Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [Many Pics] My new silent firewall build

    Scheduled Pinned Locked Moved Hardware
    23 Posts 5 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      Engineer
      last edited by

      @edwardwong:

      Yeah….the AES-NI contributes a lot, can you run it again without crypto engine? I would like to compare, from some other online examples, the AES-NI speeds up about 5-10x

      Something wrong.  Numbers are as good or better.  Do I need to turn off AES-NI in the settings menu?

      Edit:  Turned off AES-NI in the Advanced menu but no difference (I didn't reboot - like my current 98 days uptime).  Anyone have thoughts on why no change?

      $ openssl speed -evp aes-256-cbc
      Doing aes-256-cbc for 3s on 16 size blocks: 949961 aes-256-cbc's in 0.38s
      Doing aes-256-cbc for 3s on 64 size blocks: 968692 aes-256-cbc's in 0.25s
      Doing aes-256-cbc for 3s on 256 size blocks: 793691 aes-256-cbc's in 0.31s
      Doing aes-256-cbc for 3s on 1024 size blocks: 456773 aes-256-cbc's in 0.19s
      Doing aes-256-cbc for 3s on 8192 size blocks: 91937 aes-256-cbc's in 0.05s
      OpenSSL 1.0.1l-freebsd 15 Jan 2015
      built on: date not available
      options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
      compiler: clang
      The 'numbers' are in 1000s of bytes per second processed.
      type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
      aes-256-cbc      40531.67k  247985.15k  650191.67k  2494589.61k 16067155.29k

      1 Reply Last reply Reply Quote 0
      • E
        edwardwong
        last edited by

        Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
        But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

        1 Reply Last reply Reply Quote 0
        • E
          Engineer
          last edited by

          $ openssl speed aes-256-cbc
          Doing aes-256 cbc for 3s on 16 size blocks: 5467107 aes-256 cbc's in 3.00s
          Doing aes-256 cbc for 3s on 64 size blocks: 1562852 aes-256 cbc's in 3.00s
          Doing aes-256 cbc for 3s on 256 size blocks: 403469 aes-256 cbc's in 3.00s
          Doing aes-256 cbc for 3s on 1024 size blocks: 254859 aes-256 cbc's in 3.00s
          Doing aes-256 cbc for 3s on 8192 size blocks: 32236 aes-256 cbc's in 3.00s
          OpenSSL 1.0.1l-freebsd 15 Jan 2015
          built on: date not available
          options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
          compiler: clang
          The 'numbers' are in 1000s of bytes per second processed.
          type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
          aes-256 cbc      29157.90k    33340.84k    34429.35k    86991.87k    88025.77k

          With -multi 4 added on hardware (slower than single thread??)….

          System

          $ openssl speed -multi 4 -evp aes-256-cbc -engine cryptodev
          engine "cryptodev" set.
          Forked child 0
          Forked child 1
          +DT:aes-256-cbc:3:16
          Forked child 2
          +DT:aes-256-cbc:3:16
          +DT:aes-256-cbc:3:16
          +DT:aes-256-cbc:3:16
          +R:836144:aes-256-cbc:3.000000
          +R:824538:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:64
          +DT:aes-256-cbc:3:64
          +R:857528:aes-256-cbc:3.000000
          +R:863606:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:64
          +DT:aes-256-cbc:3:64
          +R:811091:aes-256-cbc:3.000000
          +R:787191:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:256
          +DT:aes-256-cbc:3:256
          +R:838909:aes-256-cbc:3.000000
          +R:814793:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:256
          +DT:aes-256-cbc:3:256
          +R:657543:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:1024
          +R:671720:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:1024
          +R:682625:aes-256-cbc:3.000000
          +R:679516:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:1024
          +DT:aes-256-cbc:3:1024
          +R:420495:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:8192
          +R:418550:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:8192
          +R:426774:aes-256-cbc:3.000000
          +R:430329:aes-256-cbc:3.000000
          +DT:aes-256-cbc:3:8192
          +DT:aes-256-cbc:3:8192
          +R:91002:aes-256-cbc:3.000000
          +R:90558:aes-256-cbc:3.000000
          +R:90635:aes-256-cbc:3.000000
          +R:90792:aes-256-cbc:3.000000
          Forked child 3
          Got: +H:16:64:256:1024:8192 from 0
          Got: +F:22:aes-256-cbc:4397536.00:16793408.00:56110336.00:142865066.67:248496128.00 from 0
          Got: +H:16:64:256:1024:8192 from 1
          Got: +F:22:aes-256-cbc:4459434.67:17303274.67:57320106.67:143528960.00:247283712.00 from 1
          Got: +H:16:64:256:1024:8192 from 2
          Got: +F:22:aes-256-cbc:4573482.67:17382250.67:57985365.33:145672192.00:247493973.33 from 2
          Got: +H:16:64:256:1024:8192 from 3
          Got: +F:22:aes-256-cbc:4605898.67:17896725.33:58250666.67:146885632.00:247922688.00 from 3
          OpenSSL 1.0.1l-freebsd 15 Jan 2015
          built on: date not available
          options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
          compiler: clang
          evp              18036.35k    69375.66k  229666.47k  578951.85k  991196.50k

