This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos XG 105: hardware ISO performs betters than software ISO with home license on XG hardware? Is sophos limiting speeds when using home licenses on Sophos hardware?

Dear community,

I am testdriving a XG105 that I got from a friend who works at an IT company to test out the performance. I currently have a 200/200 fiber internet connection.

After installing the hardware ISO (HW-17.5.1_MR-1-347) and running the installation wizard, I got a speed result of 160Mbps with all protections enabled in the wizard.

However: after installing the software ISO (SW-17.1.4_MR-4-254) with a Home license and running the installation wizard with exactly the same protections enabled, I got a speed result of 30 Mbps.

How is this possible?

Has Sophos limited the speed of XG home installations on Sophos XG hardware?

(I remember that on an older UTM120 device there was NO speed difference between software and hardware installations of UTM and XG.)

 

[*-)]



This thread was automatically locked due to age.
Parents
  • How much ram does the XG105 have? The home license is limited to 6GB so that could be the problem if you have everything enabled especially the intrusion prevention.

  • The XG105 has 2Gb of RAM.

    The hardware XG  installation and software XG installation took place on the same device.

  • Ok, let's put this right. It's just the opposite way. Sophos does not artifically slow down Softwareversions of the XG (why should they ???), but they do highly optimize the hardwareimages to the according appliances based on their specs (Mem, CPU cores etc.).

    There are lot of settings under the hood that affects performance and memory usage. Some of the noteworthy are surely the IPS settings for snort.

    While the hardware images have specially tested and optimized settings as for the search method (hyperscan, ac-bnfa etc.) and also other tweaks in place, the software image is quite generic and has to run on a wide variety of possible hardwares the customers might have. So for example the IPS settings should fit well for a midsized or high-end hardware, but might not too run well untweaked on a low end hardware as a 105 is.

    You find most of such settings in the CLI guide, there's also a section for ips

    http://docs.sophos.com/nsg/sophos-firewall/v17.0.5/PDF/SF%20OS%20Command%20Reference%20Guide.pdf

     

    If I compare a software installation running on a old UTM120 (Dual Core / 2GB Mem) hardware with a native XG125 (Dual Core / 4 GB Mem) is see for example:

     

    XG125 native Hardware

    console> show ips_conf
    config stream               1
    config maxsesbytes              0
    config stdsig               1
    config qnum                 10
    config disable_tcpopt_experimental_drops                0
    config enable_appsignatures     1
    config mmap                    0
    config mmapfilepath             1
    config memmode              0
    config failclose                off
    config maxpkts              8
    var SEARCH_METHOD               hyperscan
    var SIP_STATUS              enabled
    var IGNORE_CALL_CHANNEL         enabled
    var TCP_POLICY              windows
    var DETECT_ANOMALIES            no
    var TCP_BLOCK               nblock
    var LOCAL_RULE              local.rules
    config cpulist              0:1

    ips-settings  ips_conf
    console> show ips-settings
    -------------IPS Settings-------------
            stream on
            lowmem off
            maxsesbytes 0
            maxpkts 8
            mmap off
            enable_appsignatures on
            mmapfilepath var
            http_response_scan_limit  65535
            search_method hyperscan
            sip_preproc enabled
            sip_ignore_call_channel enabled

    -------------IPS Instances------------
    IPS CPU
     1  0
     2  1

    UTM120 Appliance running Software SFOS

    console> show ips_conf
    config stream           1
    config maxsesbytes      0
    config stdsig           1
    config qnum             10
    config disable_tcpopt_experimental_drops                0
    config enable_appsignatures             1
    config mmap             0
    config memmode          0
    config failclose        off
    config maxpkts          8
    config cpulist          0:1
    var SIP_STATUS          enabled
    var IGNORE_CALL_CHANNEL enabled
    var SEARCH_METHOD       ac-bnfa
    var TCP_POLICY          windows
    var LOCAL_RULE          local.rules
    var DETECT_ANOMALIES    no
    var TCP_BLOCK           nblock

    console> show ips-settings
    -------------IPS Settings-------------
            stream on
            lowmem off
            maxsesbytes 0
            maxpkts 8
            mmap off
            enable_appsignatures on
            http_response_scan_limit  65535
            search_method ac-bnfa
            sip_preproc enabled
            sip_ignore_call_channel enabled

    -------------IPS Instances------------
    IPS CPU
     1  0
     2  1

    So there's surely place to fiddle within your ips and other base settings to get most out of you hardware. You can try to figure out the default settings of a native XG105 and apply them to your software installation too. Also this "hyperscan" setting on appliances with CPU's supporting Quickassist from Intel might be noteworthy to test. AFAIK the XG105 CPU doesn't support Quickassist (not sure about that...), but check what the native hardwareimage has in use per default.

