HP-UX IPSec vA.02.00 Performance and Sizing White Paper

HP-UX IPSec vA.02.00 Performance and Sizing
White Paper
Overview............................................................................................................................................ 3
Throughput, CPU Utilization and Service Demand ................................................................................... 3
Test Configuration............................................................................................................................ 4
AES, DES, and 3DES Encryption........................................................................................................ 5
Throughput .................................................................................................................................. 5
CPU Utilization ............................................................................................................................ 6
Service Demand........................................................................................................................... 6
MD5 and HMAC-SHA1 Authentication............................................................................................... 7
Throughput .................................................................................................................................. 7
CPU Utilization ............................................................................................................................ 8
Service Demand........................................................................................................................... 8
Authenticated AES, DES, and 3DES ................................................................................................... 9
Throughput .................................................................................................................................. 9
CPU Utilization .......................................................................................................................... 10
Service Demand......................................................................................................................... 10
Comparative Throughput................................................................................................................. 11
Security Association Measurements...................................................................................................... 12
ISAKMP/MM SA ........................................................................................................................... 12
IPsec/QM SAs............................................................................................................................... 12
Test Configuration.......................................................................................................................... 12
SA Negotiation Times..................................................................................................................... 12
Tuning Performance: Maximum Quick Mode SAs .............................................................................. 13
Mobile IPv6 Measurements ................................................................................................................. 14
Test Configuration.......................................................................................................................... 14
Binding Update and Binding Acknowledgement Messages ................................................................. 14
Forwarded Packets......................................................................................................................... 15
Applying Performance Data ................................................................................................................ 16
Appendix A: Two-Way HP Integrity Server Performance Data ................................................................. 17
Test Configuration.......................................................................................................................... 17
Comparative Results ....................................................................................................................... 18
Encrypted AES, DES, and 3DES....................................................................................................... 19
MD5 and HMAC-SHA1 .................................................................................................................. 20

Summary of content (30 pages)