Tom Dunigan's VPN performance
Virtual Private Network Performance
Starting in the summer of 1996, we conducted a number of evaluations
of VPN hardware and software. Several of the hardware solutions
had problems tunneling UDP packets that were bigger than the
local network MTU (IP fragmentation). The PIX unit was corrected,
but the NetFortress box still (10/1/96)
and the Compatible box (5/99) fails to tunnel UDP larger
than the Ethernet MTU when using 3DES, ok with DES.
Tunneling throughput was measured over
a range of packet sizes with TCP and UDP.
Test environment
Test generators (ttcp, 1K packets, TCP, isolated Ethernet) (Revised 9/18/96)
mist 90MHz Pentium Linux 1.2.13
charade 120MHz Pentium Linux 1.2.13 (or NetBSD) (md5: 6.1 MBs des-cbc 970 KBs)
puffin 166MHz Pentium NetBSD +NRL ipv6 (md5: 8.5MBs, des-cbc 1.3 MBs)
maya 166MHz Pentium Linux 1.2.13
ISAKMP key exchange: 2.3 seconds (ikmpd jul196 + 8/6/96 mods)
PIX Version 2.7.10 with Newbridge ISA DES board CA95C68-16CP
host -- PIX ---ether --- PIX -- host (same for NetFortress) IPv4
We also did encrypted-tunnel testing between two Cisco routers (IOS software
encryption), but Cisco requests that we not publish those performance numbers
(4/97).
Througput
HARDWARE throughput KBs
mist-charade 893
PIX no encryption 626
PIX encrypted 309
Netfortress 181
SOFTWARE
IPv4/6 crypto (ttcp -A2 and/or -T2)
charade-puffin
v4 clear 884
v4 A2 765
v4 T2 505
v4 T2+A2 421
v6 clear 822
v6 A2 690
v6 T2 472
v6 A2+T2 393
Application-level crypto
charade-maya ttcp with des/md5 (contention) nuance/thistle (200MHz) idle
clear 850 998
md5 714 965
des-cbc 572 953
md5+des 495 961
SSH crypto (ttcp tunneled through ssh )
charade->puffin
clear (no tunnel) 925
none (no encryption) 794
RC4 685
TSS (MD5 stream cipher) 676
DES 437
IDEA 369
3DES 222
SunSkip Win95 (charade/mist) 12/97
clear 800
encrypt (RC2-40) 200
pptp tests (200 MHz Pentiums, NT) 6/98 a===B---c
direct 1037 KBs
pptp-clear 812
pptp-RC4 811
Checkpoint Firewall1/Securemote v3 tests a==NT--b (7/98)
NT 200 MHz dual pentium pro, NT 4/sp3 with hotfixes,
a-b clear 953
FWZ1 400
DES 280
Cylink a -- cy ==== cy -- b (7/98)
a-b clear 1005
DES 1005
Compatible VPN a====V---b 5/99 a/b 200 MHz/linux
a-b direct 1087
DES 774
3DES 430
Linux Free/SWAN a--X====Y--b X/Y 450 MHz 100 Mbs 6/99
a-b clear 1185 KBs
3DES 1375 KBs go figure?
using an ssh-3des tunnel: 821 KBS
Linux NIST's IPsec a===b a 450 MHz b 300 MHz 10 Mbs (7/99)
a-b clear 850 KBs
3DES/md5 tunnel 758
ttcp3des-md5 857
Latency
8 byte UDP echo, minimum rd trip time (microseconds)
direct Ether (charade <--> nimbus linux/166 4/29/97)
microseconds
clear 450
md5 467
des/cbc 494
md5+des 525
charade <-> puffin NetBSD NRL ipv6
microseconds
PIX-clear 784
PIX-enc 2084
NetFortress 2729
v6 733
v6 A2 1292
v6 T2 1517
v6 A2+T2 2145
v4 593
v4 A2 1256
v4 T2 1265
v4 A2+T2 2001
sunskip charade->mist win95
clear 1519
encrypt 4205
pptp tests (200 MHz Pentiums, NT)
direct 325
pptp-clear 628
ppt-rc4 633
Firewall1/securemote a==NT--b
a-b clear 902
FWZ1 1650
DES 1650
Cylink a -- cy ==== cy -- b (200 and 166 MHz pentiums)
clear 560 (a-b)
DES 1763 streaming rate (4300 pps, clear direct: 14000 pps)
Compatible (several router hops)
des 3166
3des 3243
Linux Free/SWAN a--X==Y--b
clear 421
3des 678
Linux NIST IPsec
clear 284
3des 677
The effect of encryption on network performance may be worse
for modems that do compression.
The encrypted packets will not compress and so effective throughput
will be further reduced unless the application has done compression
before encryption.
Last Modified thd@ornl.gov
(touches: )
Back to VPN page
also see USDA
Cisco tunnel performance
Other security related links can be found
here.