Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PFsense on a Poweredge 1850

    Scheduled Pinned Locked Moved Hardware
    25 Posts 6 Posters 4.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V Offline
      vman76
      last edited by

      @bryan.paradis:

      That is looking better for sure. mind posting the sysctl for that guy? Also what size packets are you using or were using in the test?

      Sure, here is the current data . The firewall is now in production and averaging 150Mbps, @ 24,000 PPS with no issues since around noon. I tried various iperfs but the money spot was this one:

      iperf -c –w 65000 –t 600 –P5

      Which should use the full Ethernet frame. I tried a bunch of other windows sizes and more flows (up to -P 50) along with UDP tests. The above gave me the best results.Looking at the distribution of packets on the last firewall, and on routes netflow roue-cache the students use mostly applications with large packets (video streaming, filesharing etc). I'd like to have done some more testing but time constraints did not allow it.

      dev.em.0.%desc: Intel(R) PRO/1000 Network Connection 7.3.2
      dev.em.0.%driver: em
      dev.em.0.%location: slot=0 function=0
      dev.em.0.%pnpinfo: vendor=0x8086 device=0x10a4 subvendor=0x8086 subdevice=0x10a4 class=0x020000
      dev.em.0.%parent: pci14
      dev.em.0.nvm: -1
      dev.em.0.debug: -1
      dev.em.0.fc: 3
      dev.em.0.rx_int_delay: 0
      dev.em.0.tx_int_delay: 66
      dev.em.0.rx_abs_int_delay: 66
      dev.em.0.tx_abs_int_delay: 66
      dev.em.0.rx_processing_limit: 100
      dev.em.0.eee_control: 0
      dev.em.0.link_irq: 0
      dev.em.0.mbuf_alloc_fail: 0
      dev.em.0.cluster_alloc_fail: 0
      dev.em.0.dropped: 0
      dev.em.0.tx_dma_fail: 0
      dev.em.0.rx_overruns: 0
      dev.em.0.watchdog_timeouts: 0
      dev.em.0.device_control: 1209795137
      dev.em.0.rx_control: 67141634
      dev.em.0.fc_high_water: 30720
      dev.em.0.fc_low_water: 29220
      dev.em.0.queue0.txd_head: 192
      dev.em.0.queue0.txd_tail: 192
      dev.em.0.queue0.tx_irq: 0
      dev.em.0.queue0.no_desc_avail: 0
      dev.em.0.queue0.rxd_head: 531
      dev.em.0.queue0.rxd_tail: 530
      dev.em.0.queue0.rx_irq: 0
      dev.em.0.mac_stats.excess_coll: 0
      dev.em.0.mac_stats.single_coll: 0
      dev.em.0.mac_stats.multiple_coll: 0
      dev.em.0.mac_stats.late_coll: 0
      dev.em.0.mac_stats.collision_count: 0
      dev.em.0.mac_stats.symbol_errors: 0
      dev.em.0.mac_stats.sequence_errors: 0
      dev.em.0.mac_stats.defer_count: 5793
      dev.em.0.mac_stats.missed_packets: 0
      dev.em.0.mac_stats.recv_no_buff: 139
      dev.em.0.mac_stats.recv_undersize: 0
      dev.em.0.mac_stats.recv_fragmented: 0
      dev.em.0.mac_stats.recv_oversize: 0
      dev.em.0.mac_stats.recv_jabber: 0
      dev.em.0.mac_stats.recv_errs: 0
      dev.em.0.mac_stats.crc_errs: 0
      dev.em.0.mac_stats.alignment_errs: 0
      dev.em.0.mac_stats.coll_ext_errs: 0
      dev.em.0.mac_stats.xon_recvd: 5929
      dev.em.0.mac_stats.xon_txd: 120
      dev.em.0.mac_stats.xoff_recvd: 5929
      dev.em.0.mac_stats.xoff_txd: 120
      dev.em.0.mac_stats.total_pkts_recvd: 397413786
      dev.em.0.mac_stats.good_pkts_recvd: 397401928
      dev.em.0.mac_stats.bcast_pkts_recvd: 2715
      dev.em.0.mac_stats.mcast_pkts_recvd: 1528
      dev.em.0.mac_stats.rx_frames_64: 11419946
      dev.em.0.mac_stats.rx_frames_65_127: 24122771
      dev.em.0.mac_stats.rx_frames_128_255: 5438765
      dev.em.0.mac_stats.rx_frames_256_511: 2942593
      dev.em.0.mac_stats.rx_frames_512_1023: 13221690
      dev.em.0.mac_stats.rx_frames_1024_1522: 340256163
      dev.em.0.mac_stats.good_octets_recvd: 504144384891
      dev.em.0.mac_stats.good_octets_txd: 70175650866
      dev.em.0.mac_stats.total_pkts_txd: 199599490
      dev.em.0.mac_stats.good_pkts_txd: 199599248
      dev.em.0.mac_stats.bcast_pkts_txd: 1616
      dev.em.0.mac_stats.mcast_pkts_txd: 2
      dev.em.0.mac_stats.tx_frames_64: 83244952
      dev.em.0.mac_stats.tx_frames_65_127: 68946765
      dev.em.0.mac_stats.tx_frames_128_255: 3324597
      dev.em.0.mac_stats.tx_frames_256_511: 2036340
      dev.em.0.mac_stats.tx_frames_512_1023: 3106394
      dev.em.0.mac_stats.tx_frames_1024_1522: 38940203
      dev.em.0.mac_stats.tso_txd: 0
      dev.em.0.mac_stats.tso_ctx_fail: 0
      dev.em.0.interrupts.asserts: 106244188
      dev.em.0.interrupts.rx_pkt_timer: 39933
      dev.em.0.interrupts.rx_abs_timer: 0
      dev.em.0.interrupts.tx_pkt_timer: 5731
      dev.em.0.interrupts.tx_abs_timer: 11354
      dev.em.0.interrupts.tx_queue_empty: 0
      dev.em.0.interrupts.tx_queue_min_thresh: 0
      dev.em.0.interrupts.rx_desc_min_thresh: 0
      dev.em.0.interrupts.rx_overrun: 0

