Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Many Pics] My new silent firewall build

    Scheduled Pinned Locked Moved Hardware
    23 Posts 5 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      edwardwong
      last edited by

      Yeah….the AES-NI contributes a lot, can you run it again without crypto engine? I would like to compare, from some other online examples, the AES-NI speeds up about 5-10x

      1 Reply Last reply Reply Quote 0
      • E
        Engineer
        last edited by

        @edwardwong:

        Yeah….the AES-NI contributes a lot, can you run it again without crypto engine? I would like to compare, from some other online examples, the AES-NI speeds up about 5-10x

        Something wrong.  Numbers are as good or better.  Do I need to turn off AES-NI in the settings menu?

        Edit:  Turned off AES-NI in the Advanced menu but no difference (I didn't reboot - like my current 98 days uptime).  Anyone have thoughts on why no change?

        $ openssl speed -evp aes-256-cbc
        Doing aes-256-cbc for 3s on 16 size blocks: 949961 aes-256-cbc's in 0.38s
        Doing aes-256-cbc for 3s on 64 size blocks: 968692 aes-256-cbc's in 0.25s
        Doing aes-256-cbc for 3s on 256 size blocks: 793691 aes-256-cbc's in 0.31s
        Doing aes-256-cbc for 3s on 1024 size blocks: 456773 aes-256-cbc's in 0.19s
        Doing aes-256-cbc for 3s on 8192 size blocks: 91937 aes-256-cbc's in 0.05s
        OpenSSL 1.0.1l-freebsd 15 Jan 2015
        built on: date not available
        options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
        compiler: clang
        The 'numbers' are in 1000s of bytes per second processed.
        type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
        aes-256-cbc      40531.67k  247985.15k  650191.67k  2494589.61k 16067155.29k

        1 Reply Last reply Reply Quote 0
        • E
          edwardwong
          last edited by

          Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
          But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

          1 Reply Last reply Reply Quote 0
          • E
            Engineer
            last edited by

            $ openssl speed aes-256-cbc
            Doing aes-256 cbc for 3s on 16 size blocks: 5467107 aes-256 cbc's in 3.00s
            Doing aes-256 cbc for 3s on 64 size blocks: 1562852 aes-256 cbc's in 3.00s
            Doing aes-256 cbc for 3s on 256 size blocks: 403469 aes-256 cbc's in 3.00s
            Doing aes-256 cbc for 3s on 1024 size blocks: 254859 aes-256 cbc's in 3.00s
            Doing aes-256 cbc for 3s on 8192 size blocks: 32236 aes-256 cbc's in 3.00s
            OpenSSL 1.0.1l-freebsd 15 Jan 2015
            built on: date not available
            options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
            compiler: clang
            The 'numbers' are in 1000s of bytes per second processed.
            type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
            aes-256 cbc      29157.90k    33340.84k    34429.35k    86991.87k    88025.77k

            With -multi 4 added on hardware (slower than single thread??)….

