: Line 1:
 +====== IPSec performance lab of an IBM System x3550 M3 with Intel 82580 ======
 +{{description>​IPSec performance lab of a quad cores Xeon 2.13GHz and quad-port gigabit Intel 82580}}
 +===== Hardware detail =====
 +
 +This lab will test an [[IBM System x3550 M3]] with **quad** cores (Intel Xeon L5630 2.13GHz, hyper-threading disabled) and a quad NIC 82580 connected to the PCI-Express Bus.
 +
 +This CPU includes AES-NI: AES-CBC,​AES-XTS,​AES-GCM,​AES-ICM.
 +===== Method used =====
 +
 +The benchmarking method used here is detailed in [[documentation:​examples:​Setting up a VPN (IPSec, GRE, etc...) performance benchmark lab]].
 +==== Diagram ====
 +
 +<​code>​
 ++---------------------+ ​  ​+-------------------------------------+ ​   +----------------------------------------+
 +|          R1         ​| ​  ​| ​            IBM x3550 M3            |    |                     ​R3 ​                |
 +|   ​Packet generator ​ |   ​| ​          ​Device under Test         ​| ​   |              IPSec endpoint ​           |
 +|     and receiver ​   |   ​| ​                                    ​| ​   |                 ​(AES-NI) ​              |
 +|                     ​| ​  ​| ​                                    ​| ​   |                                        |
 +|igb2: 198.18.0.201/​24|=>​=| igb2: 198.18.0.202/​24 ​              ​| ​   |                                        |
 +|       ​2001:​2::​201/​64| ​  | 2001:​2::​202/​64 ​                     |    |                                        |
 +|    00:​1b:​21:​d4:​3f:​2a| ​  | 00:​1b:​21:​d3:​8f:​3e ​                  ​| ​   |                                        |
 +|                     ​| ​  ​| ​                                    ​| ​   |                                        |
 +|                     ​| ​  ​| ​              igb3: 198.18.1.202/​24 |==>=| igb2: 198.18.1.203/​24 ​                 |
 +|                     ​| ​  ​| ​                 2001:​2:​0:​1::​202/​64 |    |    2001:​2:​0:​1::​203/​64 ​                 |
 +|                     ​| ​  ​| ​                  ​00:​1b:​21:​d3:​8f:​3f |    |     ​00:​1b:​21:​c4:​95:​7a ​                 |
 +|                     ​| ​  ​| ​                                    ​| ​   |                                        |
 +|                     ​| ​  ​| ​             static routes ​         |    |             ​static routes ​             |
 +|                     ​| ​  ​| ​    ​198.19.0.0/​16 => 198.18.1.203 ​  ​| ​   |     ​198.19.0.0/​16 => 198.19.0.201 ​     |
 +|                     ​| ​  ​| ​    ​198.18.0.0/​16 => 198.18.0.201 ​  ​| ​   |     ​198.18.0.0/​16 => 198.18.1.202 ​     |
 +|                     ​| ​  ​| ​      ​2001:​2::/​49 => 2001:​2::​201 ​   |    |       ​2001:​2::/​49 => 2001:​2:​0:​1::​202 ​  |
 +|                     ​| ​  ​|2001:​2:​0:​8000::/​49 => 2001:​2:​0:​1::​203| ​   | 2001:​2:​0:​8000::/​49=>​2001:​2:​0:​8000::​201 |
 +|                     ​| ​  ​| ​                                    ​| ​   |                                        |
 +|igb3: 198.19.0.201/​24| ​  ​| ​                                    ​| ​   |         igb3: 198.19.0.203/​24 ​         |
 +|2001:​2:​0:​8000::​201/​64| ​  ​| ​                                    ​| ​   |         ​2001:​2:​0:​8000::​203/​64 ​         |
 +|   ​00:​1b:​21:​d4:​3f:​2b |   ​| ​                                    ​| ​   |          00:​1b:​21:​c4:​95:​7b ​            |
 ++---------------------+ ​  ​+-------------------------------------+ ​   +----------------------------------------+
 +          ||                                                                           ||
 +   ==================================<​============================================
 +</​code>​
 +
 +===== Devices configuration =====
 +
 +Almost the same as on the forwarding performance lab but with fastforwarding disabled (not compatible with IPsec).
 +
 +
 +==== R2 (DUT) ====
 +
 +Disable fastforwarding (not compliant with IPSec), configure IP address, routes and static IPSec.
