Asus N3050I-C for OpenVPN (100MBIT WAN)
-
for not much more, i would go for the quad core n3150 version.
the matx versions have pcie slots that can accommodate intel nics from ebay
http://www.ebuyer.com/732428-asus-n3150i-c-intel-celeron-n3150-soc-vga-hdmi-8-channel-hd-audio-mini-n3150i-c
-
I'm trying to figure out a low cost system for a pfSense setup that would allow me to get the maximum out of my 100MBIT WAN connection (12.5 Mega Bytes / Sec.) using OpenVPN.
Low cost mostly means, you fiddle together something that is cheap, and then you will have a look
what this system is capable to do for you. Better to be sure first that the system is capable to realize
what you want to do. Perhaps a PC Engines APU or APU2 Board or bundle (PSU & case & Board)
would be realizing this for you.With my current router in modem mode and a direct connection to my main PC with an OpenVPN connection through an SSL tunnel I know I am able to get the full 12.5MBps so it's just a matter of routing power.
In normal it is not really wise to expect to get the full given throughput from your Internet account.
I am currently looking at this motherboard and CPU combo (http://www.ebuyer.com/732433-asus-n3050i-c-intel-celeron-n3050-soc-vga-hdmi-8-channel-hd-audio-mini-n3050i-c) an was just wondering if a 1.6Ghz dual core would be powerful enough for OpenVPN (through SSL tunnel) routing?
An SG-2440 unit should be also able to realize it for you.
I have another question also. I know most people recommend only Intel NIC's but to cut costs would it be acceptable to use a single Intel NIC (http://www.ebuyer.com/148377-intel-gigabit-pro-1000ct-pcie-desktop-adapter-expi9301ct) for the WAN connection and use the on-board NIC for the LAN?
For sure it will, but if you don´t get out then what you expect from, you must live with this circumstance.
-
Perhaps a PC Engines APU or APU2 Board or bundle (PSU & case & Board) would be realizing this for you.
Could you please expand on why you think the APU2 would be better? To me it seems to have much slower performance on paper?
The apu2 sports an AMD GX-412TC which clocks in at 1200MHz.
While the Intel n3150 clocks in at 1600MHz, and goes up to 2080MHz with turbo.This is an honest question, I really wonder, because I am trying to make this exact decision myself.
(Although I am looking at Jetway boards with mutliple NIC's, not Asus (With the cost of the extra NIC you're basically paying the same as a multi NIC board).). -
Perhaps a PC Engines APU or APU2 Board or bundle (PSU & case & Board) would be realizing this for you.
Could you please expand on why you think the APU2 would be better? To me it seems to have much slower performance on paper?
The apu2 sports an AMD GX-412TC which clocks in at 1200MHz.
While the Intel n3150 clocks in at 1600MHz, and goes up to 2080MHz with turbo.This is an honest question, I really wonder, because I am trying to make this exact decision myself.
(Although I am looking at Jetway boards with mutliple NIC's, not Asus (With the cost of the extra NIC you're basically paying the same as a multi NIC board).).For your 100M connectivity, APU2/2150 should be able to handle the job easily, while the APU2 board comes with dual Intel i210/211 NICs which seems to be better.
-
Could you please expand on why you think the APU2 would be better? To me it seems to have much slower performance on paper?
For sure I will do that. Only counting together the performance tech. specs. would be like:
-
APU2C2 is 4 CPU cores & AES-NI
-
Intel i210AT consumer grade NICs
-
2 GB normal RAM
-
3 x miniPCIe + SIM
-
mSATA support & SATA Port
-
wide spread and well supported
-
APU2C4 is 4 CPU cores & AES-NI
-
Intel i211AT LAN Ports server grade NICs
-
4 GB ECC RAM
-
3 x miniPCIe + SIM
-
mSATA support & SATA Port
-
wide spread and well supported
Both are available as a bundle for around ~220 € fully fan less and silent and are easy routing 100 MBit/s
with case and PSU. And it will be able also to route 250 MBit/s at the WAN Port with ease.How well is your board supported?
How well are the drivers are matching to that hardware?
How well it is playing together with pfSense (version 2.2.6)?The apu2 sports an AMD GX-412TC which clocks in at 1200MHz.
While the Intel n3150 clocks in at 1600MHz, and goes up to 2080MHz with turbo.Yep but would it do better then the APU2? It has more CPU power and thats it, perhaps it
would be better sorting the OpenVPN now, but since OpenVPN 2.4 and AES-GCM support
I would not swear on this! So I really thing there are other things similar matching but more
or better supported and running like hell. At the end of this thread I am counting together
some spare parts as an assemble, there are for sure better and stronger systems out there
but how well they are playing nice together with pfSense is the most question for me!This is an honest question, I really wonder, because I am trying to make this exact decision myself
Each of us has his own understanding, beloved hardware or systems he´s is more or less swearing
on for sure that must not be matching or considering the parts and interested in systems other would love
to go with.(Although I am looking at Jetway boards with mutliple NIC's, not Asus (With the cost of the extra NIC you're basically paying the same as a multi NIC board).).
