All of lore.kernel.org
 help / color / mirror / Atom feed
* iptables performance
@ 2005-05-25 19:20 Martin Schiøtz
  2005-05-25 21:25 ` Jason Opperisano
  0 siblings, 1 reply; 5+ messages in thread
From: Martin Schiøtz @ 2005-05-25 19:20 UTC (permalink / raw)
  To: netfilter

Hi 

I'm planning to set up a bridge running iptables on an uplink of a lot
of internet user. The uplink is on maximum at about 30 mbit/s. There
are about 1800 * /29 ip nets - some /29 nets needs to be stopped be
the bridge and some can pass. I'm wondering about the performance of
iptables when having 1800*2 rules worst case (PREROUTING rules on src
and dst nets).

Actually I have made some kind of hashing using user defined rules.
This gives a maximum of a packet to travel through about 65 + 32
rules. I have not tested live - before I do this, I would like to know
if anybody here have any experience or idea about performance  with
that kind of traffic load and number of rules?

Best regards,
Martin

My user defined rules:

iptables -t mangle -N 10.0.0.0/24
...
...
iptables -t mangle -N 10.0.x.x/24

iptables -t mangle -I 10.0.0.0/24 1 -m physdev --physdev-in $IF_DOWN
-s  10.0.0.0/29-j ACCEPT
iptables -t mangle -I 10.0.0.0/24 1 -m physdev --physdev-in $IF_UP -d 
10.0.0.0/29 -j ACCEPT
...
...
iptables -t mangle -A 10.0.0.0/24 -j DROP
...
...

iptables -t mangle -I PREROUTING 4 -m physdev --physdev-in $IF_DOWN -s
$CUSTOMER_NET_1 --goto 10.0.0.0/24
iptables -t mangle -I PREROUTING 4 -m physdev --physdev-in $IF_UP -d
$CUSTOMER_NET_1 --goto 10.0.0.0/24
...
...
iptables -t mangle -I PREROUTING 4 -m physdev --physdev-in $IF_DOWN -s
$CUSTOMER_NET_1 --goto 10.0.x.x/24
iptables -t mangle -I PREROUTING 4 -m physdev --physdev-in $IF_UP -d
$CUSTOMER_NET_1 --goto 10.0.x.x/24


^ permalink raw reply	[flat|nested] 5+ messages in thread
* iptables performance
@ 2007-02-15 19:48 Bart Duchesne
  0 siblings, 0 replies; 5+ messages in thread
From: Bart Duchesne @ 2007-02-15 19:48 UTC (permalink / raw)
  To: netfilter

Hi,

We are running kernel 2.6.17 and using iptables 1.3.5 and are observing
a performance problem.

We have a netfilter firewall consisting of about 800 Chains and a total
of 10000 rules (iptables -nvL | wc -l).

A single iptables manipulation takes about 4 seconds (on a PIV 2Ghz with
1Gb DDR2 ram).

With the same firewall config (on slower hardware) in a 2.4.24 kernel
with iptables 1.2.9 the single iptables manip takes about 500ms.

I traced the iptables command in 2.6.17 and noticed that the 4 seconds
are actually lost in the setsockopt call to write the BLOB back to the
kernel (BLOB size 2Mb ; 11000 entries).

Does anyone has any idea what might be causing this slowdown ?
Has the kernel interface part changed dramatically between 2.4 and 2.6 ?
Is it correct to say that no traffic will pass through in those 4
seconds that the filter is updated ?


regards,

Bart Duchesne 

--
Visit CeBIT 2007 – March 15-21, 2007 – Messe, Hannover, Germany – Security Hall, Hall 7 Booth C20 and Banking and Finance Hall, Hall 17, Booth A01. For additional information, please visit the event section of VASCO's website http://www.vasco.com/events.

Infosecurity.be / Storage Expo 
Belgium 21 & 22 March 2007 Brussels Kart
http://www.infosecurity.be   http://www.storage-expo.be  http://www.linuxworldexpo.be
 


---------------------------------------------------
aXs GUARD has completed security and anti-virus checks on this e-mail (http://www.axsguard.com)
---------------------------------------------------
Able NV: ond.nr 0457.938.087
RPR Mechelen



^ permalink raw reply	[flat|nested] 5+ messages in thread
[parent not found: <4104105C.4040306@switzer.org>]

end of thread, other threads:[~2007-02-15 19:48 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-05-25 19:20 iptables performance Martin Schiøtz
2005-05-25 21:25 ` Jason Opperisano
2005-05-26  9:22   ` Martin Schiøtz
  -- strict thread matches above, loose matches on Subject: below --
2007-02-15 19:48 Bart Duchesne
     [not found] <4104105C.4040306@switzer.org>
2004-07-30  8:15 ` IPTables Performance Harald Welte

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.