 +
 +/​etc/​rc.conf:​
 +<​code>​
 +# IPv4 router
 +gateway_enable="​YES"​
 +ifconfig_igb2="​198.18.0.202/​24 -tso4 -tso6 -lro"
 +ifconfig_igb3="​198.18.1.202/​24 -tso4 -tso6 -lro"
 +static_routes="​generator receiver"​
 +route_generator="​-net 198.18.0.0/​16 198.18.0.201"​
 +route_receiver="​-net 198.19.0.0/​16 198.18.1.203"​
 +static_arp_pairs="​receiver generator"​
 +static_arp_generator="​198.18.0.201 00:​1b:​21:​d4:​3f:​2a"​
 +static_arp_receiver="​198.18.1.203 00:​1b:​21:​c4:​95:​7a"​
 +
 +# IPv6 router
 +ipv6_gateway_enable="​YES"​
 +ipv6_activate_all_interfaces="​YES"​
 +ifconfig_igb2_ipv6="​inet6 2001:2::202 prefixlen 64"
 +ifconfig_igb3_ipv6="​inet6 2001:​2:​0:​1::​202 prefixlen 64"
 +ipv6_static_routes="​generator receiver"​
 +ipv6_route_generator="​2001:​2::​ -prefixlen 49 2001:​2::​201"​
 +ipv6_route_receiver="​2001:​2:​0:​8000::​ -prefixlen 49 2001:​2:​0:​1::​203"​
 +static_ndp_pairs="​receiver generator"​
 +static_ndp_generator="​2001:​2::​201 00:​1b:​21:​d4:​3f:​2a"​
 +static_ndp_receiver="​2001:​2:​0:​1::​203 00:​1b:​21:​c4:​95:​7a"​
 +
 +# Enabling IPSec
 +ipsec_enable="​YES"​
 +
 +# Enabling AES-NI
 +kld_list="​aesni"​
 +</​code>​
 +
 +/​etc/​ipsec.conf
 +
 +<​code>​
 +flush;
 +spdflush;
 +spdadd 198.18.0.0/​16 198.19.0.0/​16 any -P out ipsec esp/​tunnel/​198.18.1.202-198.18.1.203/​require;​
 +spdadd 198.19.0.0/​16 198.18.0.0/​16 any -P in ipsec esp/​tunnel/​198.18.1.203-198.18.1.202/​require;​
 +add 198.18.1.203 198.18.1.202 esp 0x1000 -E aes-gcm-16 "​12345678901234567890";​
 +add 198.18.1.202 198.18.1.203 esp 0x1001 -E aes-gcm-16 "​12345678901234567890";​
 +spdadd 2001:2::/49 2001:​2:​0:​8000::/​49 any -P out ipsec esp/​tunnel/​2001:​2:​0:​1::​202-2001:​2:​0:​1::​203/​require;​
 +spdadd 2001:​2:​0:​8000::/​49 2001:2::/49 any -P in ipsec esp/​tunnel/​2001:​2:​0:​1::​203-2001:​2:​0:​1::​202/​require;​
 +add 2001:​2:​0:​1::​203 2001:​2:​0:​1::​202 esp 0x1002 -E aes-gcm-16 "​12345678901234567890";​
 +add 2001:​2:​0:​1::​202 2001:​2:​0:​1::​203 esp 0x1003 -E aes-gcm-16 "​12345678901234567890";​
 +</​code>​
 +
 +==== R3 (reference) ====
 +
 +Disable fastforwarding (not compliant with IPSec), configure IP address, routes and static IPSec:
 +<​code>​
 +# IPv4 router
 +gateway_enable="​YES"​
 +ifconfig_igb2="​inet 198.18.1.203/​24"​
 +ifconfig_igb3="​inet 198.19.0.203/​24"​
 +
 +static_routes="​generator receiver"​
 +route_generator="​-net 198.18.0.0/​16 198.18.1.202"​
 +route_receiver="​-net 198.19.0.0/​16 198.19.0.201"​
 +static_arp_pairs="​receiver generator"​
 +static_arp_generator="​198.18.1.202 00:​1b:​21:​d3:​8f:​3f"​
 +static_arp_receiver="​198.19.0.201 00:​1b:​21:​d4:​3f:​2b"​
 +
 +# IPv6 router
 +ipv6_gateway_enable="​YES"​
 +ipv6_activate_all_interfaces="​YES"​
 +ifconfig_igb2_ipv6="​inet6 2001:​2:​0:​1::​203 prefixlen 64"
 +ifconfig_igb3_ipv6="​inet6 2001:​2:​0:​8000::​203 prefixlen 64"
 +
 +ipv6_static_routes="​generator receiver"​
 +ipv6_route_generator="​2001:​2::​ -prefixlen 49 2001:​2:​0:​1::​202"​
 +ipv6_route_receiver="​2001:​2:​0:​8000::​ -prefixlen 49 2001:​2:​0:​8000::​201"​
 +static_ndp_pairs="​receiver generator"​
 +static_ndp_generator="​2001:​2:​0:​1::​202 00:​1b:​21:​d3:​8f:​3f"​
