User Tools

Site Tools


documentation:examples:ipsec_performance_lab_of_an_ibm_system_x3550_m3_with_intel_82580
no way to compare when less than two revisions

Differences

This shows you the differences between two versions of the page.


documentation:examples:ipsec_performance_lab_of_an_ibm_system_x3550_m3_with_intel_82580 [2017/01/22 16:45] (current) – created - external edit 127.0.0.1
Line 1: Line 1:
 +====== IPSec performance lab of an IBM System x3550 M3 with Intel 82580 ======
 +{{description>IPSec performance lab of a quad cores Xeon 2.13GHz and quad-port gigabit Intel 82580}}
 +===== Hardware detail =====
 +
 +This lab will test an [[IBM System x3550 M3]] with **quad** cores (Intel Xeon L5630 2.13GHz, hyper-threading disabled) and a quad NIC 82580 connected to the PCI-Express Bus.
 +
 +This CPU includes AES-NI: AES-CBC,AES-XTS,AES-GCM,AES-ICM.
 +===== Method used =====
 +
 +The benchmarking method used here is detailed in [[documentation:examples:Setting up a VPN (IPSec, GRE, etc...) performance benchmark lab]].
 +==== Diagram ====
 +
 +<code>
 ++---------------------+   +-------------------------------------+    +----------------------------------------+
 +|          R1                       IBM x3550 M3            |    |                     R3                 |
 +|   Packet generator  |             Device under Test            |              IPSec endpoint            |
 +|     and receiver    |                                          |                 (AES-NI)               |
 +|                                                              |                                        |
 +|igb2: 198.18.0.201/24|=>=| igb2: 198.18.0.202/24                  |                                        |
 +|       2001:2::201/64|   | 2001:2::202/64                      |    |                                        |
 +|    00:1b:21:d4:3f:2a|   | 00:1b:21:d3:8f:3e                      |                                        |
 +|                                                              |                                        |
 +|                                     igb3: 198.18.1.202/24 |==>=| igb2: 198.18.1.203/24                  |
 +|                                        2001:2:0:1::202/64 |    |    2001:2:0:1::203/64                  |
 +|                                         00:1b:21:d3:8f:3f |    |     00:1b:21:c4:95:7a                  |
 +|                                                              |                                        |
 +|                                    static routes          |    |             static routes              |
 +|                           198.19.0.0/16 => 198.18.1.203      |     198.19.0.0/16 => 198.19.0.201      |
 +|                           198.18.0.0/16 => 198.18.0.201      |     198.18.0.0/16 => 198.18.1.202      |
 +|                             2001:2::/49 => 2001:2::201    |    |       2001:2::/49 => 2001:2:0:1::202   |
 +|                       |2001:2:0:8000::/49 => 2001:2:0:1::203|    | 2001:2:0:8000::/49=>2001:2:0:8000::201 |
 +|                                                              |                                        |
 +|igb3: 198.19.0.201/24|                                          |         igb3: 198.19.0.203/24          |
 +|2001:2:0:8000::201/64|                                          |         2001:2:0:8000::203/64          |
