X-Git-Url: https://gerrit.fd.io/r/gitweb?p=csit.git;a=blobdiff_plain;f=docs%2Freport%2Fintroduction%2Fmethodology_ipsec.rst;h=a168e238eea1b2fb3d36cd4940550f3352905895;hp=99119e18d098c2b75aed1c6cdaf14036abcb9638;hb=HEAD;hpb=c10980893443b59c464deb6cd0d66d5be972593f diff --git a/docs/report/introduction/methodology_ipsec.rst b/docs/report/introduction/methodology_ipsec.rst deleted file mode 100644 index 99119e18d0..0000000000 --- a/docs/report/introduction/methodology_ipsec.rst +++ /dev/null @@ -1,53 +0,0 @@ -Internet Protocol Security (IPsec) ----------------------------------- - -VPP IPsec performance tests are executed for the following crypto -plugins: - -- `crypto_native`, used for software based crypto leveraging CPU - platform optimizations e.g. Intel's AES-NI instruction set. -- `crypto_ipsecmb`, used for hardware based crypto with Intel QAT PCIe - cards. - -IPsec with VPP Native SW Crypto -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -Currently |csit-release| implements following IPsec test cases relying -on VPP native crypto (`crypto_native` plugin): - -+-------------------+------------------+----------------+------------------+ -| VPP Crypto Engine | ESP Encryption | ESP Integrity | Scale Tested | -+===================+==================+================+==================+ -| crypto_native | AES[128|256]-GCM | GCM | 1 to 60k tunnels | -+-------------------+------------------+----------------+------------------+ -| crypto_native | AES128-CBC | SHA[256|512] | 1 to 60k tunnels | -+-------------------+------------------+----------------+------------------+ - -VPP IPsec with SW crypto are executed in both tunnel and policy modes, -with tests running on 3-node testbeds: 3n-skx. - -IPsec with Intel QAT HW -^^^^^^^^^^^^^^^^^^^^^^^ - -Currently |csit-release| implements following IPsec test cases relying -on ipsecmb library (`crypto_ipsecmb` plugin) and Intel QAT 8950 (50G HW -crypto card): - -dpdk_cryptodev - -+-------------------+---------------------+------------------+----------------+------------------+ -| VPP Crypto Engine | VPP Crypto Workers | ESP Encryption | ESP Integrity | Scale Tested | -+===================+=====================+==================+================+==================+ -| crypto_ipsecmb | sync/all workers | AES[128|256]-GCM | GCM | 1, 1k tunnels | -+-------------------+---------------------+------------------+----------------+------------------+ -| crypto_ipsecmb | sync/all workers | AES[128]-CBC | SHA[256|512] | 1, 1k tunnels | -+-------------------+---------------------+------------------+----------------+------------------+ -| crypto_ipsecmb | async/crypto worker | AES[128|256]-GCM | GCM | 1, 4, 1k tunnels | -+-------------------+---------------------+------------------+----------------+------------------+ -| crypto_ipsecmb | async/crypto worker | AES[128]-CBC | SHA[256|512] | 1, 4, 1k tunnels | -+-------------------+---------------------+------------------+----------------+------------------+ - -.. - VPP IPsec with HW crypto are executed in both tunnel and policy modes, - with tests running on 3-node Haswell testbeds (3n-hsw), as these are the - only testbeds equipped with Intel QAT cards.