          1 Reply Last reply Reply Quote 0
          • E
            edwardwong
            last edited by

            Try to add "-elapsed" when you use the hardware engine, according to OpenSSL document this will perform better when using hardware crypto method.

            But yeah, you see the difference with/without AES-NI already  8)

            1 Reply Last reply Reply Quote 0
            • K
              Keljian
              last edited by

              Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

              1 Reply Last reply Reply Quote 0
              • E
                Engineer
                last edited by

                @Keljian:

                Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                I would assume just to see how much extra throughput is gained via AES-NI vs without.

                1 Reply Last reply Reply Quote 0
                • K
                  Keljian
                  last edited by

                  @Engineer:

                  @Keljian:

                  Don't understand why you are testing without, in the "real world" you are never likely to be using the same chip without aes-ni

                  I would assume just to see how much extra throughput is gained via AES-NI vs without.

                  Yes but I don't see when you would be without it if you had a processor that supports it. Seems counterintuitive.

                  1 Reply Last reply Reply Quote 0
                  • L
                    Limbi
                    last edited by

                    @edwardwong:

                    Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                    But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                    Where I should put "-multi 4" to run 4 encryption together?
                    Thank you

                    Ciao

                    AMD Athlon 5350 @2.1Ghz
                    Asus AM1M-A
                    Kingston 4GB 1R 1600EC11 @C10
                    Kingston V300 60GB
                    Intel Pro/1000 PT dual (wan+lan)
                    OEM 90w psu
                    80mm case fan
                    100/20M vdsl2+ internet connection
                    pfsense 2.3.3dev
                    some package installed

                    1 Reply Last reply Reply Quote 0
                    • E
                      edwardwong
                      last edited by

                      @Limbi:

                      @edwardwong:

                      Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                      But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                      Where I should put "-multi 4" to run 4 encryption together?
                      Thank you

                      Ciao

                      Read the posts above, answer is already there.

                      1 Reply Last reply Reply Quote 0
                      • L
                        Limbi
                        last edited by

                        @edwardwong:

                        @Limbi:

                        @edwardwong:

                        Try not to use -evp option, it looks like everything with this option will trigger the hardware engine. And your CPU is quad core, you can actually put a "-multi 4" as the option to run 4 encryption together.
                        But that's quite interesting, because I owned a higher end processor, the Avoton C2550, and the number with 4 threads together is half of your single thread. Not sure if this is the problem with the OpenSSL on my Linux server (yes, this is not a pfSense machine). I suppose my Avoton should be running a lot faster compared with your N3700.

                        Where I should put "-multi 4" to run 4 encryption together?
                        Thank you

                        Ciao

                        Read the posts above, answer is already there.

                        I read that, but I'm a newbie and I don't know witch file to edit.

                        AMD Athlon 5350 @2.1Ghz
                        Asus AM1M-A
                        Kingston 4GB 1R 1600EC11 @C10
                        Kingston V300 60GB
                        Intel Pro/1000 PT dual (wan+lan)
                        OEM 90w psu
                        80mm case fan
                        100/20M vdsl2+ internet connection
                        pfsense 2.3.3dev
                        some package installed

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.