Skip to main content

Overview

This section provides detailed performance characteristics for Aviatrix security features, including firewall throughput, VPN performance, encryption overhead, and inspection service capacity across different deployment configurations.

Firewall Performance

Distributed Firewall Throughput

Gateway SizeRules CapacityThroughput (Clear)Throughput (Encrypted)Connections/secConcurrent Sessions
Small1,0001.5 Gbps1.2 Gbps5,00050,000
Medium2,5003.5 Gbps2.8 Gbps12,500125,000
Large5,0007 Gbps5.6 Gbps25,000250,000
XLarge10,00014 Gbps11.2 Gbps50,000500,000
XXLarge20,00028 Gbps22.4 Gbps100,0001,000,000
Performance Notes:
  • Throughput measured with 1518-byte packets
  • Encrypted performance assumes AES-256 encryption
  • Connection rates sustained for 60+ seconds
  • Session limits based on available memory

VPN Performance

IPSec VPN Throughput

Encryption AlgorithmKey SizeSmall GatewayMedium GatewayLarge GatewayXLarge Gateway
AES-128-CBC128-bit800 Mbps1.8 Gbps3.6 Gbps7.2 Gbps
AES-256-CBC256-bit600 Mbps1.4 Gbps2.8 Gbps5.6 Gbps
AES-128-GCM128-bit1.0 Gbps2.2 Gbps4.4 Gbps8.8 Gbps
AES-256-GCM256-bit750 Mbps1.6 Gbps3.2 Gbps6.4 Gbps
ChaCha20-Poly1305256-bit900 Mbps2.0 Gbps4.0 Gbps8.0 Gbps
Encryption Performance Notes:
  • GCM modes provide better performance due to hardware acceleration
  • Performance measured with 1500-byte packets
  • Includes authentication and integrity checking overhead
  • Hardware AES-NI acceleration enabled where available
VPN ProtocolEncryptionAuthenticationThroughput per UserMax Concurrent UsersCPU Overhead
OpenVPNAES-256RSA-204850 Mbps100-2,000High
IKEv2AES-256RSA-204880 Mbps100-2,000Medium
SSL VPNAES-256Certificate60 Mbps100-2,000Medium-High
WireGuardChaCha20Curve25519100 Mbps100-2,000Low
User VPN Characteristics:
  • Per-user bandwidth varies based on gateway size and total users
  • CPU overhead scales with number of concurrent users
  • Memory usage approximately 1-5 MB per active user session
  • Modern protocols like WireGuard offer better performance
Optimization MethodPerformance GainImplementationTrade-offs
Hardware Acceleration20-50%AES-NI, cryptographic enginesPlatform dependent
Compression10-30%LZ4, LZO algorithmsCPU overhead
Packet Batching5-15%Driver optimizationsSlight latency increase
MSS Clamping10-25%MTU optimizationProtocol specific
Connection Pooling15-30%Session reuseMemory overhead
Best Practices:
  • Enable hardware crypto acceleration when available
  • Optimize MTU sizes for network conditions
  • Use modern VPN protocols for better performance
  • Implement intelligent compression based on content type

Encryption Overhead

Encryption Performance Impact

AlgorithmKey SizeThroughputCPU OverheadLatency ImpactSecurity Level
AES-128128-bitHighLow< 0.5 msHigh
AES-256256-bitHighMedium< 1.0 msVery High
3DES168-bitLowHigh2-5 msMedium
ChaCha20256-bitVery HighVery Low< 0.3 msVery High
Blowfish448-bitMediumMedium1-2 msHigh
Algorithm Selection Guidelines:
  • High Performance: ChaCha20 or AES-128 with hardware acceleration
  • Maximum Security: AES-256 with authenticated encryption
  • Legacy Support: 3DES for compatibility (not recommended)
  • Low-Power Devices: ChaCha20 for software-only implementations

Deep Packet Inspection (DPI)

Inspection Service Performance

Inspection DepthThroughput ImpactCPU OverheadMemory UsageUse Cases
Header Only< 5%LowMinimalBasic filtering
Shallow (L3/L4)5-15%Low-MediumLowPort-based rules
Application (L7)15-40%Medium-HighMediumApp identification
Content Scanning40-80%HighHighMalware detection
Full Inspection60-90%Very HighVery HighComprehensive security
Inspection Depth Guidelines:
  • Use minimum required inspection depth for performance
  • Implement selective deep inspection for suspicious traffic
  • Configure bypass rules for trusted applications
  • Monitor resource usage and adjust policies accordingly
ProtocolInspection ComplexityThroughput ImpactCPU UsageMemory per Session
HTTPMedium15-25%Medium5-15 KB
HTTPSHigh (if decrypted)40-60%High20-50 KB
FTPMedium10-20%Low3-8 KB
SMTPMedium20-30%Medium10-25 KB
DNSLow5-10%Low1-3 KB
P2PVery High50-80%Very High50-200 KB
Protocol Optimization:
  • Configure protocol-specific inspection policies
  • Use application signatures for efficient identification
  • Implement intelligent bypass for encrypted traffic
  • Optimize rule sets for most common protocols
Detection MethodAccuracyThroughput ImpactFalse PositivesProcessing Time
Signature-basedHigh20-40%LowLow
BehavioralMedium40-70%MediumMedium
Machine LearningHigh50-80%LowHigh
SandboxingVery High80-95%Very LowVery High
ReputationMedium10-20%MediumLow
Detection Tuning:
  • Balance detection accuracy with performance requirements
  • Implement layered detection for comprehensive coverage
  • Use reputation services for quick threat identification
  • Configure appropriate action policies for different threat levels

Security Policy Performance

Policy Evaluation Impact

Number of RulesLookup TimeMemory UsageThroughput ImpactOptimization
1-100< 0.1 ms< 1 MB< 5%Linear search
100-1,0000.1-0.5 ms1-10 MB5-15%Hash tables
1,000-10,0000.5-2.0 ms10-100 MB15-30%Tree structures
10,000-100,0002.0-5.0 ms100 MB-1 GB30-50%Indexed lookup
100,000+5.0+ ms1+ GB50%+Distributed processing
Scale Optimization Strategies:
  • Use rule grouping and categorization
  • Implement policy caching for frequently accessed rules
  • Optimize rule ordering for most common matches
  • Consider policy distribution across multiple gateways