Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Many Pics] My new silent firewall build

    Scheduled Pinned Locked Moved Hardware
    23 Posts 5 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      edwardwong
      last edited by

      @Engineer:

      @edwardwong,

      Since you mentioned the Supermicro X11SBA-LN4F ITX and I have a 'hardware repaired one' (see thread posted earlier - the long one), I would like to run the OpenSSL test that you did on yours.  Can you give the syntax (assuming it's built into pfsense / FreeBSD?

      Just curious as to how the two boards stack up with AES-NI and without?

      I did the test with reference to this document:
      https://doc.pfsense.org/index.php/Are_cryptographic_accelerators_supported

      Of course this is not an accurate test, the most accurate one should be doing this with 2 clients, but I don't have time so trying to use this as a simple reference.

      1 Reply Last reply Reply Quote 0
      • E
        Engineer
        last edited by

        @edwardwong:

        @Engineer:

        @edwardwong,

        Since you mentioned the Supermicro X11SBA-LN4F ITX and I have a 'hardware repaired one' (see thread posted earlier - the long one), I would like to run the OpenSSL test that you did on yours.  Can you give the syntax (assuming it's built into pfsense / FreeBSD?

        Just curious as to how the two boards stack up with AES-NI and without?

        I did the test with reference to this document:
        https://doc.pfsense.org/index.php/Are_cryptographic_accelerators_supported

        Of course this is not an accurate test, the most accurate one should be doing this with 2 clients, but I don't have time so trying to use this as a simple reference.

        Here's what I came up with (modified to 256 from the 128 command since you stated 256)….

        $ openssl speed -evp aes-256-cbc -engine cryptodev
        engine "cryptodev" set.
        Doing aes-256-cbc for 3s on 16 size blocks: 947833 aes-256-cbc's in 0.32s
        Doing aes-256-cbc for 3s on 64 size blocks: 945487 aes-256-cbc's in 0.36s
        Doing aes-256-cbc for 3s on 256 size blocks: 772576 aes-256-cbc's in 0.21s
        Doing aes-256-cbc for 3s on 1024 size blocks: 457823 aes-256-cbc's in 0.20s
        Doing aes-256-cbc for 3s on 8192 size blocks: 91829 aes-256-cbc's in 0.03s
        OpenSSL 1.0.1l-freebsd 15 Jan 2015
        built on: date not available
        options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
        compiler: clang
        The 'numbers' are in 1000s of bytes per second processed.
        type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
        aes-256-cbc      47345.41k  168378.90k  937621.12k  2307991.39k 24072421.38k

        1 Reply Last reply Reply Quote 0
        • E
          edwardwong
          last edited by

          Yeah….the AES-NI contributes a lot, can you run it again without crypto engine? I would like to compare, from some other online examples, the AES-NI speeds up about 5-10x

          1 Reply Last reply Reply Quote 0
          • E
            Engineer
            last edited by

            @edwardwong:

            Yeah….the AES-NI contributes a lot, can you run it again without crypto engine? I would like to compare, from some other online examples, the AES-NI speeds up about 5-10x

            Something wrong.  Numbers are as good or better.  Do I need to turn off AES-NI in the settings menu?

            Edit:  Turned off AES-NI in the Advanced menu but no difference (I didn't reboot - like my current 98 days uptime).  Anyone have thoughts on why no change?

            $ openssl speed -evp aes-256-cbc
            Doing aes-256-cbc for 3s on 16 size blocks: 949961 aes-256-cbc's in 0.38s
            Doing aes-256-cbc for 3s on 64 size blocks: 968692 aes-256-cbc's in 0.25s
            Doing aes-256-cbc for 3s on 256 size blocks: 793691 aes-256-cbc's in 0.31s
            Doing aes-256-cbc for 3s on 1024 size blocks: 456773 aes-256-cbc's in 0.19s
            Doing aes-256-cbc for 3s on 8192 size blocks: 91937 aes-256-cbc's in 0.05s
            OpenSSL 1.0.1l-freebsd 15 Jan 2015
            built on: date not available
            options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
            compiler: clang
            The 'numbers' are in 1000s of bytes per second processed.
            type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
            aes-256-cbc      40531.67k  247985.15k  650191.67k  2494589.61k 16067155.29k

            1 Reply Last reply Reply Quote 0
            • E
              edwardwong
              last edited by

              Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
              But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

              1 Reply Last reply Reply Quote 0
              • E
                Engineer
                last edited by

                $ openssl speed aes-256-cbc
                Doing aes-256 cbc for 3s on 16 size blocks: 5467107 aes-256 cbc's in 3.00s
                Doing aes-256 cbc for 3s on 64 size blocks: 1562852 aes-256 cbc's in 3.00s
                Doing aes-256 cbc for 3s on 256 size blocks: 403469 aes-256 cbc's in 3.00s
                Doing aes-256 cbc for 3s on 1024 size blocks: 254859 aes-256 cbc's in 3.00s
                Doing aes-256 cbc for 3s on 8192 size blocks: 32236 aes-256 cbc's in 3.00s
                OpenSSL 1.0.1l-freebsd 15 Jan 2015
                built on: date not available
                options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
                compiler: clang
                The 'numbers' are in 1000s of bytes per second processed.
                type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
                aes-256 cbc      29157.90k    33340.84k    34429.35k    86991.87k    88025.77k

                With -multi 4 added on hardware (slower than single thread??)….