Yes and no, sorry based on my lower English language skills I must take much more lines to explain something
but there are even also some strange differences and also if the hardware is based on the same SoC or CPU!
So there are J1900 and N2930 boards I hate and pfSense is causing problems with, and based on the same
CPUs or SoC, as explained in some line above, other boards will not have this failures, issues or malfunction.
And that mostly for only some bucks on top of the other hardware likes 20 € - 60 € and this is not really much
money of you can safe time and play around with your new hardware and don´t be boring about some problems.For your 100M connectivity, APU2/2150 should be able to handle the job easily, while the APU2 board comes with dual Intel i210/211 NICs which seems to be better.
Here in Germany are only some 100 MBit/s FTTH/FTTC connections able to get for private persons
and this is one of the most used self made firewall basis because pfSense, untangle UTM and Sophos
UTM are running fine on them too. The N2930 is working for edwardwong routing nearly 1 GBit/s at
the WAN port. I don´t know about the OpenVPN speed, but according to the AES-NI support in OpenVPN
version 2.4 it could really be that the APU2 is then better, perhaps also the Intel N3050i too, but from that
I don´t know the support of it. And due of the lack of AES-NI at the N2930 I was considering the APU2 as
a better choice.Entry Level:
-
APU2C4 bundle
-
Compex WLE200NX
-
Sierra Wireless MC7710 LTE
-
Crucial 30/60/120 GB mSATA
-
2 x 4 GB DDR3-1600MHz
-
Ubiquiti SR71-E WLAN card
-
Sierra Wireless MC7710 LTE
-
Crucial 30/60/120 GB mSATA
-
Supermicro A1SRi-2358 (new)
-
2 x 2 GB DDR3-1600MHz ECC RAM
-
Samsung840 Pro SSD 80/120/240 GB
pfSense SG-2220 / SG-2440
Mid ranged:
Supermicro A1SRi-2558
Supermicro A1SRi-2758- 2 x 4/8 GB DDR3-1600MHz ECC RAM
- Samsung840 Pro SSD 80/120/240 GB
pfSense SG-4860 / SG-8860
Professional:
- ASUS Q87T
- Gigabyte Q87T
- CPU support
Intel Core i7 (Haswell), Intel Core i5 (Haswell), Intel Core i3 (Haswell),
Intel Pentium G (Haswell), Intel Celeron G (Haswell), Intel Xeon E3 v3 (Haswell) - 2 x 2/4/8 GB S0-DIMM DDR3-1600MHz
- Intel Ethernet Server Adapter I350-T4
- WiFi Atheros AR9280 half length
- Crucial 30/60/120GB mSATA
- Noctua NH-L9i, CPU-Kühler
pfSense C2758 1U / XG-2758
High end:
- Gigabyte GA-6LISL
- Intel Xeon E3-12xxv3
- Intel i350 / i354 4x NIC
- 8/16 GB ECC DDR3 RAM
- Intel SLC/MLC 120/240 SSD
pfSense XG-2758 / XG-1500
-
-
I think, for highend, we should add in those Xeon D1520/1540 ITX boards, those are low TDP but super powerful processing CPU, with native 10G networking support.
-
Perhaps a PC Engines APU or APU2 Board or bundle (PSU & case & Board) would be realizing this for you.
Could you please expand on why you think the APU2 would be better? To me it seems to have much slower performance on paper?
The apu2 sports an AMD GX-412TC which clocks in at 1200MHz.
While the Intel n3150 clocks in at 1600MHz, and goes up to 2080MHz with turbo.As for comparing OpenVPN performance, I have started using this benchmark:
openvpn --genkey --secret /tmp/secret time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc
Then to give the execution time in seconds a real-world meaning:
( 3200 / execution_time_seconds ) = Projected Maximum OpenVPN Performance in Mbps
For example (tested using Linux 3.2.x)…
PC Engines APU2 Quad Core AMD GX-412TC:
Execution time: 77.3 secs.
Maximum OpenVPN: 41 MbpsJetway NF9HG-2930 Quad Core Celeron N2930:
Execution time: 42.4 secs.
Maximum OpenVPN: 75 MbpsSo far, in my testing, this benchmark comes close to actual Maximum OpenVPN Performance measurements under optimum conditions. The projected speed should be an upper limit.
Note: The magic number of 3200 comes from summing 1 to 20000, multiply by 2 for encrypt and decrypt and by 8 bits/byte and divide by 1,000,000 for a result of Mbps
-
I think, for highend, we should add in those Xeon D1520/1540 ITX boards, those are low TDP but super powerful processing CPU, with native 10G networking support.
At this time the NVMe M.2 SSDs are not really fully working well for installations!
And together with the XG-1540 platform will be one of them.As for comparing OpenVPN performance, I have started using this benchmark:
But this says nothing about OpenVPN performance at all.
OpenSSL is using the AES-NI instructions well and this is pushing the entire throughput as well too.
OpenVPN is using the OpenSSL well too, but it is only supporting AES-CBC but not the HMAC part and
so OpenVPN is not really getting benefits from that AES-NI, otherwise since OpenVPN 2.4 with integrated
AES-GCM it would be more fine and also getting benefits from that too. At this time I really prefer the IPSec
VPN standard because it is speeding up to 400% of the normal given throughput and thats really impressive!Under Linux and together with multicore usage it would also not really matching because the pfSense
is using at the WAN port over PPPoE only 1 CPU core!iOS devices from Apple, AVM routers (very popular here in Germany) and Windwos over ShrewSoftVPN client
are also really nice to configure and there fore it will be a long time I would be using that IPSec instead of the
OpenVPN mechanism. Together with a top side mid ranged SG-4860 unit that will be able to delivering ~500+
MBit/s IPSec throughput for pending on the other VPN end. -
@BlueKobold:
openvpn --genkey --secret /tmp/secret time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc ( 3200 / execution_time_seconds ) = Projected Maximum OpenVPN Performance in Mbps
As for comparing OpenVPN performance, I have started using this benchmark:
But this says nothing about OpenVPN performance at all.
The above test provides an easy to perform, upper limit test for any one OpenVPN session. Granted it does not test routing the raw encrypted traffic, but that is a small part of the equation, and why this is a projected maximum OpenVPN performance.
Single core user-land performance, tun driver kernel performance and crypto performance are all part of the test, all related to overall OpenVPN performance.
I have tested several, mostly lower-end (PC Engines APU2C, Jetway NF9HG-2930, Lanner FW-7525B, etc.) hardware and the above test gives a good ballpark, projected maximum OpenVPN performance for any one OpenVPN session.
I would invite others to correlate their experiences with this simple OpenVPN benchmark.
-
@lra:
Granted it does not test routing the raw encrypted traffic, but that is a small part of the equation,
I wonder how accurate it would be compared to a iperf between two routed clients with server/pfSense in the middle?
Or even compared to a client-to-client setting?
Off course measuring on the server.–tun-mtu 20000
Could you elaborate?
Why 20000? OpenSSL will be fed bigger packets? That`s not fair compared to real world,…I think?I would invite others to correlate their experiences with this simple OpenVPN benchmark.
Since I'm still testing real world throughput for different scenarios, I will. (just need to find time enough :))
-
@lra:
Granted it does not test routing the raw encrypted traffic, but that is a small part of the equation,
–tun-mtu 20000
Could you elaborate?
Why 20000? OpenSSL will be fed bigger packets? That`s not fair compared to real world,…I think?The 20000 is arbitrary, but does effect the magic number of 3200. If you used "–tun-mtu 2000" the magic number would be 32 but the test execution time would be too short to be accurate (less than a second).
The "openvpn --test-crypto" sequentially tests packets from 1 byte to 20000 bytes in size (per "--tun-mtu 20000") encrypting then decrypting them via the 'tun' interface driver.
While I agree if OpenVPN's --test-crypto additionally supported specifying a number of iterations with a fixed packet size would be more "real-world", the results using the existing "openvpn --test-crypto" still gives a useful benchmark per my testing.
-
@lra:
@BlueKobold:
openvpn --genkey --secret /tmp/secret time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc ( 3200 / execution_time_seconds ) = Projected Maximum OpenVPN Performance in Mbps
As for comparing OpenVPN performance, I have started using this benchmark:
But this says nothing about OpenVPN performance at all.
The above test provides an easy to perform, upper limit test for any one OpenVPN session. Granted it does not test routing the raw encrypted traffic, but that is a small part of the equation, and why this is a projected maximum OpenVPN performance.
Single core user-land performance, tun driver kernel performance and crypto performance are all part of the test, all related to overall OpenVPN performance.
I have tested several, mostly lower-end (PC Engines APU2C, Jetway NF9HG-2930, Lanner FW-7525B, etc.) hardware and the above test gives a good ballpark, projected maximum OpenVPN performance for any one OpenVPN session.
I would invite others to correlate their experiences with this simple OpenVPN benchmark.
here is my result
Quad Core Celeron N3150
Execution time: 27.7 secs.
Maximum OpenVPN: 115 Mbpsin the real world my home router allows me to get the 90% of my 100Mbps WAN connection through an OpenVPN client
-
here is my result
Quad Core Celeron N3150
Execution time: 27.7 secs.
Maximum OpenVPN: 115 Mbpsin the real world my home router allows me to get the 90% of my 100Mbps WAN connection through an OpenVPN client
Hi,
Then the 100Mbps WAN is not sufficient enough to compare. I have the same CPU, N3150N-D3V and my throughput tests using iperf in a routed
ovpnclient> to <re0-ovpnserver-re1>to ovpnclient, I get max. 160 Mbits/sec., with no compression going on.
Keep in mind that in this scenario the load for the server is heavier then "normal" because theres extra crypto going on, so I
m somewhat sceptical to the mentioned test.At the moment I have no access to my box to compare against 115Mbps, as soon as I have I will post here.</re0-ovpnserver-re1>
-
here is my result
Quad Core Celeron N3150
Execution time: 27.7 secs.
Maximum OpenVPN: 115 Mbpsin the real world my home router allows me to get the 90% of my 100Mbps WAN connection through an OpenVPN client
Hi,
Then the 100Mbps WAN is not sufficient enough to compare. I have the same CPU, N3150N-D3V and my throughput tests using iperf in a routed
ovpnclient> to <re0-ovpnserver-re1>to ovpnclient, I get max. 160 Mbits/sec., with no compression going on.
Keep in mind that in this scenario the load for the server is heavier then "normal" because theres extra crypto going on, so I
m somewhat sceptical to the mentioned test.At the moment I have no access to my box to compare against 115Mbps, as soon as I have I will post here.</re0-ovpnserver-re1>
Hi,
I think so too.
By running a speed test without VPN on my 100/20 connection, the average result is about 94Mbps.
My scenario involves the connection using an OpenVPN client (SSLv3 DHE-RSA-AES256-SHA, RSA 2048 bit). In that case the result is about 90Mbps.
I tried with 4 different VPN providers (IPVanish, PureVPN, PIA, VyprVPN) and the results are similar.
Next month I might have a chance to try on a 250/50 connection. I will post the result here. -
SSLv3 DHE-RSA-AES256-SHA, RSA 2048 bit
For the mentioned test, that is not relevant because the test involves the datachannel.
SSLv3 DHE-RSA-AES256-SHA, RSA 2048 bit is for the control channel. *See note.What could be more interesting for comparison is the log showing this info:
Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
*Note
I usetls-version-min 1.2 or-highest
on both sides.
Server and client will negotiate the highest available TLS version.
With that setting you will probably get:Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Maybe useful for you and others.
-
SSLv3 DHE-RSA-AES256-SHA, RSA 2048 bit
For the mentioned test, that is not relevant because the test involves the datachannel.
SSLv3 DHE-RSA-AES256-SHA, RSA 2048 bit is for the control channel. *See note.What could be more interesting for comparison is the log showing this info:
Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
*Note
I usetls-version-min 1.2 or-highest
on both sides.
Server and client will negotiate the highest available TLS version.
With that setting you will probably get:Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Maybe useful for you and others.
Thanks for the clarification
this is my log
Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA -
here is my result
Quad Core Celeron N3150
Execution time: 27.7 secs.
Maximum OpenVPN: 115 Mbpsin the real world my home router allows me to get the 90% of my 100Mbps WAN connection through an OpenVPN client
Hi,
Then the 100Mbps WAN is not sufficient enough to compare. I have the same CPU, N3150N-D3V and my throughput tests using iperf in a routed
ovpnclient> to <re0-ovpnserver-re1>to ovpnclient, I get max. 160 Mbits/sec., with no compression going on.
Keep in mind that in this scenario the load for the server is heavier then "normal" because theres extra crypto going on, so I
m somewhat sceptical to the mentioned test.At the moment I have no access to my box to compare against 115Mbps, as soon as I have I will post here.</re0-ovpnserver-re1>
Hi,
I think so too.
By running a speed test without VPN on my 100/20 connection, the average result is about 94Mbps.
My scenario involves the connection using an OpenVPN client (SSLv3 DHE-RSA-AES256-SHA, RSA 2048 bit). In that case the result is about 90Mbps.
I tried with 4 different VPN providers (IPVanish, PureVPN, PIA, VyprVPN) and the results are similar.
Next month I might have a chance to try on a 250/50 connection. I will post the result here.I finally got to test the router with a 250/100 fiber connection.
The results are in line with expectations.
The Celeron N3150 is able to reach about 130Mbs via VPN clientThe VPN connection log:
Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
-
@mauroman33, Thanks for the follow-up post.
It seems the simple OpenVPN benchmark formula referenced here:
https://forum.pfsense.org/index.php?topic=105238.msg616743#msg616743gives a reasonable base-line reference. I too have found the actual tested speed can be 5-20 % faster than the benchmark formula, and for some it is right on target.
Nothing beats an actual real-world test, but a quick CLI base-line test can be useful.
-
@lra:
@mauroman33, Thanks for the follow-up post.
It seems the simple OpenVPN benchmark formula referenced here:
https://forum.pfsense.org/index.php?topic=105238.msg616743#msg616743gives a reasonable base-line reference. I too have found the actual tested speed can be 5-20 % faster than the benchmark formula, and for some it is right on target.
Nothing beats an actual real-world test, but a quick CLI base-line test can be useful.
Hello, just a clarification.
Running the command I get this input:
27.41 real 25.62 user 1.77 sysWhat do you mean for "execution_time_seconds" in the formula? The "real" value or the "user" value?
-
@lra:
It seems the simple OpenVPN benchmark formula referenced here:
https://forum.pfsense.org/index.php?topic=105238.msg616743#msg616743Hello, just a clarification.
Running the command I get this input:
27.41 real 25.62 user 1.77 sysWhat do you mean for "execution_time_seconds" in the formula? The "real" value or the "user" value?
Use the "real" value…
(3200 / 27.41) = 117 Mbps OpenVPN performance (estimate)
-
@lra:
@lra:
It seems the simple OpenVPN benchmark formula referenced here:
https://forum.pfsense.org/index.php?topic=105238.msg616743#msg616743Hello, just a clarification.
Running the command I get this input:
27.41 real 25.62 user 1.77 sysWhat do you mean for "execution_time_seconds" in the formula? The "real" value or the "user" value?
Use the "real" value…
(3200 / 27.41) = 117 Mbps OpenVPN performance (estimate)
Thank you!
I saw that in a previous message you have tested a Celeron N2930 with those results
Execution time: 42.4 secs.
Maximum OpenVPN: 75 MbpsIf we consider that the Celeron N2930 is completely comparable with the Celeron N3150
http://www.cpubenchmark.net/compare.php?cmp%5B%5D=2255&cmp%5B%5D=2546
that got 117 Mbps as OpenVPN performance, we could assume the difference is totally due to the AES-NI support of the N3150.
What do you think about it? -
The AES-NI support of the N3150 is no doubt a large part of the increased performance, but there may be other factors as well.
Also, use this "OpenVPN benchmark formula" as a guide, not gospel.
-
@BlueKobold:
Could you please expand on why you think the APU2 would be better? To me it seems to have much slower performance on paper?
For sure I will do that. Only counting together the performance tech. specs. would be like:
-
APU2C2 is 4 CPU cores & AES-NI
-
Intel i210AT consumer grade NICs
-
2 GB normal RAM
-
3 x miniPCIe + SIM
-
mSATA support & SATA Port
-
wide spread and well supported
-
APU2C4 is 4 CPU cores & AES-NI
-
Intel i211AT LAN Ports server grade NICs
-
4 GB ECC RAM
-
3 x miniPCIe + SIM
-
mSATA support & SATA Port
-
wide spread and well supported
Both are available as a bundle for around ~220 € fully fan less and silent and are easy routing 100 MBit/s
with case and PSU. And it will be able also to route 250 MBit/s at the WAN Port with ease.How well is your board supported?
How well are the drivers are matching to that hardware?
How well it is playing together with pfSense (version 2.2.6)?The apu2 sports an AMD GX-412TC which clocks in at 1200MHz.
While the Intel n3150 clocks in at 1600MHz, and goes up to 2080MHz with turbo.Yep but would it do better then the APU2? It has more CPU power and thats it, perhaps it
would be better sorting the OpenVPN now, but since OpenVPN 2.4 and AES-GCM support
I would not swear on this! So I really thing there are other things similar matching but more
or better supported and running like hell. At the end of this thread I am counting together
some spare parts as an assemble, there are for sure better and stronger systems out there
but how well they are playing nice together with pfSense is the most question for me!This is an honest question, I really wonder, because I am trying to make this exact decision myself
Each of us has his own understanding, beloved hardware or systems he´s is more or less swearing
on for sure that must not be matching or considering the parts and interested in systems other would love
to go with.(Although I am looking at Jetway boards with mutliple NIC's, not Asus (With the cost of the extra NIC you're basically paying the same as a multi NIC board).).
Yes and no, sorry based on my lower English language skills I must take much more lines to explain something
but there are even also some strange differences and also if the hardware is based on the same SoC or CPU!
So there are J1900 and N2930 boards I hate and pfSense is causing problems with, and based on the same
CPUs or SoC, as explained in some line above, other boards will not have this failures, issues or malfunction.
And that mostly for only some bucks on top of the other hardware likes 20 € - 60 € and this is not really much
money of you can safe time and play around with your new hardware and don´t be boring about some problems.For your 100M connectivity, APU2/2150 should be able to handle the job easily, while the APU2 board comes with dual Intel i210/211 NICs which seems to be better.
Here in Germany are only some 100 MBit/s FTTH/FTTC connections able to get for private persons
and this is one of the most used self made firewall basis because pfSense, untangle UTM and Sophos
UTM are running fine on them too. The N2930 is working for edwardwong routing nearly 1 GBit/s at
the WAN port. I don´t know about the OpenVPN speed, but according to the AES-NI support in OpenVPN
version 2.4 it could really be that the APU2 is then better, perhaps also the Intel N3050i too, but from that
I don´t know the support of it. And due of the lack of AES-NI at the N2930 I was considering the APU2 as
a better choice.Entry Level:
-
APU2C4 bundle
-
Compex WLE200NX
-
Sierra Wireless MC7710 LTE
-
Crucial 30/60/120 GB mSATA
-
2 x 4 GB DDR3-1600MHz
-
Ubiquiti SR71-E WLAN card
-
Sierra Wireless MC7710 LTE
-
Crucial 30/60/120 GB mSATA
-
Supermicro A1SRi-2358 (new)
-
2 x 2 GB DDR3-1600MHz ECC RAM
-
Samsung840 Pro SSD 80/120/240 GB
pfSense SG-2220 / SG-2440
Mid ranged:
Supermicro A1SRi-2558
Supermicro A1SRi-2758- 2 x 4/8 GB DDR3-1600MHz ECC RAM
- Samsung840 Pro SSD 80/120/240 GB
pfSense SG-4860 / SG-8860
Professional:
- ASUS Q87T
- Gigabyte Q87T
- CPU support
Intel Core i7 (Haswell), Intel Core i5 (Haswell), Intel Core i3 (Haswell),
Intel Pentium G (Haswell), Intel Celeron G (Haswell), Intel Xeon E3 v3 (Haswell) - 2 x 2/4/8 GB S0-DIMM DDR3-1600MHz
- Intel Ethernet Server Adapter I350-T4
- WiFi Atheros AR9280 half length
- Crucial 30/60/120GB mSATA
- Noctua NH-L9i, CPU-Kühler
pfSense C2758 1U / XG-2758
High end:
- Gigabyte GA-6LISL
- Intel Xeon E3-12xxv3
- Intel i350 / i354 4x NIC
- 8/16 GB ECC DDR3 RAM
- Intel SLC/MLC 120/240 SSD
pfSense XG-2758 / XG-1500
I also encountered the same problem, this is useful information to me
Thank you so much -
-
@lra:
Perhaps a PC Engines APU or APU2 Board or bundle (PSU & case & Board) would be realizing this for you.
Could you please expand on why you think the APU2 would be better? To me it seems to have much slower performance on paper?
The apu2 sports an AMD GX-412TC which clocks in at 1200MHz.
While the Intel n3150 clocks in at 1600MHz, and goes up to 2080MHz with turbo.As for comparing OpenVPN performance, I have started using this benchmark:
openvpn --genkey --secret /tmp/secret time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc
Then to give the execution time in seconds a real-world meaning:
( 3200 / execution_time_seconds ) = Projected Maximum OpenVPN Performance in Mbps
For example (tested using Linux 3.2.x)…
PC Engines APU2 Quad Core AMD GX-412TC:
Execution time: 77.3 secs.
Maximum OpenVPN: 41 MbpsJetway NF9HG-2930 Quad Core Celeron N2930:
Execution time: 42.4 secs.
Maximum OpenVPN: 75 MbpsSo far, in my testing, this benchmark comes close to actual Maximum OpenVPN Performance measurements under optimum conditions. The projected speed should be an upper limit.
Note: The magic number of 3200 comes from summing 1 to 20000, multiply by 2 for encrypt and decrypt and by 8 bits/byte and divide by 1,000,000 for a result of Mbps
Do you really run AES256? Seems a little overkill.
If I want to know AES-128-CBC performance, can I just change it after –cipher?
Thanks,
Matt -
If I want to know AES-128-CBC performance, can I just change it after –cipher?
Yes, simply change to –cipher aes-128-cbc , the formula stays the same.
BTW, with OpenVPN 2.4 you can also test --cipher aes-256-gcm and --cipher aes-128-gcm .
-
would go for the quad core variant for not much more, if possible
apollo lake atom based board perhaps
-
FWIW, J3355B:
AES-256-CBC : 291.2Mbps
AES-256-GCM: 302.0MbpsAES-128-CBC: 293.5Mbps
AES-128-GCM: 307.9Mbps#: time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc disabling NCP mode (--ncp-disable) because not in P2MP client or server mode 10.989u 0.015s 0:11.02 99.7% 819+178k 2+0io 0pf+0w #: time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-gcm disabling NCP mode (--ncp-disable) because not in P2MP client or server mode 10.596u 0.023s 0:10.66 99.5% 817+178k 2+0io 0pf+0w #: time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-128-cbc disabling NCP mode (--ncp-disable) because not in P2MP client or server mode 10.902u 0.015s 0:10.99 99.2% 821+178k 2+0io 0pf+0w #: time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-128-gcm disabling NCP mode (--ncp-disable) because not in P2MP client or server mode 10.392u 0.015s 0:10.46 99.4% 818+177k 2+0io 0pf+0w
-
FWIW, J3355B:
AES-256-CBC : 291.2Mbps
AES-256-GCM: 302.0MbpsAES-128-CBC: 293.5Mbps
AES-128-GCM: 307.9MbpsThanks for the useful information. I'm going to update the tread here:
https://forum.pfsense.org/index.php?topic=115673.0 -
@lra:
@mauroman33, Thanks for the follow-up post.
It seems the simple OpenVPN benchmark formula referenced here:
https://forum.pfsense.org/index.php?topic=105238.msg616743#msg616743gives a reasonable base-line reference. I too have found the actual tested speed can be 5-20 % faster than the benchmark formula, and for some it is right on target.
Nothing beats an actual real-world test, but a quick CLI base-line test can be useful.
@mauroman33 did you test 256 or 128 cipher? did you have AES-NI active in pfsense when doing this test? Do you know what version of pfsense this was?
I have Celeron N3150 with AES-NI hardware accelerators. I'm little disappointed if 115Mbps is cap of this processor. It was said it can do 300Mbps on single core.
My ISP connection is 180Mbps i was hoping 10% less then my ISP connection so 160Mbs?
Can you test or anyone else with this buffer code along with hardware accelerators on for N3150?
https://forum.pfsense.org/index.php?topic=128698.msg714619#msg714619
fast-io sndbuf 524288 rcvbuf 524288
I don't think one can estimate output when hardware accelerators are on as we don't know what factor that changes things. I'm assuming estimates are based on CPU cycles alone no? I spent ~$350 on this box 2 yrs ago and for it to come short it's bit disappointing.
Anyone have any suggestions on newer cheap <$200 NUCs with CPU that has AES-NI accelerators instructions. I'm still keeping hope i can max out my ISP connection with N3150? Maybe those buffer codes?
I will soon have vpn and will do tests myself even with those buffer codes. They seemed to speed things up quite a bit.
Is GCM suppose to be faster more secure then CBC? What's the deal-eo with that?
-
I confirm that 115Mbps are the limit of a Celeron N3150, even with AES-NI active and those lines in OpenVPN Custom Options.
300Mbps were related to a Celeron J3355. -
I confirm that 115Mbps are the limit of a Celeron N3150, even with AES-NI active and those lines in OpenVPN Custom Options.
300Mbps were related to a Celeron J3355.Thanks buddy. Little disappointed. I was hoping for 165Mbps. BTW check this out. This guy changed send and recieve windows not sure what speed boost he got from it. Did you try it?
" I also changed net.inet.tcp.recvspace & net.inet.tcp.sendspace (under System -> Advanced -> System Tunables) to max 2048K (=2097152 bytes)"
https://forum.pfsense.org/index.php?topic=112877.msg788565#msg788565
Do you know any NUC boxes (lowed powered boxes with no noise fans) that host this Celeron J3355 or other better cpu with AES-NI ext???
-
What encryption settings are you using?
AES-GCM will be faster the CBC+auth. It's faster even with auth but you don't need that with GCM as it's built in.
Are you sure your CPU is using it's turbo mode correctly?
Steve
-
I confirm that 115Mbps are the limit of a Celeron N3150, even with AES-NI active and those lines in OpenVPN Custom Options.
300Mbps were related to a Celeron J3355.Thanks buddy. Little disappointed. I was hoping for 165Mbps. BTW check this out. This guy changed send and recieve windows not sure what speed boost he got from it. Did you try it?
" I also changed net.inet.tcp.recvspace & net.inet.tcp.sendspace (under System -> Advanced -> System Tunables) to max 2048K (=2097152 bytes)"
https://forum.pfsense.org/index.php?topic=112877.msg788565#msg788565
Do you know any NUC boxes (lowed powered boxes with no noise fans) that host this Celeron J3355 or other better cpu with AES-NI ext???
Yes, same values here.
You could take a look on something like that
https://www.amazon.com/ZOTAC-i5-6300U-Bluetooth-Barebones-ZBOX-CI545NANO-U/dp/B071P596LH/ref=sr_1_1?ie=UTF8&qid=1520466138&sr=8-1&keywords=ci545&th=1 -
What encryption settings are you using?
AES-GCM will be faster the CBC+auth. It's faster even with auth nut you don't need that with GCM as it's built in.