 +static_ndp_receiver="​2001:​2:​0:​8000::​201 00:​1b:​21:​d4:​3f:​2b"​
 +
 +# Enabling IPSec
 +kld_list="​aesni"​
 +ipsec_enable="​YES"​
 +</​code>​
 +
 +/​etc/​ipsec.conf:​
 +
 +<​code>​
 +flush;
 +spdflush;
 +spdadd 198.18.0.0/​16 198.19.0.0/​16 any -P in ipsec esp/​tunnel/​198.18.1.202-198.18.1.203/​require;​
 +spdadd 198.19.0.0/​16 198.18.0.0/​16 any -P out ipsec esp/​tunnel/​198.18.1.203-198.18.1.202/​require;​
 +add 198.18.1.203 198.18.1.202 esp 0x1000 -E aes-gcm-16 "​12345678901234567890";​
 +add 198.18.1.202 198.18.1.203 esp 0x1001 -E aes-gcm-16 "​12345678901234567890";​
 +spdadd 2001:2::/49 2001:​2:​0:​8000::/​49 any -P in ipsec esp/​tunnel/​2001:​2:​0:​1::​202-2001:​2:​0:​1::​203/​require;​
 +spdadd 2001:​2:​0:​8000::/​49 2001:2::/49 any -P out ipsec esp/​tunnel/​2001:​2:​0:​1::​203-2001:​2:​0:​1::​202/​require;​
 +add 2001:​2:​0:​1::​203 2001:​2:​0:​1::​202 esp 0x1002 -E aes-gcm-16 "​12345678901234567890";​
 +add 2001:​2:​0:​1::​202 2001:​2:​0:​1::​203 esp 0x1003 -E aes-gcm-16 "​12345678901234567890";​
 +</​code>​
 +
 +===== IPSec benchmark "​Equilibrium throughput"​ method =====
 +
 +Once done, we start using a fast method for measuring the "IPsec equilibrium throughput"​ of the DUT.
 +
 +From the packet generator/​receiver a simple script that use netmap-pktgen will do the job:
 +
 +<​code>​
 +[root@pkt-gen]~#​ equilibrium -u -4 -d 00:​1b:​21:​d3:​8f:​3e -t igb2 -r igb3
 +Benchmark tool using equilibrium throughput method
 +- Benchmark mode: Bandwitdh (bps) for VPN gateway
 +- UDP load = 500B, IPv4 packet size=528B, Ethernet frame size=542B
 +- Link rate = 1000 Mb/s
 +- Tolerance = 0.01
 +Iteration 1
 +  - Offering load = 500 Mb/s
 +  - Step = 250 Mb/s
 +  - Measured forwarding rate = 500 Mb/s
 +Iteration 2
 +  - Offering load = 750 Mb/s
 +  - Step = 250 Mb/s
 +  - Trend = increasing
 +  - Measured forwarding rate = 750 Mb/s
 +Iteration 3
 +  - Offering load = 1000 Mb/s
 +  - Step = 250 Mb/s
 +  - Trend = increasing
 +  - Warning: Generated only 959Mb/s in place of 1000Mb/s
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 4
 +  - Offering load = 875 Mb/s
 +  - Step = 125 Mb/s
 +  - Trend = decreasing
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 5
 +  - Offering load = 937 Mb/s
 +  - Step = 62 Mb/s
 +  - Trend = increasing
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 6
 +  - Offering load = 906 Mb/s
 +  - Step = 31 Mb/s
 +  - Trend = decreasing
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 7
 +  - Offering load = 891 Mb/s
 +  - Step = 15 Mb/s
 +  - Trend = decreasing
 +  - Measured forwarding rate = 872 Mb/s
 +Estimated Equilibrium Ethernet throughput= 872 Mb/s (maximum value seen: 872 Mb/s)
 +</​code>​
 +
 +=> IPSec overhead prevent to reach 1Gb/s of clear traffic across an encrypted 1Gb/s link (974Mb/s seems to be the maximum in our case), but we reach about 872 Mb/s!
 +
 +==== Encryption algorithms ====
 +
 +{{documentation:​examples:​ipsec-ibm3550-fbsd11.0.png|Impact of IPSec encryption algorithms on 4 cores Xeon 2.13GHz with Intel 82580 NIC}}
 +
 +
 +
  
documentation/examples/ipsec_performance_lab_of_an_ibm_system_x3550_m3_with_intel_82580.txt ยท Last modified: 2017/01/22 16:45 (external edit)