Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PPS over IPSec

    Scheduled Pinned Locked Moved IPsec
    5 Posts 3 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      phospher
      last edited by

      hi, i'm trying to get an idea of how many pps can be sent over an ipsec tunnel. i've been doing some testing trying to send 50,000 pps across a vpn tunnel and it copletely kills my firewall and the firewall never recovers. the firewall is running in a vmware environment with 1g dedicated ram. it's on a 3.0ghz zeon quad processor.  looking at vmware it looks like the cpu is completely spiked and i'm gessing that because of the encryption being done on all the packets.

      i'm interested in your comments…

      1 Reply Last reply Reply Quote 0
      • D
        databeestje
        last edited by

        Ouch, yeah, encryption is mostly assembly to make it faster, VMware doesn't like it that's for sure.

        I see something similar in a few VMs I test with. So yes.

        It also profoundly hates shell scripts and pipes and things. I brought down my esx test box with that easy.

        1 Reply Last reply Reply Quote 0
        • F
          fastcon68
          last edited by

          Do you have a script that I can try on my XenServer for comparison?  Be glad to test it.
          RC

          1 Reply Last reply Reply Quote 0
          • D
            databeestje
            last edited by

            if you use 1.2.3-RC1 with a lot of ipsec tunnels the ipsec ping_hosts.sh script will grep through the xml.

            this was the one.
            Create 400 dummy ipsec tunnels and watch it burn once it kicks in.

            1 Reply Last reply Reply Quote 0
            • P
              phospher
              last edited by

              fastcon68,

              i'm using a tool called unicornscan homepage: http://www.unicornscan.org/

              basically, i'm running the command```
              unicornscan -r 50000 -R 5000 host/ip

              so, scan the host with 50,000pps and repeat it 5000 times. talk about flooding state tables, that command will do it in a matter of seconds. you probably need server class gigabit interfaces to actually gen 50,000 pps but even 25,000 kills it.
              
              and unicornscan is in the ports tree if your running freebsd servers…
              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.