Date: Thu, 6 Nov 2014 11:00:24 +0100 From: =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= <olivier@cochard.me> To: George Neville-Neil <gnn@neville-neil.com> Cc: "Andrey V. Elsukov" <ae@freebsd.org>, John-Mark Gurney <jmg@funkthat.com>, "Alexander V. Chernikov" <melifaro@freebsd.org>, "freebsd-net@freebsd.org" <net@freebsd.org> Subject: Re: IPSEC in GENERIC [was: Re: netmap in GENERIC, by default, on HEAD] Message-ID: <CA%2Bq%2BTcpFrufGV3Wj8QTH1CX6aBVuu_nw9gGD-pg99p270219RQ@mail.gmail.com> In-Reply-To: <03107CAB-445B-4BA9-8F50-69143E360010@neville-neil.com> References: <92D22BEA-DDE5-4C6E-855C-B8CACB0319AC@neville-neil.com> <545A5C4D.3050603@FreeBSD.org> <03107CAB-445B-4BA9-8F50-69143E360010@neville-neil.com>
next in thread | previous in thread | raw e-mail | index | archive | help
How to correctly bench IPSec performance ? For benching forwarding performance I generate minimum-size packet (2000 flows: 100 different source IP * 20 different destination IP) like with this netmap's pkt-gen example: pkt-gen -i ix0 -f tx -n 1000000000 -l 60 -d 9.1.1.1:2000-9.1.1.100 -s 8.1.1.1:2000-8.1.1.20 => This permit me to obtain the maximum PPS forwarded by the server. But for benching IPSec: Is the PPS with minimum-size packet a useful value ?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2Bq%2BTcpFrufGV3Wj8QTH1CX6aBVuu_nw9gGD-pg99p270219RQ>