Better Connectivity Means Better Experiences

Product and Performance Information

1

Testing based on the 2nd Generation Intel® Xeon® Platinum 8260 processor and upgrading from a 1GbE to a 25Gb Intel® Ethernet Network Adapter XXV710 and from Serial ATA (SATA) drives to the NVM Express* (NVMe*)-based PCIe* Intel® SSD Data Center P4600 Series.

2

Performance results by HeadGear Strategic Communications are based on testing as of February 12, 2019. The comparative analysis in this document was done by HeadGear Strategic Communications and commissioned by Intel. Detailed configuration details: VM Host Server: Intel® Xeon® Platinum 8160 processor, Intel Xeon® Platinum 8160F processor (CPUID 50654, microcode revision 0x200004D), and Intel Xeon® Platinum 8260 processor (CPUID 50656, microcode revision 04000014); Intel® Server Board S2600WFT (board model number H48104-850, BIOS ID SE5C620.86B.0D.01.0299.122420180146, baseboard management controller [BMC] version 1.88.7a4eac9e; Intel® Management Engine [Intel® ME] version 04.01.03.239; SDR package revision 1.88); 576 GB DDR4 2,133 MHz registered memory, 1 x Intel® Ethernet Network Adapter XXV710-DA2, 1 x Intel® Ethernet Converged Network Adapter X710-DA2 (Intel® Ethernet CNA X710-DA2); operating system drive configuration: 2 x Intel® SSD DC S3500 in Intel® Rapid Storage Technology enterprise (Intel® RSTe) RAID1 configuration. Windows Server 2016* Datacenter edition 10.0.14393 build 14393, Hyper-V* version 10.0.14393.0, Hyper-V scheduler type 0x3, installed updates KB4457131, KB4091664, KB1322316, KB3211320, and KB3192137. E-mail Virtual-Machine Configuration: Windows Server 2012* Datacenter edition 6.2.9200 build 9200; 4 x vCPU; 12 GB system memory, BIOS version/date: Hyper-V release v1.0, 2012, 11/26), SMBIOS version 2.4; Microsoft Exchange Server 2013*, workload generation via VM clients running Microsoft Exchange Load Generator 2013*, application version 15.00.0805.000). Database Virtual-Machine Configuration: Windows Server 2016* Datacenter edition 10.0.14393 build 14393, 2 x vCPU 7.5 GB system memory; BIOS version/date: Hyper-V release v1.0, 2012, 11/26), SMBIOS version 2.4, Microsoft SQL Server 2016* workload generation DVD Store application* (dell.com/downloads/global/power/ps3q05-20050217-Jaffe-OE.pdf). Storage Server: Intel® Server System R2224WFTZS; Intel® Server Board S2600WFT (board model number H48104-850, BIOS ID SE5C620.86B.00.01.0014.070920180847, BMC version 1.60.56383bef; Intel® Management Engine (Intel® ME) version 04.00.04.340; SDR package revision 1.60); 96 GB DDR4 2,666 MHz registered memory, 1 x Intel® Ethernet Network Adapter XXV710-DA2, 1 x Intel® Ethernet Converged Network Adapter X710-DA2 (Intel® Ethernet CNA X710-DA2); operating system drive configuration: 2 x Intel® SSD DC S3500 in Intel® RSTe RAID1 configuration. Storage Configuration: 8 x Intel® SSD Data Center (Intel® SSD DC) P4600 (2.0 TB) configured as RAID 5 volume using Intel® Virtual RAID on CPU (Intel® VROC), 8 x Intel® SSD DC S4500 (480 GB) in RAID5 configuration using Intel® RAID Module RMSP3AD160F, 8 x Intel® SSD DC P4510 in RAID 5 configuration using Intel® Virtual RAID on CPU (Intel® VROC) for VM operating system store, Windows Server 2016* Datacenter edition 10.0.14393 build 14393, Hyper-V version 10.0.14393.0, Hyper-V scheduler type 0x3, installed updates KB4457131, KB4091664, KB1322316, KB3211320, and KB3192137. Windows Server 2016* Datacenter and Windows Server 2012* Datacenter Configured with Intel® Xeon® Platinum 8160 and Intel® Xeon® Platinum 8160F processors: Speculation control settings for CVE-2017-5715 (branch target injection)—hardware support for branch target injection mitigation is present: true; Windows operating system support for branch target injection mitigation is present: true; Windows operating system support for branch target injection mitigation is enabled: true; Windows operating system support for branch target injection mitigation is disabled by system policy: false; Windows operating system support for branch target injection mitigation is disabled by absence of hardware support: false. Speculation control settings for CVE-2017-5754 (rogue data cache load)—hardware requires kernel VA shadowing: true; Windows operating system support for kernel VA shadow is present: true; Windows operating system support for kernel VA shadow is enabled: true. Speculation control settings for CVE-2018-3639 (speculative store bypass)—hardware is vulnerable to speculative store bypass: true; hardware support for speculative store bypass disable is present: true; Windows operating system support for speculative store bypass disable is present: true; Windows operating system support for speculative store bypass disable is enabled system-wide: true. Speculation control settings for CVE-2018-3620 (L1 terminal fault)—hardware is vulnerable to L1 terminal fault: true; Windows operating system support for L1 terminal fault mitigation is present: true, Windows operating system support for L1 terminal fault mitigation is enabled: true. Windows Server 2016 Datacenter and Windows Server 2012 Datacenter Configured with Intel® Xeon® Platinum 8160 and Intel® Xeon® 8160F processors: Speculation control settings for CVE-2017-5715 (branch target injection)—hardware support for branch target injection mitigation is present: true; Windows operating system support for branch target injection mitigation is present: true; Windows operating system support for branch target injection mitigation is enabled: true. Speculation control settings for CVE-2017-5754 (rogue data cache load)—hardware requires kernel VA shadowing: false. Speculation control settings for CVE-2018-3639 (speculative store bypass)—hardware is vulnerable to speculative store bypass: true; hardware support for speculative store bypass disable is present: true; Windows operating system support for speculative store bypass disable is present: true; Windows operating system support for speculative store bypass disable is enabled system-wide: true. Speculation control settings for CVE-2018-3620 (L1 terminal fault)—hardware is vulnerable to L1 terminal fault: false. Network Switches: 1/10GbE SuperMicro SSE-X3348S*, hardware version P4-01, firmware version 1.0.7.15; 10/25GbE Arista DCS-7160-48YC6*, EOS 4.18.2-REV2-FX.