      1 Reply Last reply Reply Quote 0
      • B Offline
        bryan.paradis
        last edited by

        @stephenw10:

        Impressive.
        The ERL has a custom ASIC to enable it to perform like that. It's not supported by FreeBSD, so if/when pfSense runs on it don't expect those numbers. Currently tops out at 250Mbps.

        Steve

        Yes indeed. It is a heavily changed vyatta base OS on debian mips cavicum. The driver would need to be ported. Still at $99

        http://rtfm.net/FreeBSD/ERL/

        Performance could be a little better, though it's more than adequate for my home Internet connection. Basic packet passing between two Gigabit hosts seems to top out at about 250Mbits/sec.

        https://wiki.freebsd.org/FreeBSD/mips/Octeon

        @vman76:

        @bryan.paradis:

        That is looking better for sure. mind posting the sysctl for that guy? Also what size packets are you using or were using in the test?

        Sure, here is the current data . The firewall is now in production and averaging 150Mbps, @ 24,000 PPS with no issues since around noon. I tried various iperfs but the money spot was this one:

        iperf -c –w 65000 –t 600 –P5

        Which should use the full Ethernet frame. I tried a bunch of other windows sizes and more flows (up to -P 50) along with UDP tests. The above gave me the best results.Looking at the distribution of packets on the last firewall, and on routes netflow roue-cache the students use mostly applications with large packets (video streaming, filesharing etc). I'd like to have done some more testing but time constraints did not allow it.

        dev.em.0.%desc: Intel(R) PRO/1000 Network Connection 7.3.2
        dev.em.0.%driver: em
        dev.em.0.%location: slot=0 function=0
        dev.em.0.%pnpinfo: vendor=0x8086 device=0x10a4 subvendor=0x8086 subdevice=0x10a4 class=0x020000
        dev.em.0.%parent: pci14
        dev.em.0.nvm: -1
        dev.em.0.debug: -1
        dev.em.0.fc: 3
        dev.em.0.rx_int_delay: 0
        dev.em.0.tx_int_delay: 66
        dev.em.0.rx_abs_int_delay: 66
        dev.em.0.tx_abs_int_delay: 66
        dev.em.0.rx_processing_limit: 100
        dev.em.0.eee_control: 0
        dev.em.0.link_irq: 0
        dev.em.0.mbuf_alloc_fail: 0
        dev.em.0.cluster_alloc_fail: 0
        dev.em.0.dropped: 0
        dev.em.0.tx_dma_fail: 0
        dev.em.0.rx_overruns: 0
        dev.em.0.watchdog_timeouts: 0
        dev.em.0.device_control: 1209795137
        dev.em.0.rx_control: 67141634
        dev.em.0.fc_high_water: 30720
        dev.em.0.fc_low_water: 29220
        dev.em.0.queue0.txd_head: 192
        dev.em.0.queue0.txd_tail: 192
        dev.em.0.queue0.tx_irq: 0
        dev.em.0.queue0.no_desc_avail: 0
        dev.em.0.queue0.rxd_head: 531
        dev.em.0.queue0.rxd_tail: 530
        dev.em.0.queue0.rx_irq: 0
        dev.em.0.mac_stats.excess_coll: 0
        dev.em.0.mac_stats.single_coll: 0
        dev.em.0.mac_stats.multiple_coll: 0
        dev.em.0.mac_stats.late_coll: 0
        dev.em.0.mac_stats.collision_count: 0
        dev.em.0.mac_stats.symbol_errors: 0
        dev.em.0.mac_stats.sequence_errors: 0
        dev.em.0.mac_stats.defer_count: 5793
        dev.em.0.mac_stats.missed_packets: 0
        dev.em.0.mac_stats.recv_no_buff: 139
        dev.em.0.mac_stats.recv_undersize: 0
        dev.em.0.mac_stats.recv_fragmented: 0
        dev.em.0.mac_stats.recv_oversize: 0
        dev.em.0.mac_stats.recv_jabber: 0
        dev.em.0.mac_stats.recv_errs: 0
        dev.em.0.mac_stats.crc_errs: 0
        dev.em.0.mac_stats.alignment_errs: 0
        dev.em.0.mac_stats.coll_ext_errs: 0
        dev.em.0.mac_stats.xon_recvd: 5929
        dev.em.0.mac_stats.xon_txd: 120
        dev.em.0.mac_stats.xoff_recvd: 5929
        dev.em.0.mac_stats.xoff_txd: 120
        dev.em.0.mac_stats.total_pkts_recvd: 397413786
        dev.em.0.mac_stats.good_pkts_recvd: 397401928
        dev.em.0.mac_stats.bcast_pkts_recvd: 2715
        dev.em.0.mac_stats.mcast_pkts_recvd: 1528
        dev.em.0.mac_stats.rx_frames_64: 11419946
        dev.em.0.mac_stats.rx_frames_65_127: 24122771
        dev.em.0.mac_stats.rx_frames_128_255: 5438765
        dev.em.0.mac_stats.rx_frames_256_511: 2942593
        dev.em.0.mac_stats.rx_frames_512_1023: 13221690
        dev.em.0.mac_stats.rx_frames_1024_1522: 340256163
        dev.em.0.mac_stats.good_octets_recvd: 504144384891
        dev.em.0.mac_stats.good_octets_txd: 70175650866
        dev.em.0.mac_stats.total_pkts_txd: 199599490
        dev.em.0.mac_stats.good_pkts_txd: 199599248
        dev.em.0.mac_stats.bcast_pkts_txd: 1616
        dev.em.0.mac_stats.mcast_pkts_txd: 2
        dev.em.0.mac_stats.tx_frames_64: 83244952
        dev.em.0.mac_stats.tx_frames_65_127: 68946765
        dev.em.0.mac_stats.tx_frames_128_255: 3324597
        dev.em.0.mac_stats.tx_frames_256_511: 2036340
        dev.em.0.mac_stats.tx_frames_512_1023: 3106394
        dev.em.0.mac_stats.tx_frames_1024_1522: 38940203
        dev.em.0.mac_stats.tso_txd: 0
        dev.em.0.mac_stats.tso_ctx_fail: 0
        dev.em.0.interrupts.asserts: 106244188
        dev.em.0.interrupts.rx_pkt_timer: 39933
        dev.em.0.interrupts.rx_abs_timer: 0
        dev.em.0.interrupts.tx_pkt_timer: 5731
        dev.em.0.interrupts.tx_abs_timer: 11354
        dev.em.0.interrupts.tx_queue_empty: 0
        dev.em.0.interrupts.tx_queue_min_thresh: 0
        dev.em.0.interrupts.rx_desc_min_thresh: 0
        dev.em.0.interrupts.rx_overrun: 0