            System

            $ openssl speed -multi 4 -evp aes-256-cbc -engine cryptodev
            engine "cryptodev" set.
            Forked child 0
            Forked child 1
            +DT:aes-256-cbc:3:16
            Forked child 2
            +DT:aes-256-cbc:3:16
            +DT:aes-256-cbc:3:16
            +DT:aes-256-cbc:3:16
            +R:836144:aes-256-cbc:3.000000
            +R:824538:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:64
            +DT:aes-256-cbc:3:64
            +R:857528:aes-256-cbc:3.000000
            +R:863606:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:64
            +DT:aes-256-cbc:3:64
            +R:811091:aes-256-cbc:3.000000
            +R:787191:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:256
            +DT:aes-256-cbc:3:256
            +R:838909:aes-256-cbc:3.000000
            +R:814793:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:256
            +DT:aes-256-cbc:3:256
            +R:657543:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:1024
            +R:671720:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:1024
            +R:682625:aes-256-cbc:3.000000
            +R:679516:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:1024
            +DT:aes-256-cbc:3:1024
            +R:420495:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:8192
            +R:418550:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:8192
            +R:426774:aes-256-cbc:3.000000
            +R:430329:aes-256-cbc:3.000000
            +DT:aes-256-cbc:3:8192
            +DT:aes-256-cbc:3:8192
            +R:91002:aes-256-cbc:3.000000
            +R:90558:aes-256-cbc:3.000000
            +R:90635:aes-256-cbc:3.000000
            +R:90792:aes-256-cbc:3.000000
            Forked child 3
            Got: +H:16:64:256:1024:8192 from 0
            Got: +F:22:aes-256-cbc:4397536.00:16793408.00:56110336.00:142865066.67:248496128.00 from 0
            Got: +H:16:64:256:1024:8192 from 1
            Got: +F:22:aes-256-cbc:4459434.67:17303274.67:57320106.67:143528960.00:247283712.00 from 1
            Got: +H:16:64:256:1024:8192 from 2
            Got: +F:22:aes-256-cbc:4573482.67:17382250.67:57985365.33:145672192.00:247493973.33 from 2
            Got: +H:16:64:256:1024:8192 from 3
            Got: +F:22:aes-256-cbc:4605898.67:17896725.33:58250666.67:146885632.00:247922688.00 from 3
            OpenSSL 1.0.1l-freebsd 15 Jan 2015
            built on: date not available
            options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
            compiler: clang
            evp              18036.35k    69375.66k  229666.47k  578951.85k  991196.50k

            1 Reply Last reply Reply Quote 0
            • E
              edwardwong
              last edited by

              Try to add "-elapsed" when you use the hardware engine, according to OpenSSL document this will perform better when using hardware crypto method.

              But yeah, you see the difference with/without AES-NI already  8)

              1 Reply Last reply Reply Quote 0
              • K
                Keljian
                last edited by

                Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                1 Reply Last reply Reply Quote 0
                • E
                  Engineer
                  last edited by

                  @Keljian:

                  Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                  I would assume just to see how much extra throughput is gained via AES-NI vs without.

                  1 Reply Last reply Reply Quote 0
                  • K
                    Keljian
                    last edited by

                    @Engineer:

                    @Keljian:

                    Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                    I would assume just to see how much extra throughput is gained via AES-NI vs without.

                    Yes but I don't see when you would be without it if you had a processor that supports it. Seems counterintuitive.

                    1 Reply Last reply Reply Quote 0
                    • L
                      Limbi
                      last edited by

                      @edwardwong:

                      Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                      But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                      Where I should put "-multi 4" to run 4 encryption together?
                      Thank you

                      Ciao

                      AMD Athlon 5350 @2.1Ghz
                      Asus AM1M-A
                      Kingston 4GB 1R 1600EC11 @C10
                      Kingston V300 60GB
                      Intel Pro/1000 PT dual (wan+lan)
                      OEM 90w psu
                      80mm case fan
                      100/20M vdsl2+ internet connection
                      pfsense 2.3.3dev
                      some package installed

                      1 Reply Last reply Reply Quote 0
                      • E
                        edwardwong
                        last edited by

                        @Limbi:

                        @edwardwong:

                        Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                        But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                        Where I should put "-multi 4" to run 4 encryption together?
                        Thank you

                        Ciao

                        Read the posts above, answer is already there.

                        1 Reply Last reply Reply Quote 0
                        • L
                          Limbi
                          last edited by

                          @edwardwong:

                          @Limbi:

                          @edwardwong:

                          Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                          But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                          Where I should put "-multi 4" to run 4 encryption together?
                          Thank you

                          Ciao

                          Read the posts above, answer is already there.

                          I read that, but I'm a newbie and I don't know witch file to edit.

                          AMD Athlon 5350 @2.1Ghz
                          Asus AM1M-A
                          Kingston 4GB 1R 1600EC11 @C10
                          Kingston V300 60GB
                          Intel Pro/1000 PT dual (wan+lan)
                          OEM 90w psu
                          80mm case fan
                          100/20M vdsl2+ internet connection
                          pfsense 2.3.3dev
                          some package installed

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.