[strongSwan] Performance issue with 20k IPsec tunnels (using 5.0.4 strongswan and load-tester plugin)
Chinmaya Dwibedy
ckdwibedy at yahoo.com
Thu Sep 19 12:58:52 CEST 2013
Hi,
I set the “/proc/sys/net/core/xfrm_acq_expires” to 23000
seconds. I tested with 15k IPsec tunnels successfully without encountering any
issue. While trying to run with 20000 IPsec tunnels without data traffic, it
could able to bring up 19939 tunnels. Checked the SAD count via ip xfrm state
count. Also the IPsec Tunnel Setup was very low. To bring these 19939 tunnels, it takes 6
hours (approximately). We are using the Gigabit Ethernet link between two high
end systems (One acts as an IKE initiator and another as IKE responder) I cannot
enable logging with 20k IPsec tunnels to debug this issue. Can anyone please
suggest/guide, what are the areas to be looked upon? So that I can scale up with
more numbers of tunnels. Thanks in advance for your help.
Here go our
configurations. Please feel free to let me know if any more information is
needed.
IKE initiator
strongswan.conf
threads = 32
replay_window =
32
dos_protection =
no
block_threshold=23000
cookie_threshold=23000
init_limit_half_open=23000
init_limit_job_load=23000
retransmit_timeout=120
retransmit_tries=90
install_virtual_ip=no
install_routes=no
close_ike_on_child_failure=yes
ikesa_table_size
= 4096
ikesa_table_segments = 32
reuse_ikesa = no
load-tester {
enable = yes
initiators = 100
iterations = 200
delay
= 20
responder = 30.30.30.21
initiator_tsr =40.0.0.1
proposal = aes128-sha1-modp1024
initiator_auth = psk
responder_auth = psk
request_virtual_ip = yes
ike_rekey = 0
child_rekey = 0
delete_after_established = no
shutdown_when_complete = no
}
ipsec.secrets
@srv.strongswan.org %any : PSK "strongSwan"
IKE Responder
strongswan.conf
threads = 32
replay_window =
32
block_threshold=23000
cookie_threshold=23000
init_limit_half_open=23000
half_open_timeout=23000
init_limit_job_load=23000
dos_protection =
no
close_ike_on_child_failure=yes
ikesa_table_size
= 4096
ikesa_table_segments = 32
reuse_ikesa = no
ipsec.conf
conn %default
ikelifetime=24h
keylife=23h
rekeymargin=5m
keyingtries=1
keyexchange=ikev2
ike=aes128-sha1-modp1024!
mobike=no
conn gw-gw
left=30.30.30.21
leftsubnet=40.0.0.1/8
rightid=%any
leftauth=psk
leftfirewall=yes
rightsourceip=10.0.0.0/8
leftid=@srv.strongswan.org
rightauth=psk
type=tunnel
authby=secret
rekey=no
reauth=no
auto=add
ipsec.secrets
@srv.strongswan.org %any : PSK "strongSwan"
Regards,
Chinmaya
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20130919/49a35dcc/attachment.html>
More information about the Users
mailing list