Hardware — Hardware Sizing Guidance (2024)

  • Docs »
  • pfSense® software »
  • Hardware
  • Give Feedback

When sizing hardware for pfSense® software, required throughput and necessaryfeatures are the primary factors that govern hardware selection.

The information on Netgate Store now contains up-to-date specifications andperformance data on all hardware sold by Netgate. The data on the Netgate Storeis updated as needed and it is always the most accurate and current source ofperformance data.

Tip

Contact Netgate Sales for personalized help in selecting the most suitablemodel for any implementation.

Estimating throughput of third party / whitebox hardware is difficult andinaccurate. In some cases, ballpark estimates may be made by comparing hardwarespecifications with those found on the Netgate Store for comparable models.

Throughput Considerations

In real networks the traffic flow will likely contain packets of varying size,not all maximum size packets, but it completely depends on the environment andthe type of traffic involved. IMIX testing attempts to approximate a mixture oftraffic that more closely resembles real-world environments. Simple IMIX trafficis sets of 7 (40) byte packets, (4) 576 byte packets, 1 (1500) byte packets,plus Ethernet framing overhead.

Note

The Netgate Store entries for hardware include data for both maximum sizepacket size (“IPERF3”) as well as results for IMIX traffic patterns.

As a general reference, table 500,000 PPS Throughput at Various Frame Sizes lists a few commonpacket sizes and the throughput achieved at an example rate of 500,000 packetsper second.

500,000 PPS Throughput at Various Frame Sizes

Frame size

Throughput at 500 Kpps

64 bytes

244 Mbps

500 bytes

1.87 Gbps

1000 bytes

3.73 Gbps

1500 bytes

5.59 Gbps

Performance difference by network adapter type

The choice of NIC has a significant impact on performance. Inexpensive, low endcards consume significantly more CPU than better quality cards such as Intel.The first bottleneck with firewall throughput is the CPU. Throughput improvessignificantly by using a better quality NIC with slower CPUs. By contrast,increasing the speed of the CPU will not proportionally increase the throughputwhen coupled with a low quality NIC.

Feature Considerations

Features, services and packages enabled on the firewall can lower the totalpotential throughput as they consume hardware resources that could otherwise beused to transfer network traffic. This is especially true for packages thatintercept or inspect network traffic, such as Snort or Suricata.

Most base system features do not significantly factor into hardware sizing but afew can potentially have a considerable impact on hardware utilization.

Large State Tables

Active network connections through the firewall are tracked in the firewallstate table. Each connection through the firewall consumes two states: Oneentering the firewall and one leaving the firewall. For example, if a firewallmust handle 100,000 simultaneous web server client connections the state tablemust be able to hold 200,000 states.

See also

States are covered further in Firewall.

Firewalls in environments which require large numbers of simultaneous statesmust have sufficient RAM to contain the state table. Each state takesapproximately 1 KB of RAM, which makes calculating the memory requirementsrelatively easy. Table Large State Table RAM Consumption provides aguideline for the amount of memory required for larger state table sizes. Thisis solely the memory used for the state tracking. The operating system itselfalong with other services will require at least 175-256 MB additional RAM andpossibly more depending on the features used.

Large State Table RAM Consumption

States

Connections

RAM Required

100,000

50,000

~97 MB

500,000

250,000

~488 MB

1,000,000

500,000

~976 MB

3,000,000

1,500,000

~2900 MB

8,000,000

4,000,000

~7800 MB

It is safer to overestimate the requirements. Based on the information above, agood estimate would be that 100,000 states consume about 100 MB of RAM, or that1,000,000 states would consume about 1 GB of RAM.

VPN (all types)

The question customers typically ask about VPNs is “How many connections can myhardware handle?” That is a secondary factor in most deployments and is oflesser consideration. That metric is a relic of how other vendors have licensedVPN capabilities in the past and has no specific direct equivalent in pfSensesoftware. The primary consideration in hardware sizing for VPN is the potentialthroughput of VPN traffic.

Encrypting and decrypting network traffic with all types of VPNs is CPUintensive. pfSense software offers several cipher options for use with IPsec.The various ciphers perform differently and the maximum throughput of a firewallis dependent on the cipher used and whether or not that cipher can beaccelerated by the hardware.

See also

The Netgate Store contains VPN performance data for each device sold byNetgate using the most optimal cipher for each device based on itscapabilities.

Hardware cryptographic accelerators, such asthose found on most Netgate hardware, greatly increase maximum VPN throughputand largely eliminate the performance difference between accelerated ciphers.For IPsec, ciphers may be accelerated by onboard cryptographic accelerators. Forexample, AES-GCM is accelerated by AES-NI and it is faster not only for that,but because it also does not require a separate authentication algorithm. IPsecalso has less per-packet operating system processing overhead than OpenVPN, sofor the time being IPsec will nearly always be faster than OpenVPN.

Where high VPN throughput is a requirement for a firewall, hardwarecryptographic acceleration is of utmost importance to ensure not only fasttransmission speeds but also reduced CPU overhead. The reduction in CPU overheadmeans the VPN will not lower the performance of other services on the firewall.

The current best available acceleration is available by using pfSense Plussoftware on hardware with a QAT device, followed by a CPU which includessupport for IPsec-MB (SSE, AVX2, AVX512), or failing that, a CPU which includesAES-NI support combined with AES-GCM in IPsec.

Packages

Certain packages have a significant impact on hardware requirements, and theiruse must be taken into consideration when selecting hardware.

