Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPsec-MB use case

    Scheduled Pinned Locked Moved General pfSense Questions
    9 Posts 5 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      Im running a SG-6100.

      Im confused if this should be enabled at all considering this one-liner in the documentation

      Generally speaking, this acceleration is faster than software alone or AES-NI, but slower than QAT.
      

      Because i care about throughput mainly when it comes to my VPN should i enable this? QAT is running on my system by default.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        If you're using AES-GCM stick with QAT on the 6100.

        Steve

        cwagzC 1 Reply Last reply Reply Quote 3
        • cwagzC
          cwagz @stephenw10
          last edited by

          @stephenw10 I have both QAT and IPsec-MB enabled on my 6100. Does the system choose the best one based on other settings or would it be better to just disable IPsec-MB. My VPN is using AES-GCM.

          Netgate 6100 MAX

          SebMS 1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            I would disable IIMB to be sure it's using QAT which will be faster for AES-GCM.

            I'm unsure exactly what would take priority there. I'll try to find out....

            1 Reply Last reply Reply Quote 1
            • SebMS
              SebM @cwagz
              last edited by

              @cwagz from this page: IPsec-MB

              If IPsec-MB and QAT are both enabled, IPsec-MB will take over handling of AES-GCM acceleration. QAT accelerates AES-GCM faster than IPsec-MB, but IPsec-MB can accelerate ChaCha20-Poly1305 which is not supported by QAT. Depending on the required performance of each algorithm it may be better to only enable QAT, or to enable both, but it depends on the environment and workload.

              1 Reply Last reply Reply Quote 1
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Yes, that is the case currently.
                However there is a sysctl you can disable to prevent IIMB registering for AES-CBC (kern.crypto.iimb.enable_aescbc). It would be nice to have other options there. ๐Ÿ˜‰

                M 1 Reply Last reply Reply Quote 1
                • M
                  mcury @stephenw10
                  last edited by

                  @stephenw10 said in IPsec-MB use case:

                  disable to prevent IIMB registering for AES-CBC (kern.crypto.iimb.enable_aescbc)

                  That would be nice indeed. Do you know if this is possible with AES-GCM too ?

                  dead on arrival, nowhere to be found.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Currently there is only a user ctl for AES-CBC.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      mcury @stephenw10
                      last edited by

                      @stephenw10 said in IPsec-MB use case:

                      Currently there is only a user ctl for AES-CBC.

                      Thanks stephenw10. ๐Ÿ‘
                      Hope they add this option in the future.

                      dead on arrival, nowhere to be found.

                      1 Reply Last reply Reply Quote 2
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.