I have created a bonding (bonding1) between SFP+1 and SFP+2 on a mikrotik CCR1036-8G-2S+. The bonding is 802.3ad with mii (link monitoring) and layer 2 transmit hash policy. This bond is connected to two 10Gb ports of a synology NAS RS1619xs+ that also has a bond between those two ports setup as 802.3ad dynamic link aggregation LACP.
File copies can't get more than 50MB/s for a 5GB file with iSCSI and SMB3 gets approximately 10MB/s for the same file. Source is copying the file from 1Gb ethernet though. While the transmit-receive rate for the bonding interface on the mikrotik never gets more than 400-500Mbps for this same file.
Nevertheless, I feel that the performance is greatly degraded compared to other similar setups I have done in the past. Bonding2 is failover and I have a service order where bonding1 is above bonding2.
The SFP+ ports use 100% compatible adapters for the conversion to 10Gb with Cat6 cables. Should I switch to Cat7 instead? Would it make any difference?
Does mikrotik fully support 802.3ad LACP? Should I switch to something else instead?
Current config below:
Code: Select all
/interface bridge
add name=LAN
/interface bonding
add mode=802.3ad name=bonding1 slaves=sfp-sfpplus1,sfp-sfpplus2
add mode=802.3ad name=bonding2 slaves=ether3,ether4
/ip pool
add name=dhcp_pool0 ranges=192.168.100.200-192.168.100.254
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=LAN name=dhcp1
/interface bridge port
add bridge=LAN interface=bonding1
add bridge=LAN interface=ether5
add bridge=LAN interface=ether6
add bridge=LAN interface=ether8
add bridge=LAN interface=ether7
add bridge=LAN interface=bonding2
/ip address
add address=192.168.100.1/24 interface=LAN network=192.168.100.0
add address=xxx.xxx.xxx.xxx/24 interface=ether1 network=xxx.xxx.xxx.0
add address=yyy.yyy.yyy.yyy/24 interface=ether1 network=yyy.yyyy.yyy.0
/ip dhcp-server network
add address=192.168.100.0/24 gateway=192.168.100.1
/ip dns
set allow-remote-requests=yes cache-max-ttl=1d servers=1.1.1.1,8.8.8.8
/ip firewall filter
add action=accept chain=input connection-state=established,related
add action=drop chain=input connection-state=invalid
add action=accept chain=forward connection-state=established,related
add action=drop chain=forward connection-state=invalid
/ip firewall nat
add action=dst-nat chain=dstnat dst-address=yyy.yyy.yyy.yyy in-interface=ether1 \
to-addresses=192.168.100.10
add action=src-nat chain=srcnat out-interface=ether1 src-address=192.168.100.10 \
to-addresses=yyy.yyy.yyy.yyy
/ip route
add distance=1 gateway=xxx.xxx.xxx.1
Thanks!