 +|   00:1b:21:d4:3f:2b |                                          |          00:1b:21:c4:95:7b             |
 ++---------------------+   +-------------------------------------+    +----------------------------------------+
 +          ||                                                                           ||
 +   ==================================<============================================
 +</code>
 +
 +===== Devices configuration =====
 +
 +Almost the same as on the forwarding performance lab but with fastforwarding disabled (not compatible with IPsec).
 +
 +
 +==== R2 (DUT) ====
 +
 +Disable fastforwarding (not compliant with IPSec), configure IP address, routes and static IPSec.
 +
 +/etc/rc.conf:
 +<code>
 +# IPv4 router
 +gateway_enable="YES"
 +ifconfig_igb2="198.18.0.202/24 -tso4 -tso6 -lro"
 +ifconfig_igb3="198.18.1.202/24 -tso4 -tso6 -lro"
 +static_routes="generator receiver"
 +route_generator="-net 198.18.0.0/16 198.18.0.201"
 +route_receiver="-net 198.19.0.0/16 198.18.1.203"
 +static_arp_pairs="receiver generator"
 +static_arp_generator="198.18.0.201 00:1b:21:d4:3f:2a"
 +static_arp_receiver="198.18.1.203 00:1b:21:c4:95:7a"
 +
 +# IPv6 router
 +ipv6_gateway_enable="YES"
 +ipv6_activate_all_interfaces="YES"
 +ifconfig_igb2_ipv6="inet6 2001:2::202 prefixlen 64"
 +ifconfig_igb3_ipv6="inet6 2001:2:0:1::202 prefixlen 64"
 +ipv6_static_routes="generator receiver"
 +ipv6_route_generator="2001:2:: -prefixlen 49 2001:2::201"
 +ipv6_route_receiver="2001:2:0:8000:: -prefixlen 49 2001:2:0:1::203"
 +static_ndp_pairs="receiver generator"
 +static_ndp_generator="2001:2::201 00:1b:21:d4:3f:2a"
 +static_ndp_receiver="2001:2:0:1::203 00:1b:21:c4:95:7a"
 +
 +# Enabling IPSec
 +ipsec_enable="YES"
 +
 +# Enabling AES-NI
 +kld_list="aesni"
 +</code>
 +
 +/etc/ipsec.conf
 +
 +<code>
 +flush;
 +spdflush;
 +spdadd 198.18.0.0/16 198.19.0.0/16 any -P out ipsec esp/tunnel/198.18.1.202-198.18.1.203/require;
 +spdadd 198.19.0.0/16 198.18.0.0/16 any -P in ipsec esp/tunnel/198.18.1.203-198.18.1.202/require;
 +add 198.18.1.203 198.18.1.202 esp 0x1000 -E aes-gcm-16 "12345678901234567890";
 +add 198.18.1.202 198.18.1.203 esp 0x1001 -E aes-gcm-16 "12345678901234567890";
 +spdadd 2001:2::/49 2001:2:0:8000::/49 any -P out ipsec esp/tunnel/2001:2:0:1::202-2001:2:0:1::203/require;
 +spdadd 2001:2:0:8000::/49 2001:2::/49 any -P in ipsec esp/tunnel/2001:2:0:1::203-2001:2:0:1::202/require;
 +add 2001:2:0:1::203 2001:2:0:1::202 esp 0x1002 -E aes-gcm-16 "12345678901234567890";
 +add 2001:2:0:1::202 2001:2:0:1::203 esp 0x1003 -E aes-gcm-16 "12345678901234567890";
 +</code>
 +
 +==== R3 (reference) ====
 +
 +Disable fastforwarding (not compliant with IPSec), configure IP address, routes and static IPSec:
 +<code>
 +# IPv4 router
 +gateway_enable="YES"
 +ifconfig_igb2="inet 198.18.1.203/24"
 +ifconfig_igb3="inet 198.19.0.203/24"
 +
 +static_routes="generator receiver"
 +route_generator="-net 198.18.0.0/16 198.18.1.202"
 +route_receiver="-net 198.19.0.0/16 198.19.0.201"
 +static_arp_pairs="receiver generator"
 +static_arp_generator="198.18.1.202 00:1b:21:d3:8f:3f"
 +static_arp_receiver="198.19.0.201 00:1b:21:d4:3f:2b"
 +
 +# IPv6 router
 +ipv6_gateway_enable="YES"
 +ipv6_activate_all_interfaces="YES"
 +ifconfig_igb2_ipv6="inet6 2001:2:0:1::203 prefixlen 64"
 +ifconfig_igb3_ipv6="inet6 2001:2:0:8000::203 prefixlen 64"
 +
 +ipv6_static_routes="generator receiver"
 +ipv6_route_generator="2001:2:: -prefixlen 49 2001:2:0:1::202"
