08-29-2006 07:22 PM - edited 03-03-2019 01:48 PM
The performance documents from Cisco say that the 3825 is capable of 350,000 packets per second for a rate of 179Mbps. I know that they are using small packets to establish this. What throughput can I really expect?
Solved! Go to Solution.
08-30-2006 04:06 PM
The 3825 configured for only IP can push around 1Gbps, or 400k PPS. This is based on a mix of small and large packets, representing typical internet traffic.
With services turned on (qos, firewall, vpn, nat, nbar), expect to see anywhere between 100-300Mbps throughput, depending on which service it is, and what combination of services are configured.
08-30-2006 04:06 PM
The 3825 configured for only IP can push around 1Gbps, or 400k PPS. This is based on a mix of small and large packets, representing typical internet traffic.
With services turned on (qos, firewall, vpn, nat, nbar), expect to see anywhere between 100-300Mbps throughput, depending on which service it is, and what combination of services are configured.
08-31-2006 08:26 AM
That doesn't make sense. 400,000x64byte packets x 8 = 204Mbps. That is the best case.
08-31-2006 09:56 AM
What do you mean the best case? For throughput or for PPS?
Routers performance is based PPS, not by size. Therefore the larger the packet the more the throughput.
My response said that the figures were made from a mix of small and large packets, with the average around 1000b
08-31-2006 12:13 PM
I am sorry, you are correct. Thanks!
08-30-2006 07:21 PM
Patrick,
One of the best way to test the throughput, is to try and get a 3825 from your sales team and test it in your lab based using a traffic generator using typical packet size in your network.
And also, make sure that you enable the feature that you want and measure the throughput.
Regards,
Arul
01-29-2008 12:22 PM
I have two 3825s directly connected with gig interfaces and cannot come close to the 179Mbps numbers. I am using the onboard VACs and have tried gre, gre/ipsec, VTI, and ipsec with various mtu and DF bit settings, but can only achieve around 36-38Mbps max throughput using iperf and ftp. Also noticed CPU is max >95% during any of these tests. My question, is are these ballpark numbers for 3825 256M, 12.4(15)T, and would an external VAC greatly improve performance?
01-29-2008 04:25 PM
If you're not already doing so, you might want to try using the "ip tcp adjust-mss" command. See http://www.cisco.com/en/US/docs/ios/12_2t/12_2t4/feature/guide/ft_admss.html for more information. Set it such to match the available actual effective minimal MTU.
You should also confirm the hardware, not software, is doing any encryption.
According to http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps7180/prod_brochure09186a00801f0a72_ns125_Networking_Solutions_Brochure.html, the 3825 on board encryption is supposely good for about 170 Mbps.
01-31-2008 09:32 AM
Thanks, I did try the "ip tcp adjust-mss" command with no luck. Also, I know I'm using onboard hardware encryption because I disabled it on both 3825s and only got around 10-12 Mbps with software ("show crytpo engine brief").
I've read the second link you posted and saw the numbers for on-board vs. external VPN accel. What is that like only a 9% (170/185) increase with an external VPN accel.? Would more memory make any difference?
If you follow this thread:
and download the routerperformance.pdf file. It seems to reveal that there is no way you can get close to the published VPN numbers. Especially if a 3825 will only allow 170Mbps of real throughput with no additional services or features (vpn,acls,etc). These would be important numbers to have on the website.
01-31-2008 10:43 AM
"Would more memory make any difference?" I wouldn't think so, but what's your free memory stat like?
Seems a large delta from the under 40 Mbps you getting vs. the documented 170 Mbps. I'm wondering how much GRE/IPSec vs. pure IPSec might impact performance.
01-31-2008 11:17 AM
You were right, looks like I've got plenty of free mem (about 20% used/ 80% free).
I agree about the large delta. I will reconfigure for pure ipsec and see what I get. It almost seems like GRE/ipsec or VTI (currently configed) is getting process switched instead of fast/CEF switched. But, disabling onboard encryption brings my numbers down to 10-12 Mbps which agrees with the process switched numbers on the routerperformance.pdf file. Thanks.
02-12-2008 01:16 PM
I tried pure ipsec with roughly the same numbers for throughput (36-38Mbps). I also tried GRE with no encryption (58-61Mbps) and IP-IP (62-66Mbps). I've got two external VPN encrypters on order and will try to post numbers on those when I have time. Finally, I found this Cisco doc
02-12-2008 02:13 PM
Hi, can you clarify in detail you testing methodology and provide a show interface and show process cpu taken at maximum performance time ?
Seems there is too much difference with the cisco numbers.
02-13-2008 07:52 AM
Before I do that, let's go back to my original question. What are the "real" throughput numbers for VPN using onboard VAC and pure ipsec, gre/ipsec, and VTI? Also, if I spend $2K on an external VPN module, will these numbers increase and if so, by how much? Finally, can you post a complete configuration that will get the maximum VPN throughput out of two 3825s connect directly together using some form of ipsec (pure ipsec, gre/ipsec, vti)?
02-13-2008 08:04 AM
My question was related to pure ip routing. There is too much difference in that between your numbers and cisco's ones, and in my experience, during 8 years with them, cisco's numbers are generally genuine.
About the performances with crypto, your numbers matches with cisco's of "pag 47", so I think it's reasonable these are correct ones.
Finally note that a VPN aim is available for the 3845, AIM-VPN/SSL-3, made with the purpose of adding performances and scalability to the onboard one.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide