From owner-freebsd-net@FreeBSD.ORG Thu Nov 6 14:46:47 2014 Return-Path: Delivered-To: net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B4908B25; Thu, 6 Nov 2014 14:46:47 +0000 (UTC) Received: from mail-wi0-x233.google.com (mail-wi0-x233.google.com [IPv6:2a00:1450:400c:c05::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3E57B913; Thu, 6 Nov 2014 14:46:47 +0000 (UTC) Received: by mail-wi0-f179.google.com with SMTP id h11so1718287wiw.6 for ; Thu, 06 Nov 2014 06:46:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=BBwMQ0Q1ZpIcZMQMZp7lwpjK7Q+ICsnOGRC1sUB8550=; b=C6ynZA19ijAkKUelSik5Uu76SL0FnjqdS3pvH8uo6C9SBFPW3PHPULtKpvKuPQyYOQ y3Ezy83e1g0u/AePI+55p1ieA6gK0PNYbah1ubu8ymyOG9O2s3HEMxwiiphwQRY8ignL yGY+fLYuStHNNHEnvO6vSAI7Un3s50NNev1WjrDMjYLzuQJTrd6tOh70hnpwVqHXaNFx NICZRtBykpw4S5ChOyBoLsvtTJwGILOSYesprkujmmz4SYKcwtfs4dgm7NdJCbeFdhzW bgW3Xz8cXdyNHkS10kGJElnJ+cXY+zDCvtoiN69OUXLzrxrxHVmyebL6wu8tjD4/leFq XZMQ== X-Received: by 10.180.14.165 with SMTP id q5mr7326032wic.0.1415285204571; Thu, 06 Nov 2014 06:46:44 -0800 (PST) Received: from [192.168.2.30] ([2.176.144.74]) by mx.google.com with ESMTPSA id b6sm8540644wiy.22.2014.11.06.06.46.41 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 06 Nov 2014 06:46:43 -0800 (PST) Message-ID: <545B89DC.2090305@gmail.com> Date: Thu, 06 Nov 2014 18:16:52 +0330 From: Hooman Fazaeli User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130215 Thunderbird/17.0.3 MIME-Version: 1.0 To: =?ISO-8859-1?Q?Olivier_Cochard-Labb=E9?= Subject: Re: IPSEC in GENERIC [was: Re: netmap in GENERIC, by default, on HEAD] References: <92D22BEA-DDE5-4C6E-855C-B8CACB0319AC@neville-neil.com> <545A5C4D.3050603@FreeBSD.org> <03107CAB-445B-4BA9-8F50-69143E360010@neville-neil.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit Cc: "Andrey V. Elsukov" , "Alexander V. Chernikov" , John-Mark Gurney , "freebsd-net@freebsd.org" X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Nov 2014 14:46:47 -0000 On 11/6/2014 1:30 PM, Olivier Cochard-Labbé wrote: > How to correctly bench IPSec performance ? > > For benching forwarding performance I generate minimum-size packet (2000 > flows: 100 different source IP * 20 different destination IP) like with > this netmap's pkt-gen example: > pkt-gen -i ix0 -f tx -n 1000000000 -l 60 -d 9.1.1.1:2000-9.1.1.100 > -s 8.1.1.1:2000-8.1.1.20 > > => This permit me to obtain the maximum PPS forwarded by the server. May be off-topic: How much PPS and on which hardware? > > But for benching IPSec: Is the PPS with minimum-size packet a useful value ? > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" -- Best regards. Hooman Fazaeli