cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2352
Views
0
Helpful
7
Replies

Cisco 4431 Ipsec throughput question?

ChrisD72
Level 1
Level 1

Hi 

We have a 4431 running as a VPN head end and have roughly 700x users connecting concurrently. 

I'm having difficulty understanding what the IPSEC throughput should be and how to measure it?

The router has the HSEC and throughput licences and shows 1000Mbps for the throughput command. In the diagram below you can see that clients terminate on the 'outside' interface and then access internal resources and the internet (via proxy) via the 'inside' interface. These are physical Gig ints with a VRF for the inside and outside. 

Understand that as we are effectively tromboning the traffic there is really only 500Mbps for user bandwidth but with 700x users connected it hits around 200Mbps max when I run the 'sh plat hard qfp act datapath util'

I can see that the hsec and throughput licences are installed and enabled with 'sh lic feat'

Q1 - I understand real world throughput on a 4431 is about 900Mbps but should I be seeing more than 200Mbps going through?

Q2 - is there an accurate way of displaying the ipsec throughput on the router?

 

vpn.jpg

7 Replies 7

Joseph W. Doherty
Hall of Fame
Hall of Fame
What's the CPU performance history look like?

Assuming you're not maxing out the CPU, it might be the nature of your 700, or so, VPN users, only can obtain/need 200 Mbps. (Also keep in mind, a] lots of variables obtaining high bandwidth on any kind of WAN [see LFNs], b] other variables when dealing with Internet and c] more variables when dealing with IPSec and some form of tunneling [most due to IP fragmentation].)

 

CPU never goes above 20%

It's certainly not the nature of the users as they are constantly complaining about performance, there is no split tunnel so all traffic goes over the VPN tunnel.

If router's CPU doesn't exceed 20%, than likely the bottleneck isn't the router.

Again, lots of variables impact performance, more than just available bandwidth. Across WAN, a very important variable is latency. Unfortunately, not much you can do about distance based latency, except perhaps avoiding in, in some cases, with local side caching.

Another important variable, when using TCP, is a properly sized receive window. Too small, TCP won't take advantage of all the available bandwidth. Too big, TCP can burst over end-to-end capacity resulting in many drops, which often can degrade the throughput so much, path bandwidth utilization will be under utilized.

In your topology, you also have two FWs and a proxy that might be issues too.

Hello,

 

post the full running configuration of your 4331, maybe we can spot something...

 

I'll have to edit the config to hide data as it's a govt customer so need to be careful around disclosing info.

 

I'm more concerned that a new windows RRAS solution is being put in using SSTP on the basis this will solve all the issues and I'm worried that the issue isn't with the 4431 so it won't be resolved.

 

Q - Is there a way of displaying the IPSEC throughput or bandwidth usage? even if it's just a real time display / command.

Q - Am I correct in thinking that this router with these licences should be capable of 1Gbps IPSEC throuhput and if so is that shared across the interfaces so that the inside and outside interfaces will effectively handle 500Mbps each or have 1Gbps each?

 

"Q - Is there a way of displaying the IPSEC throughput or bandwidth usage? even if it's just a real time display / command."

Show interface will show average bandwidth usage, in and out, over the interface's load-interval (which defaults to 5 minutes, but can be set as low as 30 seconds. SNMP monitoring can poll usage to much smaller intervals.

"Q - Am I correct in thinking that this router with these licences should be capable of 1Gbps IPSEC throuhput and if so is that shared across the interfaces so that the inside and outside interfaces will effectively handle 500Mbps each or have 1Gbps each?"

That or a tad less. I recall (?) some 3rd party performance tests, on the 4K series of ISRs showed some that could not provide 100% of router's rated maximum capacity for IP when using IPSec, but loss wasn't much.

I understand performance cap is an aggregate of all traffic passing through router. I.e. if, for example, the gig limit should allow an aggregate maximum of gig across active egress ports; such a 400 and 600 Mbps egress on two ports or 200, 300 and 500 Mbps egress on three ports, etc. (What I'm not sure is whether the aggregate can be higher for all ingress, or egress, if something like port ACLs is dropping some of that traffic. I suspect higher might be allowed for ingress but not egress.)
Review Cisco Networking for a $25 gift card