                System

                $ openssl speed -multi 4 -evp aes-256-cbc -engine cryptodev
                engine "cryptodev" set.
                Forked child 0
                Forked child 1
                +DT:aes-256-cbc:3:16
                Forked child 2
                +DT:aes-256-cbc:3:16
                +DT:aes-256-cbc:3:16
                +DT:aes-256-cbc:3:16
                +R:836144:aes-256-cbc:3.000000
                +R:824538:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:64
                +DT:aes-256-cbc:3:64
                +R:857528:aes-256-cbc:3.000000
                +R:863606:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:64
                +DT:aes-256-cbc:3:64
                +R:811091:aes-256-cbc:3.000000
                +R:787191:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:256
                +DT:aes-256-cbc:3:256
                +R:838909:aes-256-cbc:3.000000
                +R:814793:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:256
                +DT:aes-256-cbc:3:256
                +R:657543:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:1024
                +R:671720:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:1024
                +R:682625:aes-256-cbc:3.000000
                +R:679516:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:1024
                +DT:aes-256-cbc:3:1024
                +R:420495:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:8192
                +R:418550:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:8192
                +R:426774:aes-256-cbc:3.000000
                +R:430329:aes-256-cbc:3.000000
                +DT:aes-256-cbc:3:8192
                +DT:aes-256-cbc:3:8192
                +R:91002:aes-256-cbc:3.000000
                +R:90558:aes-256-cbc:3.000000
                +R:90635:aes-256-cbc:3.000000
                +R:90792:aes-256-cbc:3.000000
                Forked child 3
                Got: +H:16:64:256:1024:8192 from 0
                Got: +F:22:aes-256-cbc:4397536.00:16793408.00:56110336.00:142865066.67:248496128.00 from 0
                Got: +H:16:64:256:1024:8192 from 1
                Got: +F:22:aes-256-cbc:4459434.67:17303274.67:57320106.67:143528960.00:247283712.00 from 1
                Got: +H:16:64:256:1024:8192 from 2
                Got: +F:22:aes-256-cbc:4573482.67:17382250.67:57985365.33:145672192.00:247493973.33 from 2
                Got: +H:16:64:256:1024:8192 from 3
                Got: +F:22:aes-256-cbc:4605898.67:17896725.33:58250666.67:146885632.00:247922688.00 from 3
                OpenSSL 1.0.1l-freebsd 15 Jan 2015
                built on: date not available
                options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
                compiler: clang
                evp              18036.35k    69375.66k  229666.47k  578951.85k  991196.50k

                1 Reply Last reply Reply Quote 0
                • E
                  edwardwong
                  last edited by

                  Try to add "-elapsed" when you use the hardware engine, according to OpenSSL document this will perform better when using hardware crypto method.

                  But yeah, you see the difference with/without AES-NI already  8)

                  1 Reply Last reply Reply Quote 0
                  • K
                    Keljian
                    last edited by

                    Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                    1 Reply Last reply Reply Quote 0
                    • E
                      Engineer
                      last edited by

                      @Keljian:

                      Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                      I would assume just to see how much extra throughput is gained via AES-NI vs without.

                      1 Reply Last reply Reply Quote 0
                      • K
                        Keljian
                        last edited by

                        @Engineer:

                        @Keljian:

                        Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                        I would assume just to see how much extra throughput is gained via AES-NI vs without.

                        Yes but I don't see when you would be without it if you had a processor that supports it. Seems counterintuitive.

                        1 Reply Last reply Reply Quote 0
                        • L
                          Limbi
                          last edited by

                          @edwardwong:

                          Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                          But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                          Where I should put "-multi 4" to run 4 encryption together?
                          Thank you

                          Ciao

                          AMD Athlon 5350 @2.1Ghz
                          Asus AM1M-A
                          Kingston 4GB 1R 1600EC11 @C10
                          Kingston V300 60GB
                          Intel Pro/1000 PT dual (wan+lan)
                          OEM 90w psu
                          80mm case fan
                          100/20M vdsl2+ internet connection
                          pfsense 2.3.3dev
                          some package installed

                          1 Reply Last reply Reply Quote 0
                          • E
                            edwardwong
                            last edited by

                            @Limbi:

                            @edwardwong:

                            Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                            But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                            Where I should put "-multi 4" to run 4 encryption together?
                            Thank you

                            Ciao

                            Read the posts above, answer is already there.

                            1 Reply Last reply Reply Quote 0
                            • L
                              Limbi
                              last edited by

                              @edwardwong:

                              @Limbi:

                              @edwardwong:

                              Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                              But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                              Where I should put "-multi 4" to run 4 encryption together?
                              Thank you

                              Ciao

                              Read the posts above, answer is already there.

                              I read that, but I'm a newbie and I don't know witch file to edit.

                              AMD Athlon 5350 @2.1Ghz
                              Asus AM1M-A
                              Kingston 4GB 1R 1600EC11 @C10
                              Kingston V300 60GB
                              Intel Pro/1000 PT dual (wan+lan)
                              OEM 90w psu
                              80mm case fan
                              100/20M vdsl2+ internet connection
                              pfsense 2.3.3dev
                              some package installed

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.