 +ipv6_route_receiver="2001:2:0:8000:: -prefixlen 49 2001:2:0:8000::201"
 +static_ndp_pairs="receiver generator"
 +static_ndp_generator="2001:2:0:1::202 00:1b:21:d3:8f:3f"
 +static_ndp_receiver="2001:2:0:8000::201 00:1b:21:d4:3f:2b"
 +
 +# Enabling IPSec
 +kld_list="aesni"
 +ipsec_enable="YES"
 +</code>
 +
 +/etc/ipsec.conf:
 +
 +<code>
 +flush;
 +spdflush;
 +spdadd 198.18.0.0/16 198.19.0.0/16 any -P in ipsec esp/tunnel/198.18.1.202-198.18.1.203/require;
 +spdadd 198.19.0.0/16 198.18.0.0/16 any -P out ipsec esp/tunnel/198.18.1.203-198.18.1.202/require;
 +add 198.18.1.203 198.18.1.202 esp 0x1000 -E aes-gcm-16 "12345678901234567890";
 +add 198.18.1.202 198.18.1.203 esp 0x1001 -E aes-gcm-16 "12345678901234567890";
 +spdadd 2001:2::/49 2001:2:0:8000::/49 any -P in ipsec esp/tunnel/2001:2:0:1::202-2001:2:0:1::203/require;
 +spdadd 2001:2:0:8000::/49 2001:2::/49 any -P out ipsec esp/tunnel/2001:2:0:1::203-2001:2:0:1::202/require;
 +add 2001:2:0:1::203 2001:2:0:1::202 esp 0x1002 -E aes-gcm-16 "12345678901234567890";
 +add 2001:2:0:1::202 2001:2:0:1::203 esp 0x1003 -E aes-gcm-16 "12345678901234567890";
 +</code>
 +
 +===== IPSec benchmark "Equilibrium throughput" method =====
 +
 +Once done, we start using a fast method for measuring the "IPsec equilibrium throughput" of the DUT.
 +
 +From the packet generator/receiver a simple script that use netmap-pktgen will do the job:
 +
 +<code>
 +[root@pkt-gen]~# equilibrium -u -4 -d 00:1b:21:d3:8f:3e -t igb2 -r igb3
 +Benchmark tool using equilibrium throughput method
 +- Benchmark mode: Bandwitdh (bps) for VPN gateway
 +- UDP load = 500B, IPv4 packet size=528B, Ethernet frame size=542B
 +- Link rate = 1000 Mb/s
 +- Tolerance = 0.01
 +Iteration 1
 +  - Offering load = 500 Mb/s
 +  - Step = 250 Mb/s
 +  - Measured forwarding rate = 500 Mb/s
 +Iteration 2
 +  - Offering load = 750 Mb/s
 +  - Step = 250 Mb/s
 +  - Trend = increasing
 +  - Measured forwarding rate = 750 Mb/s
 +Iteration 3
 +  - Offering load = 1000 Mb/s
 +  - Step = 250 Mb/s
 +  - Trend = increasing
 +  - Warning: Generated only 959Mb/s in place of 1000Mb/s
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 4
 +  - Offering load = 875 Mb/s
 +  - Step = 125 Mb/s
 +  - Trend = decreasing
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 5
 +  - Offering load = 937 Mb/s
 +  - Step = 62 Mb/s
 +  - Trend = increasing
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 6
 +  - Offering load = 906 Mb/s
 +  - Step = 31 Mb/s
 +  - Trend = decreasing
 +  - Measured forwarding rate = 872 Mb/s
 +Iteration 7
 +  - Offering load = 891 Mb/s
 +  - Step = 15 Mb/s
 +  - Trend = decreasing
 +  - Measured forwarding rate = 872 Mb/s
 +Estimated Equilibrium Ethernet throughput= 872 Mb/s (maximum value seen: 872 Mb/s)
 +</code>
 +
 +=> IPSec overhead prevent to reach 1Gb/s of clear traffic across an encrypted 1Gb/s link (974Mb/s seems to be the maximum in our case), but we reach about 872 Mb/s!
 +
 +==== Encryption algorithms ====
 +
 +{{documentation:examples:ipsec-ibm3550-fbsd11.0.png|Impact of IPSec encryption algorithms on 4 cores Xeon 2.13GHz with Intel 82580 NIC}}
 +
 +
 +
  
documentation/examples/ipsec_performance_lab_of_an_ibm_system_x3550_m3_with_intel_82580.txt · Last modified: 2017/01/22 16:45 by 127.0.0.1

Except where otherwise noted, content on this wiki is licensed under the following license: BSD 2-Clause
Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki