PC Engines apu2 experiences
-
I don’t know if Netgate make their own versions of the BIOS (because it says “SageBIOS”). I know if you check in package manager on pfSense, there is a package for the apu from them.
However, for the generic firmware, there are much newer ones available. See here: https://pcengines.github.io/#top
If you scroll a few posts back, we were “just discussing it” and how to flash the BIOS.
-
^^
but the oldest board in any of those lists [for the legacy releases] is "APU2", and it looks like have an APU with no digit (e.g. an APU1).I've read many places on this forum that, for pfsense, the "mainline" releases are to be avoided.
-
I don’t know why mainline’s are to be avoided, I have 4.8.0.5 running and it works just fine.
I think with the flash utility you can backup your existing firmware if you can no longer find it on the internet. Then you can downgrade if you have problems.
-
@veldkornet said in PC Engines apu2 experiences:
I don’t know why mainline’s are to be avoided, I have 4.8.0.5 running and it works just fine.
I think with the flash utility you can backup your existing firmware if you can no longer find it on the internet. Then you can downgrade if you have problems.
Agree with you, but why update if everything is working well? :-) Is there any benefit?
-
@fireodo said in PC Engines apu2 experiences:
Agree with you, but why update if everything is working well? :-) Is there any benefit?
Well, I'm not saying that you have to do anything. But you could use that same argument for everything software related... Why update Windows if everything works? ?
You can read through all of the release notes yourself, but they fix bugs and release new features every so often. Recently, they've enabled ECC memory in 4.8.0.5
-
@thewaterbug said in PC Engines apu2 experiences:
I suppose I got confused because I purchased this from Netgate in 2014 as a " Netgate APU2".
yes, it's been confusing people for years. all the netgate apu's were based on the older pcengines apu1 design, regardless of their naming convention.
@veldkornet said in PC Engines apu2 experiences:
Recently, they've enabled ECC memory in 4.8.0.5
not for the apu1
-
@veldkornet said in PC Engines apu2 experiences:
I don’t know if Netgate make their own versions of the BIOS (because it says “SageBIOS”).
We didn't.
It's possible to put the newer BIOS versions on APU1 if you want. I did it a while back just to test if it could be done:
BIOS Vendor: coreboot Version: v4.8.0.1 Release Date: Fri Jun 8 2018
That would be what was sold by Netgate as the APU2 or APU4 to indicate 2 or 4GB of RAM at the time. Also as the VK-T40E2/4 from the pfSense store.
I'm not aware of any advantages that BIOS brings but mine has been running solidly with for months just as one data point.
[Edit: actually it does appear to add new devices as bootable]See: https://forum.netgate.com/post/777287
Steve -
@vamike said in PC Engines apu2 experiences:
@thewaterbug said in PC Engines apu2 experiences:
I suppose I got confused because I purchased this from Netgate in 2014 as a " Netgate APU2".
yes, it's been confusing people for years. all the netgate apu's were based on the older pcengines apu1 design, regardless of their naming convention.
Aha! Thank you. I am very slightly less confused, now.
So I apparently have only a dual-core box with no AES-NI support. And the PCEngines "APU2xxx" was never sold by Netgate, correct?
Does my Netgate APU unit then belong in the "Official Netgate Hardware" forum?
-
@thewaterbug said in PC Engines apu2 experiences:
How does the APU2 stack up against the MBT-2220, performance-wise, for running pfsense, IPSec, and OpenVPN? ...
The APU2 has: "AMD Embedded G series GX-412TC, 1 GHz quad Jaguar core with 64 bit and AES-NI support, 32K data + 32K instruction cache per core, shared 2MB L2 cache."
while the MBT-2220 has: "Intel Atom E3826 (2 x 1.46 GHz, 1MB cache, AES-NI)"
That comparison was inaccurate, since I have an APU1, not an APU2. The correct comparison is now:
The APU1 has: "AMD G series T40E APU, 1 GHz dual core (Bobcat core) with 64 bit support, 32K data + 32K instruction + 512KB L2 cache per core."
while the MBT-2220 has: "Intel Atom E3826 (2 x 1.46 GHz, 1MB cache, AES-NI)"
So my spiffy new MBT-2220 units are clearly more performant than my old APU units, especially for anything that can use AES-NI acceleration.
-
@thewaterbug said in PC Engines apu2 experiences:
Does my Netgate APU unit then belong in the "Official Netgate Hardware" forum?
You can open a thread there but there are a lot of APU users who did not purchase through our store. You might well get more views here.
Steve
-
^^
Then I'll keep it here, where I get more views!By this weekend I should have one of my APU units re-installed with 2.4.4 and an IPSec tunnel to an MBT-2220 running 2.4.4. Can I use iperf between them to measure tunnel performance? Max line rate is only 20 Mbps.
If I can saturate that with AES turn on (software only) then there's no urgency to upgrade the hardware.
-
We used to use the APU1C2 before changing to the APU2C4 with the advent of 2.5 needing aes-ni. We tested them at 300Mbps and, although I don't recall actual numbers for AES in software we were able to get decent speeds and nobody complained. I think you'll be fine with 20Mbps.
-
Thanks! I guess I missed the very loud debate about 2.5 requiring AES-NI. I'll probably limp along with my ancient hardware until support for 2.4 goes away.
-
It should be no problem at 20Mbps.
2.5 is still a way out.Steve
-
and who knows, maybe by the time 2.5 comes along, they will have backed off this pointless aes-ni requirement and won't force retirement of working hardware.
-
While I wish they didn't implement it to be mandatory until the next major revision (and maybe 2.5 is a major revision, idk), I really don't see much of a problem. They gave us something like 2 years notice and 2.4 will be supported for at least a year after 2.5 is released which is likely still some months away as FreeBSD12 isn't even out yet. By that time most of us will have more old equipment that supports aes-ni laying around. For my company it means having to spend about another $1,500 in hardware to replace 6 more devices with APU2s but that's a small price compared to purchasing the alternatives.
I do feel bad for people who paid money for devices specifically for pfSense, like the APU1 series, only to find it will be retired 3 years later but the 2.4 line will still work in the them without issue forever. You still get 5 years of supported service life out of the equipment. The other big name firewalls we use are SonicWall and they don't offer anything beyond the 5 year mark, either.
I don't know what precipitated the requirement but I appreciate the big heads up. I hope it's for more than VPN traffic and it is somehow used foundationally to further enhance security. I also hope it clears up the confusion as to what the aes-ni settings should be to get the best performance out of our boxes. I guess we'll see once it launches.
-
@stewart said in PC Engines apu2 experiences:
While I wish they didn't implement it to be mandatory until the next major revision (and maybe 2.5 is a major revision, idk), I really don't see much of a problem. They gave us something like 2 years notice and 2.4 will be supported for at least a year after 2.5 is released which is likely still some months away as FreeBSD12 isn't even out yet. By that time most of us will have more old equipment that supports aes-ni laying around. For my company it means having to spend about another $1,500 in hardware to replace 6 more devices with APU2s but that's a small price compared to purchasing the alternatives.
That would all be reasonable--if there were a compelling reason to force the obsolescence. Since there isn't, it's just obnoxious.
I don't know what precipitated the requirement but I appreciate the big heads up.
As far as I can tell, poking the china box vendors in the eye was what precipitated the requirement.
I hope it's for more than VPN traffic and it is somehow used foundationally to further enhance security. I also hope it clears up the confusion as to what the aes-ni settings should be to get the best performance out of our boxes. I guess we'll see once it launches.
You leave the settings alone; the confusion is mostly people who don't know what they're doing repeating things they've read on reddit that were written by other people who don't know what they're doing. I would not be at all surprised if there are people pushing "tricks" to "speed up" crypto by doing idiotic things to override the defaults long after 2.5 is released.
-
@vamike said in PC Engines apu2 experiences:
You leave the settings alone; the confusion is mostly people who don't know what they're doing repeating things they've read on reddit that were written by other people who don't know what they're doing. I would not be at all surprised if there are people pushing "tricks" to "speed up" crypto by doing idiotic things to override the defaults long after 2.5 is released.
Maybe that's the way it is now but it's hasn't always been clear. At one time there was a lot of discussion as to what to set where as the results were all over the place depending on the hardware you had. Right now, do you select hardware or software decryption? Or none at all? It all depends on your hardware and which encrypting you are doing.
-
@stewart said in PC Engines apu2 experiences:
@vamike said in PC Engines apu2 experiences:
You leave the settings alone; the confusion is mostly people who don't know what they're doing repeating things they've read on reddit that were written by other people who don't know what they're doing. I would not be at all surprised if there are people pushing "tricks" to "speed up" crypto by doing idiotic things to override the defaults long after 2.5 is released.
Maybe that's the way it is now but it's hasn't always been clear. At one time there was a lot of discussion as to what to set where as the results were all over the place depending on the hardware you had. Right now, do you select hardware or software decryption? Or none at all? It all depends on your hardware and which encrypting you are doing.
It's been pretty clear except for people posting misunderstood and misleading openssl benchmark results and shooting themselves in the foot. The discussions mostly revolved around fanciful numbers in which screwing up the config would magically make a system do crypto even faster than it could access memory. Just leave it alone has been the correct action for a long time.
-
Mmm, that sslspeed thread was.... um...wild!
The default settings should work well for most. Some tuning can help. The asynchronous-crypto setting in 2.4.4 can dramatically increase ipsec throughput in some situations but can also break it in some edge cases so it not enabled by default in CE.
Steve