3

>50% predictability improvement, >45% latency reduction and >30% throughput improvement with open source Redis* using 2nd Gen Intel® Xeon® Scalable processors and Intel® Ethernet 800 Series with ADQ vs. without ADQ. Performance results are based on Intel internal testing as of February 2019, and may not reflect all publicly available security updates. See configuration disclosure for details. No product or component can be absolutely secure. Tests performed using Redis* Open Source on 2nd Generation Intel® Xeon® Scalable processors and Intel® Ethernet 800 Series 100GbE on Linux 4.19.18 kernel. For complete configuration information see the Performance Testing Application Device Queues (ADQ) with Redis* Solution Brief.

4

The Intel® Ethernet 700 Series includes extensively tested network adapters, accessories (optics and cables), hardware, and software, in addition to broad operating system support. A full list of the product portfolio’s solutions is available at intel.in/ethernet. Hardware and software is thoroughly validated across Intel® Xeon® Scalable processors and the networking ecosystem. The products are optimized for Intel® architecture and a broad operating system ecosystem: Windows*, Linux* kernel, FreeBSD*, Red Hat* Enterprise Linux (RHEL*), SUSE*, Ubuntu*, Oracle Solaris*, and VMware ESXi*. Supported connections and media types for the Intel® Ethernet 700 Series are: direct-attach copper and fiber SR/LR (QSFP+, SFP+, SFP28, XLPPI/CR4, 25G-CA/25G-SR/25G-LR), twisted-pair copper (1000BASE-T/10GBASE-T), backplane (XLAUI/XAUI/SFI/KR/KR4/KX/SGMII). Note that Intel is the only vendor offering the QSFP+ media type. The Intel® Ethernet 700 Series supported speeds include 10GbE, 25GbE, 40GbE.