{"title":"Performance analysis of virtualized VPN endpoints","authors":"D. Lackovic, Mladen Tomic","doi":"10.23919/MIPRO.2017.7973470","DOIUrl":null,"url":null,"abstract":"Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances, such as firewalls or routers. In modern networks, which utilize Network Functions Virtualization (NFV), VPN endpoints can be virtualized on common servers. Because data encryption and decryption are CPU intensive operations, it is important to investigate limits of such setups so that feasibility of endpoint virtualization can be evaluated. In this paper, we analyze performance of two industry standard VPN implementations - IPSec and OpenVPN. We examine TCP throughput in relation to encryption algorithm used and packet size. Our experiments suggest that moving VPN endpoints from a specialized hardware appliance to a virtualized environment can be a viable and simple solution if traffic throughput requirements are not too demanding. However, it is still difficult to replace high-end appliances with large throughput capabilities.","PeriodicalId":203046,"journal":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/MIPRO.2017.7973470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances, such as firewalls or routers. In modern networks, which utilize Network Functions Virtualization (NFV), VPN endpoints can be virtualized on common servers. Because data encryption and decryption are CPU intensive operations, it is important to investigate limits of such setups so that feasibility of endpoint virtualization can be evaluated. In this paper, we analyze performance of two industry standard VPN implementations - IPSec and OpenVPN. We examine TCP throughput in relation to encryption algorithm used and packet size. Our experiments suggest that moving VPN endpoints from a specialized hardware appliance to a virtualized environment can be a viable and simple solution if traffic throughput requirements are not too demanding. However, it is still difficult to replace high-end appliances with large throughput capabilities.