Are you sure your CPU is using it's turbo mode correctly?
Steve
Steve this is what i'm using. Yes ext are active. I don't have VPN yet but am in process of getting it. My vpn will have GCM 128 and 256.
My impression was AES-NI was suppose to help exponentially in Mbps speeds not linearly. I'm seeing some other ppl with same CPU 1.8Ghz but newer process pushing 300Mbps.
Something doesn't make sense here. 200Mhz would not double the speed. It has to be AES-NI or special tweaks. Also my N3150 is quad core but i'm hearing vpn is single threaded.
Celeron-Processor-J3355 doing 300Mbps is only 400Mhz faster then my cpu. 400Mhz will not double the speed in Mbps. Something else is here in play. Inconsistent PIA servers perhaps?
I will not be on PIA also btw.https://ark.intel.com/products/95597/Intel-Celeron-Processor-J3355-2M-Cache-up-to-2_5-GHz
-
What encryption settings are you using?
AES-GCM will be faster the CBC+auth. It's faster even with auth nut you don't need that with GCM as it's built in.
Are you sure your CPU is using it's turbo mode correctly?
Steve
Steve how do i enable turbo mode? Is that in bios settings?
Edit found it and enabled in bios for turbo. Pfsense still shows 1.6GHZ tho as it should as that's burst mode only
-
hey guys check this out. In openvpn documentation it shows that tweaks not cpu cycles increase throughput but problem is that vpn provider won't allow you to change MTU size beyond 1500
https://community.openvpn.net/openvpn/wiki/Gigabit_Networks_Linux
-
My impression was AES-NI was suppose to help exponentially in Mbps speeds not linearly. I'm seeing some other ppl with same CPU 1.8Ghz but newer process pushing 300Mbps.
Something doesn't make sense here. 200Mhz would not double the speed. It has to be AES-NI or special tweaks. Also my N3150 is quad core but i'm hearing vpn is single threaded.
Celeron-Processor-J3355 doing 300Mbps is only 400Mhz faster then my cpu. 400Mhz will not double the speed in Mbps. Something else is here in play. Inconsistent PIA servers perhaps?
I will not be on PIA also btw.https://ark.intel.com/products/95597/Intel-Celeron-Processor-J3355-2M-Cache-up-to-2_5-GHz
A Celeron N3150 is two years older than a Celeron J3355 that has a better implementation of AES-NI, I think isn't just matter of Mhz…
-
I just signed up with vpn and did my own testing and compared to this guy here. AES-NI does not work at all. It offers ZERO assist. Not one 1Mbs.
I've proven it here. I have doubled my cpu power over my asus 87u and it doubled my speed but look at this other guy results. https://forum.pfsense.org/index.php?topic=139926.0
-
What settings are you using?
AES-NI will be accelerating almost every setting to some extent. To test it's effects accurately you will need to enable/disable it in the BIOS though.
The Turbo mode is show as 1601MHz vs 1600MHz for non-turbo.
Steve
-
What settings are you using?
AES-NI will be accelerating almost every setting to some extent. To test it's effects accurately you will need to enable/disable it in the BIOS though.
The Turbo mode is show as 1601MHz vs 1600MHz for non-turbo.
Steve
Steve thanks for feedback. AES-NI is enabled as you can clearly see in screenshot of pfsense that it says it's active to yes it's active in bios and should work. Turbo i enabled last night in bios but that will never take effect as one would have to max out cpu to 100% for turbo to kick it. My cpu maxes out 50% in pfsense during encryption testing so it will never get there. But to your point it shows in pfsense as 1601 so turbo is enabled as well. Look
I have chosen freebsd hardware acceleration in both vpn client and under networking in advanced options which boosted my Mbps by 10Mbps but i max out at 120Mbs now. It won't do more. It's all about
CPU cycles from what i see. I commented on this more here. Let me know your thoughts if you want. I think CPU cycle rate needs to be 3Ghz for ideal setup. Those AMD APU A10 7800k are 4.0Ghz and
are cheap enough but how to chose motherboard with 2 nics, ideally intel onces in mini itx form. I have 2 1gb realtek once and have no problem at all with them in pfsense like some suggest they do. They do their job.
https://forum.pfsense.org/index.php?topic=139926.msg788801#msg788801
This thread is also right on the money but it's 2 yrs old now so not ideal hardware anymore. That last celeron is cheap but i can't seem to find nuc or motherboard in itx form for it. I think ideal would be AMD A10 APU. Low power and high cycle rate but not sure about mini itx motherboard with 2 nics and what case. Etc. Then again that AMD doesn't have AES-NI so when pfsense 2.5 comes out it will become obsolete without those instructions. So scratch AMD without AES-NI too. This is a quest.
https://forum.pfsense.org/index.php?topic=115673.0