    Or if hardware acceleration is in use (if available from CPU)

    console> system hardware_acceleration status
    Configuration status = enabled
    Number of HW acceleration cards = 1
    Drivers loaded = Yes

    Besides of those base settings also check for common troublemakers as activated DoS protection and other things that incidentially might slow you down.

     

    Hope this helps. Please give feedback once you found the bottleneck in your SW instalation.

Reply
  • Ok, let's put this right. It's just the opposite way. Sophos does not artifically slow down Softwareversions of the XG (why should they ???), but they do highly optimize the hardwareimages to the according appliances based on their specs (Mem, CPU cores etc.).

    There are lot of settings under the hood that affects performance and memory usage. Some of the noteworthy are surely the IPS settings for snort.

    While the hardware images have specially tested and optimized settings as for the search method (hyperscan, ac-bnfa etc.) and also other tweaks in place, the software image is quite generic and has to run on a wide variety of possible hardwares the customers might have. So for example the IPS settings should fit well for a midsized or high-end hardware, but might not too run well untweaked on a low end hardware as a 105 is.

    You find most of such settings in the CLI guide, there's also a section for ips

    http://docs.sophos.com/nsg/sophos-firewall/v17.0.5/PDF/SF%20OS%20Command%20Reference%20Guide.pdf

     

    If I compare a software installation running on a old UTM120 (Dual Core / 2GB Mem) hardware with a native XG125 (Dual Core / 4 GB Mem) is see for example:

     

    XG125 native Hardware

    console> show ips_conf
    config stream               1
    config maxsesbytes              0
    config stdsig               1
    config qnum                 10
    config disable_tcpopt_experimental_drops                0
    config enable_appsignatures     1
    config mmap                    0
    config mmapfilepath             1
    config memmode              0
    config failclose                off
    config maxpkts              8
    var SEARCH_METHOD               hyperscan
    var SIP_STATUS              enabled
    var IGNORE_CALL_CHANNEL         enabled
    var TCP_POLICY              windows
    var DETECT_ANOMALIES            no
    var TCP_BLOCK               nblock
    var LOCAL_RULE              local.rules
    config cpulist              0:1

    ips-settings  ips_conf
    console> show ips-settings
    -------------IPS Settings-------------
            stream on
            lowmem off
            maxsesbytes 0
            maxpkts 8
            mmap off
            enable_appsignatures on
            mmapfilepath var
            http_response_scan_limit  65535
            search_method hyperscan
            sip_preproc enabled
            sip_ignore_call_channel enabled

    -------------IPS Instances------------
    IPS CPU
     1  0
     2  1

    UTM120 Appliance running Software SFOS

    console> show ips_conf
    config stream           1
    config maxsesbytes      0
    config stdsig           1
    config qnum             10
    config disable_tcpopt_experimental_drops                0
    config enable_appsignatures             1
    config mmap             0
    config memmode          0
    config failclose        off
    config maxpkts          8
    config cpulist          0:1
    var SIP_STATUS          enabled
    var IGNORE_CALL_CHANNEL enabled
    var SEARCH_METHOD       ac-bnfa
    var TCP_POLICY          windows
    var LOCAL_RULE          local.rules
    var DETECT_ANOMALIES    no
    var TCP_BLOCK           nblock

    console> show ips-settings
    -------------IPS Settings-------------
            stream on
            lowmem off
            maxsesbytes 0
            maxpkts 8
            mmap off
            enable_appsignatures on
            http_response_scan_limit  65535
            search_method ac-bnfa
            sip_preproc enabled
            sip_ignore_call_channel enabled

    -------------IPS Instances------------
    IPS CPU
     1  0
     2  1

    So there's surely place to fiddle within your ips and other base settings to get most out of you hardware. You can try to figure out the default settings of a native XG105 and apply them to your software installation too. Also this "hyperscan" setting on appliances with CPU's supporting Quickassist from Intel might be noteworthy to test. AFAIK the XG105 CPU doesn't support Quickassist (not sure about that...), but check what the native hardwareimage has in use per default.

    Or if hardware acceleration is in use (if available from CPU)

    console> system hardware_acceleration status
    Configuration status = enabled
    Number of HW acceleration cards = 1
    Drivers loaded = Yes

    Besides of those base settings also check for common troublemakers as activated DoS protection and other things that incidentially might slow you down.

     

    Hope this helps. Please give feedback once you found the bottleneck in your SW instalation.

Children
No Data