Snort/Suricata

Snort and Suricata are pfSense software packages for network intrusiondetection. Depending on their configuration, they can require a significantamount of RAM. 1 GB should be considered a minimum but some configurations mayneed 2 GB or more, not counting RAM used by the operating system, firewallstates, and other packages.

Suricata is multi-threaded and can potentially take advantage of NETMAP forinline IPS if the hardware offers support.

Hardware — Hardware Sizing Guidance (2024)

FAQs

How to calculate hardware sizing? ›

Hardware Sizing Guidelines
  1. Network speed. Network latency. ...
  2. Computational speed. Caching efficiency. ...
  3. I/O performance. Performance and efficiency of the file or database storage.
  4. Hard Drive. at least two or three times larger than the repository size.
  5. Memory. Size of website (number of content-object, pages, and users)

What is the hardware sizing process? ›

Sizing means determining hardware requirements such as memory, CPU power, disk space, I/O capacity, and network bandwidth. It is an iterative process to translate business requirements into hardware requirements, and is usually performed early in the project.

What is the best hardware for pfSense? ›

We recommend a modern (less than 4 year old) Intel or AMD CPU clocked 500MHz or greater. We recommend a modern 1.0 GHz Intel or AMD CPU. No less than a modern Intel or AMD CPU clocked at 2.0 GHz. Server class hardware with PCI-e network adapters, or newer desktop hardware with PCI-e network adapters.

What are the hardware requirements for pfSense? ›

The minimal hardware requirements include a 64-bit amd64 (x86-64) compatible CPU, 512 MB of RAM, 8 GB of free hard disk space, at least one compatible network interface, and a bootable USB drive with at least 1 GB of space for installation.

How to do hardware capacity planning? ›

How do you determine hardware capacity requirements for an application?
  1. Understand the application. Be the first to add your personal experience.
  2. Define the workload. ...
  3. Analyze the resource utilization. ...
  4. Calculate the capacity requirements. ...
  5. Validate and adjust the capacity plan. ...
  6. Here's what else to consider.
Sep 28, 2023

What is the capacity of hardware? ›

Hardware capacity planning is the process of estimating the current and future needs of your hardware resources, such as servers, storage, network, and power. It helps you optimize the performance, availability, and cost of your IT infrastructure.

What is the sizing technique? ›

Sizing is an intermediate protective process which is done to prepare the yarn for the weaving process. The process of applying a protective adhesive (synthetic/ natural) coating upon the yarns surface is called sizing.

What is sizing solution? ›

Surface sizing solutions consist of mainly modified starches and sometimes other hydrocolloids, such as gelatine, or surface sizing agents such as acrylic co-polymers. Surface sizing agents are amphiphilic molecules, having both hydrophilic (water-loving) and hydrophobic (water-repelling) ends.

Which tool we can use hardware sizing? ›

For greenfield sizing, standard tools, such as Quick Sizer and sizing guidelines are used. Quick Sizer calculates memory, CPU, disk, and I/O resources based on throughput and number of concurrently active users.

Is pfSense still the best? ›

With its proven reliability and enterprise-grade features, pfSense continues to be a trusted choice for organizations seeking a powerful network solution. Intuitive User Interface: Users have consistently praised the intuitive and user-friendly interface of pfSense.

Is there anything better than pfSense? ›

We have compiled a list of solutions that reviewers voted as the best overall alternatives and competitors to Netgate pfSense, including Check Point Next Generation Firewalls (NGFWs), Sophos Firewall, WatchGuard Network Security, and FortiGate NGFW.

Do companies use pfSense? ›

Customers of pfSense

Around the world in 2024, over 2810 companies have started using pfSense as Perimeter Security And Firewalls tool.

Is pfSense a hardware or software? ›

pfSense is a firewall/router computer software distribution based on FreeBSD. The open source pfSense Community Edition (CE) and pfSense Plus is installed on a physical computer or a virtual machine to make a dedicated firewall/router for a network.

What is the minimum disk size for pfSense? ›

The minimum hardware requirements for pfSense® software on hardware are as follows: 64-bit amd64 (x86-64) compatible CPU. 8 GB or larger disk drive (SSD, HDD, etc) 1GB or more RAM.

How much RAM for a firewall? ›

For a network firewall, any new Intel dual-core hardware (Core i3) will do, even at 6x 1 Gbit/s. For an application firewall, I'd recommend a quad core (Core i5). 4 GB RAM will be enough for both uses. Disk storage doesn't matter, but you need at least 5 GB.

What server size do I need for 100 users? ›

The single server hardware guidelines provide suggested sizing for your system
Managed Devices64-bit Window or Linux OS
RAM GBDisc GB
<5012100
7512-14100
100-17512-16100
9 more rows

How to calculate server sizing? ›

How to Determine the Correct Size and Type of a Web Server
  1. Scale server resources.
  2. Find everything about server hardware components.
  3. Determine the web server hard drive size.
  4. Calculate the total disk space.
  5. Determine Server Memory (RAM)
  6. Determine bandwidth requirements.
  7. Choose hosting package.
  8. Share hosting pecs.

How to calculate saps in SAP system? ›

Understanding SAP sizing

For example, 100 SAPS is defined as 2,000 fully business processed order-line items per hour in the standard SAP Sales and Distribution (SAP SD) application benchmark. This example is equivalent to 2,400 SAP SD transactions per hour with the SAP Enterprise Resource Planning (SAP ERP) solution.

Top Articles
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6684

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.