Dear all,
We are testing SRX5600 performance with UDP packets which are used mostly in gaming application. The testing scenario is as the below:
![srx.jpg srx.jpg]()
We have simply two subnets and two group of three servers which are packet generators and receivers. We tried to send UDP packet at several rate from right side to left side and monitored SPU load, flow session and cp-session to examinate what is performance limits.
Startup configuration of the SRX is quite simple:
SRX5600> show chassis hardware models
Hardware inventory:
Item Version Part number Serial number FRU model number
Midplane REV 02 760-063936 ACRF5922 SRX5600X-CHAS
FPM Board REV 01 760-058098 CAFZ0086
PEM 0 Rev 04 740-034701 QCS15260904D SRX5600-PWR-2520-AC-S
PEM 1 Rev 04 740-034701 QCS15290901B SRX5600-PWR-2520-AC-S
PEM 2 Rev 04 740-034701 QCS1541090JW SRX5600-PWR-2520-AC-S
PEM 3 Rev 04 740-034701 QCS1541090LF SRX5600-PWR-2520-AC-S
Routing Engine 0 REV 02 740-056658 9013104720 SRX5K-RE-1800X4
CB 0 REV 03 750-062257 CAEW9777 SRX5K-SCB3
FPC 4 REV 24 750-061489 CAHV6708 SRX5K-SPC-4-15-320
CPU BUILTIN BUILTIN
FPC 5 REV 08 750-061262 CAFE1321 SRX5K-MPC
MIC 0 REV 07 750-049488 CAFF0743 SRX-MIC-10XG-SFPP
MIC 1 REV 10 750-049488 CAHD8073 SRX-MIC-10XG-SFPP
Fan Tray SRX5600-HC-FAN
SRX5600> show interfaces terse xe-5/0/0
Interface Admin Link Proto Local Remote
xe-5/0/0 up up
xe-5/0/0.2025 up up inet 61.28.240.1/24
multiservice
xe-5/0/0.2026 up up inet 61.28.241.1/24
multiservice
xe-5/0/0.32767 up up multiservice
SRX5600> show route
inet.0: 4 destinations, 4 routes (4 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
61.28.240.0/24 *[Direct/0] 5d 02:08:09
> via xe-5/0/0.2025
61.28.240.1/32 *[Local/0] 5d 02:08:12
Local via xe-5/0/0.2025
61.28.241.0/24 *[Direct/0] 5d 02:08:09> via xe-5/0/0.2026
61.28.241.1/32 *[Local/0] 5d 02:08:12
Local via xe-5/0/0.2026
SRX5600> show security zones
Security zone: VLAN2025
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 1
Interfaces:
xe-5/0/0.2025
Security zone: VLAN2026
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 1
Interfaces:
xe-5/0/0.2026
Security zone: junos-host
Send reset for non-SYN session TCP packets: Off
Policy configurable: Yes
Interfaces bound: 0
Interfaces:
SRX5600> show security policies
Default policy: deny-all
From zone: VLAN2026, To zone: VLAN2025
Policy: T1, State: enabled, Index: 4, Scope Policy: 0, Sequence number: 1
Source addresses: 61.28.241.0/24
Destination addresses: 61.28.240.0/24
Applications: any
Action: permit
SRX5600> show security screen status
Screen status:
Screen trap interval : 2 second(s)
SRX5600> show security log
Security logging is disabled
TEST 1:
We tried to send a single UDP stream from 61.28.241.14:1210 to 61.28.240.10:2121, destination a real server existing in the left side of our scenario. We sent 10.000.000 packet in total at rate of 500K pps. Since there was a single session, that stream was proceeded by a single SPU, the SPU utilization was 30-40%. It seem to be fine!
SRX5600> show security monitoring
Flow session Flow session CP session CP session
FPC PIC CPU Mem current maximum current maximum
4 0 0 11 0 0 0 0
4 1 0 5 0 6291456 0 7549747
4 2 38 5 8 6291456 10 7549747
4 3 0 5 1 6291456 2 7549747
Total Sessions: 9 18874368 12 22649241
SRX5600> show security flow statistics
Flow Statistics of FPC4 PIC1:
Current sessions: 0
Packets forwarded: 8
Packets dropped: 4
Fragment packets: 0
Flow Statistics of FPC4 PIC2:
Current sessions: 2
Packets forwarded: 10793528
Packets dropped: 16
Fragment packets: 0
Flow Statistics of FPC4 PIC3:
Current sessions: 0
Packets forwarded: 34
Packets dropped: 17
Fragment packets: 0
Flow Statistics Summary:
System total valid sessions: 2
Packets forwarded: 10793570
Packets dropped: 37
Fragment packets: 0
SRX5600> show security flow cp-session
DCP Flow Sessions on FPC4 PIC0:
Total sessions: 0
DCP Flow Sessions on FPC4 PIC1:
Total sessions: 0
DCP Flow Sessions on FPC4 PIC2:
Session ID: 180862127, SPU: 18, Valid
In: 61.28.241.14/1210 --> 61.28.240.10/2121;udp,
Out: 61.28.240.10/2121 --> 61.28.241.14/1210;udp,
Session ID: 180908976, SPU: 18, Invalidated
In: 61.28.241.14/1210 --> 61.28.240.10/2121;udp,
Out: 61.28.240.10/2121 --> 61.28.241.14/1210;udp,
Session ID: 181263604, SPU: 18, Invalidated
In: 61.28.240.10/44812 --> 172.16.97.10/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 181343296, SPU: 18, Invalidated
In: 61.28.241.14/1210 --> 61.28.240.10/2121;udp,
Out: 61.28.240.10/2121 --> 61.28.241.14/1210;udp,
Session ID: 181686285, SPU: 18, Invalidated
In: 61.28.241.14/1210 --> 61.28.240.10/2121;udp,
Out: 61.28.240.10/2121 --> 61.28.241.14/1210;udp,
Session ID: 181989157, SPU: 18, Invalidated
In: 61.28.241.14/1210 --> 61.28.240.10/2121;udp,
Out: 61.28.240.10/2121 --> 61.28.241.14/1210;udp,
Session ID: 182846046, SPU: 18, Valid
In: 61.28.240.7/46408 --> 61.28.240.1/22;tcp,
Out: 61.28.240.1/22 --> 61.28.240.7/46408;tcp,
Total sessions: 7
DCP Flow Sessions on FPC4 PIC3:
Session ID: 191449139, SPU: 19, Invalidated
In: 61.28.241.5/50684 --> 172.16.97.10/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Total sessions: 1
SRX5600> show security flow session
Flow Sessions on FPC4 PIC1:
Total sessions: 0
Flow Sessions on FPC4 PIC2:
Session ID: 181555326, Policy name: self-traffic-policy/1, Timeout: 1800, Valid
In: 61.28.240.7/46408 --> 61.28.240.1/22;tcp, If: xe-5/0/0.2025, Pkts: 2902, Bytes: 211617, CP Session ID: 182846046
Out: 61.28.240.1/22 --> 61.28.240.7/46408;tcp, If: .local..0, Pkts: 1866, Bytes: 382195, CP Session ID: 182846046
Session ID: 181556134, Policy name: T1/4, Timeout: 60, Valid
In: 61.28.241.14/1210 --> 61.28.240.10/2121;udp, If: xe-5/0/0.2026, Pkts: 316414, Bytes: 8859592, CP Session ID: 181975112
Out: 61.28.240.10/2121 --> 61.28.241.14/1210;udp, If: xe-5/0/0.2025, Pkts: 0, Bytes: 0, CP Session ID: 181975112
Total sessions: 2
Flow Sessions on FPC4 PIC3:
Total sessions: 0
SRX5600> show interfaces xe-5/0/0.2026 extensive
Logical interface xe-5/0/0.2026 (Index 71) (SNMP ifIndex 621) (Generation 136)
Flags: Up SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.2026 ] Encapsulation: ENET2
Traffic statistics:
Input bytes : 280000612
Output bytes : 2098
Input packets: 10000010
Output packets: 31
Local statistics:
Input bytes : 192
Output bytes : 138
Input packets: 3
Output packets: 3
Transit statistics:
Input bytes : 0 0 bps
Output bytes : 0 0 bps
Input packets: 0 0 pps
Output packets: 0 0 pps
Security: Zone: VLAN2026
Flow Statistics :
Flow Input statistics :
Self packets : 0
ICMP packets : 0
VPN packets : 0
Multicast packets : 0
TEST 2:
We sent similar stream in TEST 1 but to different destination. In this case, we sent to no existing IP/subnet: 61.28.242.10:2121. We expected the packets is dropped silently because of no route to that destination and didn't deplete SPU resources. But the result was different, SPU utilization got 99%!
SRX5600> show security monitoring
Flow session Flow session CP session CP session
FPC PIC CPU Mem current maximum current maximum
4 0 0 11 0 0 0 0
4 1 0 5 1 6291456 1 7549747
4 2 0 5 1 6291456 1 7549747
4 3 99 5 132060 6291456 1 7549747
Total Sessions: 132062 18874368 3 22649241
SRX5600> show security flow statistics
Flow Statistics of FPC4 PIC1:
Current sessions: 1
Packets forwarded: 84
Packets dropped: 2
Fragment packets: 0
Flow Statistics of FPC4 PIC2:
Current sessions: 1
Packets forwarded: 505
Packets dropped: 7
Fragment packets: 0
Flow Statistics of FPC4 PIC3:
Current sessions: 0
Packets forwarded: 9919326
Packets dropped: 459624
Fragment packets: 0
Flow Statistics Summary:
System total valid sessions: 2
Packets forwarded: 9919915
Packets dropped: 459633
Fragment packets: 0
SRX5600> show security flow cp-session
DCP Flow Sessions on FPC4 PIC0:
Total sessions: 0
DCP Flow Sessions on FPC4 PIC1:
Session ID: 170756285, SPU: 17, Invalidated
In: 61.28.241.14/33986 --> 172.16.97.6/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 173520009, SPU: 17, Pending
In: 61.28.240.11/43024 --> 172.16.97.6/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 174609306, SPU: 17, Invalidated
In: 61.28.240.11/42828 --> 172.16.97.10/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 174973268, SPU: 17, Valid
In: 61.28.240.7/58102 --> 61.28.240.1/161;udp,
Out: 61.28.240.1/161 --> 61.28.240.7/58102;udp,
Total sessions: 4
DCP Flow Sessions on FPC4 PIC2:
Session ID: 181973328, SPU: 18, Invalidated
In: 61.28.240.7/41286 --> 122.201.9.245/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 182189245, SPU: 18, Invalidated
In: 61.28.240.10/33380 --> 122.201.9.245/10051;tcp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 182846046, SPU: 18, Valid
In: 61.28.240.7/46408 --> 61.28.240.1/22;tcp,
Out: 61.28.240.1/22 --> 61.28.240.7/46408;tcp,
Total sessions: 3
DCP Flow Sessions on FPC4 PIC3:
Session ID: 196756651, SPU: 19, Pending
In: 61.28.241.14/1210 --> 61.28.242.10/2121;udp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Session ID: 197093279, SPU: 19, Invalidated
In: 61.28.241.14/1210 --> 61.28.242.10/2121;udp,
Out: 0.0.0.0/0 --> 0.0.0.0/0;0,
Total sessions: 2
SRX5600> show security flow session
Flow Sessions on FPC4 PIC1:
Session ID: 171768053, Policy name: self-traffic-policy/1, Timeout: 60, Valid
In: 61.28.240.7/58102 --> 61.28.240.1/161;udp, If: xe-5/0/0.2025, Pkts: 652, Bytes: 49934, CP Session ID: 174973268
Out: 61.28.240.1/161 --> 61.28.240.7/58102;udp, If: .local..0, Pkts: 652, Bytes: 50687, CP Session ID: 174973268
Total sessions: 1
Flow Sessions on FPC4 PIC2:
Session ID: 181555326, Policy name: self-traffic-policy/1, Timeout: 1800, Valid
In: 61.28.240.7/46408 --> 61.28.240.1/22;tcp, If: xe-5/0/0.2025, Pkts: 8195, Bytes: 570557, CP Session ID: 182846046
Out: 61.28.240.1/22 --> 61.28.240.7/46408;tcp, If: .local..0, Pkts: 6388, Bytes: 1465119, CP Session ID: 182846046
Total sessions: 1
Flow Sessions on FPC4 PIC3:
Total sessions: 0
SRX5600> show interfaces xe-5/0/0.2026 extensive
Logical interface xe-5/0/0.2026 (Index 71) (SNMP ifIndex 621) (Generation 136)
Flags: Up SNMP-Traps 0x4000 VLAN-Tag [ 0x8100.2026 ] Encapsulation: ENET2
Traffic statistics:
Input bytes : 280000732
Output bytes : 5322
Input packets: 10000012
Output packets: 75
Local statistics:
Input bytes : 192
Output bytes : 138
Input packets: 3
Output packets: 3
Transit statistics:
Input bytes : 0 480 bps
Output bytes : 0 464 bps
Input packets: 0 1 pps
Output packets: 0 1 pps
Security: Zone: VLAN2026
Flow Statistics :
Flow Input statistics :
Self packets : 0
ICMP packets : 0
VPN packets : 0
Multicast packets : 0
Bytes permitted by policy : 0
Connections established : 0
Flow Output statistics:
Multicast packets : 0
Bytes permitted by policy : 0
Flow error statistics (Packets dropped due to):
Address spoofing: 0
Authentication failed: 0
Incoming NAT errors: 0
Invalid zone received packet: 0
Multiple user authentications: 0
Multiple incoming NAT: 0
No parent for a gate: 0
No one interested in self packets: 0
No minor session: 0
No more sessions: 0
No NAT gate: 0
No route present: 463406
No SA for incoming SPI: 0
No tunnel found: 0
No session for a gate: 0
No zone or NULL zone binding 0
Policy denied: 0
Security association not active: 0
TCP sequence number out of window: 0
Syn-attack protection: 0
User authentication errors: 0
We affraid there was something wrong in the routing config and force a discard default route but nothing better.
SRX5600> show route
inet.0: 5 destinations, 5 routes (5 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
0.0.0.0/0 *[Static/5] 00:00:11
Discard
61.28.240.0/24 *[Direct/0] 5d 03:35:49
> via xe-5/0/0.2025
61.28.240.1/32 *[Local/0] 5d 03:35:52
Local via xe-5/0/0.2025
61.28.241.0/24 *[Direct/0] 5d 03:35:49> via xe-5/0/0.2026
61.28.241.1/32 *[Local/0] 5d 03:35:52
Local via xe-5/0/0.2026
SRX5600> show security monitoring
Flow session Flow session CP session CP session
FPC PIC CPU Mem current maximum current maximum
4 0 0 11 0 0 0 0
4 1 0 5 4 6291456 3 7549747
4 2 0 5 10 6291456 5 7549747
4 3 99 5 133320 6291456 5 7549747
Total Sessions: 133334 18874368 13 22649241
Could you please explain for me why SPU got 99% in TEST 2? Because 500K pps stream is far more under SPC II limit which spectify support 5Mpps/SPC ~ 1.25Mpps/SPU?
Thank you in advance,
Trung