        Interesting! Thanks for posting.

        1 Reply Last reply Reply Quote 0
        • V Offline
          vman76
          last edited by

          Well it looks I found the hardware limits of the new server as well. We were able to push about 500Mbps and 80,000 PPS with no issue. Once we get to the 600Mbps and 100,000 PPS we get input errors (NIC buffer overruns). While doing some realtime troubleshooting, I noticed that the errors occur exactly when the one of 4 CPU's hits 100% .(kernel em0 queue) process. em0 is my otuside interfaces. So it appears my earlier suspicion applies in this case and the CPU  is too busy to  pull the packets off the NIC buffer in time and I end up with overruns. The CPU I'm using is a Intel(R) Xeon(R) CPU 5130 @ 2.00GHz so it looks like I'm going to be searching for another box. I'm doing 1to1 NAT on over 5,000 hosts so I think that might be driving the CPU higher than I expected. The attached pic shows CPU1 at 84% but "top -P" shows that it gets to 100% when the packet loss occurs.

          I'd love to put the Ubiquiti Edgerouter inline and test their PPS claim here since I'm way under 1,000,000 PPS  :P (j/k)

          Out of curiosity, does anyone know why the RRD graphs don't show individual CPU/core stats?  The CPU data there looks like its the average of all 4 CPU's which doesn't real help in troubleshooting a problem like this. I did an snmpwalk and found utilization data for all the CPU's so I'm graphing it separately in cacti now. (HOST-RESOURCES-MIB::hrProcessorLoad.x)

          Some data from my troubleshooting is below in case some spots something . I have a lot of experience troubleshooting networks in general but I'm very new to BSD so I could be missing something.

          input        (Total)          output
            packets  errs idrops      bytes    packets  errs      bytes colls
                86k    83    0        73M        87k    0        73M    0
                100k  155    0        85M      101k    0        85M    0
                96k    0    0        82M        97k    0        82M    0
                99k    74    0        82M      101k    0        82M    0
                96k    0    0        82M        98k    0        82M    0

          dev.em.0.mac_stats.missed_packets: 2294752
          dev.em.0.mac_stats.recv_no_buff: 4617837
          dev.em.0.mac_stats.recv_undersize: 0
          dev.em.0.mac_stats.recv_fragmented: 0
          dev.em.0.mac_stats.recv_oversize: 0
          dev.em.0.mac_stats.recv_jabber: 0
          dev.em.0.mac_stats.recv_errs: 0
          dev.em.0.mac_stats.crc_errs: 0
          dev.em.0.mac_stats.alignment_errs: 0
          dev.em.0.mac_stats.coll_ext_errs: 0
          dev.em.0.mac_stats.xon_recvd: 9112
          dev.em.0.mac_stats.xon_txd: 120
          dev.em.0.mac_stats.xoff_recvd: 9112
          dev.em.0.mac_stats.xoff_txd: 120
          dev.em.0.mac_stats.total_pkts_recvd: 10671726540
          dev.em.0.mac_stats.good_pkts_recvd: 10669413564
          dev.em.0.mac_stats.bcast_pkts_recvd: 15097
          dev.em.0.mac_stats.mcast_pkts_recvd: 9664
          dev.em.0.mac_stats.rx_frames_64: 240300603
          dev.em.0.mac_stats.rx_frames_65_127: 744037531
          dev.em.0.mac_stats.rx_frames_128_255: 281908686
          dev.em.0.mac_stats.rx_frames_256_511: 135974542
          dev.em.0.mac_stats.rx_frames_512_1023: 172724810
          dev.em.0.mac_stats.rx_frames_1024_1522: 9094467392
          dev.em.0.mac_stats.good_octets_recvd: 13931850472813
          dev.em.0.mac_stats.good_octets_txd: 1173620928614
          dev.em.0.mac_stats.total_pkts_txd: 5912173538
          dev.em.0.mac_stats.good_pkts_txd: 5912173297
          dev.em.0.mac_stats.bcast_pkts_txd: 2117
          dev.em.0.mac_stats.mcast_pkts_txd: 2

          : vmstat -i
          interrupt                          total      rate
          irq14: ata0                          376          0
          irq20: uhci1                      437491          0
          irq21: uhci0 uhci2+              541201          0
          cpu0: timer                  1165155769      1997
          irq256: bce0                    23965829        41
          irq257: mfi0                    1297902          2
          irq258: em0                  2536851814      4350
          irq259: em1                  2695135942      4621
          cpu2: timer                  1165155721      1997
          cpu3: timer                  1165155724      1997
          cpu1: timer                  1165155721      1997
          Total                        9918853490      17008

          highCPU.jpg
          highCPU.jpg_thumb

          1 Reply Last reply Reply Quote 0
          • stephenw10S Online
            stephenw10 Netgate Administrator
            last edited by

            I don't really have experience at this sort of traffic level but it seems like you should be able to do better than that on those servers. That's just a general impression though. It would be useful to get an opinion from someone more experienced.

            Could this be a situation where IP fastforwarding could be usefully enabled? It can cause problems, notably with IPSec.
            https://forum.pfsense.org/index.php?topic=57723.0

            What hardware offloading options do you have enabled?

            Steve

            1 Reply Last reply Reply Quote 0
            • V Offline
              vman76
              last edited by

              @stephenw10:

              I don't really have experience at this sort of traffic level but it seems like you should be able to do better than that on those servers. That's just a general impression though. It would be useful to get an opinion from someone more experienced.

              Could this be a situation where IP fastforwarding could be usefully enabled? It can cause problems, notably with IPSec.
              https://forum.pfsense.org/index.php?topic=57723.0

              Steve

              I thought it could do better too but the numbers say otherwise. I have a simple ruleset of about 5 rules on each interface. I have not loaded any packages. No VPN. I do log everything to syslog but that is a requirement that I can't get away from.

              Hmm, interesting option. We will not be using IPSec terminated directly on this box so that's not an issue. However ,students do use VPN clients which will go through the firewall. I have to research it more to see if anything else might break by applying it. With over 3,000 users with every device you can imagine a student might bring into a dorm room, I'm apprehensive  on what it might break.

              1 Reply Last reply Reply Quote 0
              • stephenw10S Online
                stephenw10 Netgate Administrator
                last edited by

                Hmm, I imagine it would break IPSec through the box and probably generate some complaints! It can dramatically increase throughput in some instances though. There may other opportunities for tuning though.

                Earlier I said that the ERL had an ASIC to increase throughput but I think that was wrong (I can't edit it now). It looks like it has a closed source IP forwarding module that can run separately on one of it's 8 cores. No chance of a FreeBSD driver but maybe an equivalent in the future.

                Steve

                1 Reply Last reply Reply Quote 0
                • P Offline
                  podilarius
                  last edited by

                  The results are somewhat expected. currently pfSense is using an old pf that is single core only. The only real reason to run pfsense on a multicore is for the addons to use the other cores while pf filtering is stuck on one.
                  The faster the clock speed of a single core, the more throughput you will observe.  The pfSense hardware sizing have 2GHz machines topping out at around 500Mbps. You got it to go a bit higher. I would imagine that you could get a lot more if you have a 3.6GHz or an over clocked machine at 4Ghz.
                  There has been talk about upgrading to the newer pf, but I don't know much about it or even when. Perhaps 2.2 or 2.3. It should have multicore if based on the newer code. (Note, I am not with ESF and I don't know the plans, at all.) Just hoping that we can get to multicore/multithreaded before I need it.

                  1 Reply Last reply Reply Quote 0
                  • V Offline
                    vman76
                    last edited by

                    @podilarius:

                    The results are somewhat expected. currently pfSense is using an old pf that is single core only. The only real reason to run pfsense on a multicore is for the addons to use the other cores while pf filtering is stuck on one.
                    The faster the clock speed of a single core, the more throughput you will observe.  The pfSense hardware sizing have 2GHz machines topping out at around 500Mbps. You got it to go a bit higher. I would imagine that you could get a lot more if you have a 3.6GHz or an over clocked machine at 4Ghz.
                    There has been talk about upgrading to the newer pf, but I don't know much about it or even when. Perhaps 2.2 or 2.3. It should have multicore if based on the newer code. (Note, I am not with ESF and I don't know the plans, at all.) Just hoping that we can get to multicore/multithreaded before I need it.

                    I looked at CPU requirements and saw a 3 Ghz was recommended but it doesn't mention anything about the CPU architecture. The Dell 1850 in the beginning of this thread was a 3 Ghz Xeon but an older architecture (800 FSB). My current 2 Ghz (1333 FSB) is pushing twice the traffic so it gets kind of tricky comparing the older CPU's with the newer models.

                    Do you know what name of the actual PF process is so I could monitor it? I see that the kernel process is the one taking up all the CPU and it is across 2 cores (cpu1 em0, cpu2 em1 in my last screenshot). Is  that actual OS pulling packets off the NIC before packet filtering process? I'm used to the Cisco ASAs where I would look at the dispatcher process for filtering CPU usage. Not sure what the equivalent is here.

                    Lastly, do you know what the "top" command equivalent to Diagnostics–>System activity is?  The close I got to it was "top -P" but didn't show me as much detail as the System Activity menu.

                    Thanks for you patience with my newb questions.

                    1 Reply Last reply Reply Quote 0
                    • P Offline
                      podilarius
                      last edited by

                      I agree it doesn't mention that, but if you went with a 1950 with faster proc, you might do well.
                      Not sure about the top command, but you can do a ps -ef while that is running and it would probably tell you.

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S Online
                        stephenw10 Netgate Administrator
                        last edited by

                        top -SH

                        The hardware guide is little outdated as you've found.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • A Offline
                          Aluminum
                          last edited by

                          In the little bit of reading I've done its basically about how many interrupts a second the core talking to that device can do, so clockspeed is judge, jury and executioner.
                          (and since newer architectures have improved IPC over time I would think that might include interrupts as well but not sure?)

                          The HFT guys apparently have the same problems that busy networks do, but makes sense as both are doing tons of small random I/O.

                          From what I understand if even a 4.x Ghz core cannot do your workload and you can't spread it to other cores, the next step is to offload it to specialty hardware. Definitely explains some of those odd dual core high clocked xeon models out there.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S Online
                            stephenw10 Netgate Administrator
                            last edited by

                            @podilarius:

                            There has been talk about upgrading to the newer pf, but I don't know much about it or even when. Perhaps 2.2 or 2.3.

                            I missed this earlier. I'm not associated with ESF either.
                            The smp friendly pf is in FreeBSD 10 so pfSense 2.2, which will be built on that, should inlude it.

                            http://svnweb.freebsd.org/base?view=revision&revision=240233

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.