Skip to content

Performance Analysis

The PA-2020’s architecture fundamentally limits remote access performance. GlobalProtect uses a hub-and-spoke model where all VPN traffic must pass through the PA-2020 firewall in Honolulu — even when the user and the resource are both outside Hawaii. NetBird’s peer-to-peer mesh eliminates this bottleneck by connecting users directly to the routing peer at the site hosting the resource.

PA-2020 Hardware Limits (from Palo Alto datasheet)

Section titled “PA-2020 Hardware Limits (from Palo Alto datasheet)”
MetricPA-2020 Specification
Firewall throughput (App-ID)500 Mbps
IPsec VPN throughput200 Mbps (shared across ALL users)
Threat prevention throughput200 Mbps
Max concurrent SSL VPN users500
Max sessions125,000

The 200 Mbps VPN ceiling is the total aggregate for every connected user. With 10 concurrent VPN sessions, each user gets a theoretical maximum of ~20 Mbps — before accounting for encryption overhead, App-ID inspection, and internet uplink constraints.

MetricIPsec (PA-2020)WireGuard (NetBird)Source
ThroughputBaseline~15% higherWireGuard performance study
LatencyBaseline~20% lowerWireGuard performance study
CPU overheadHigh (2010-era hardware)Low (kernel-level, modern CPU)arxiv.org/pdf/2512.10135
Codebase~100,000+ lines~4,000 linesWireGuard whitepaper

Scenario 1: Remote Worker in Hawaii to SMB File Share in Boulder

Section titled “Scenario 1: Remote Worker in Hawaii to SMB File Share in Boulder”

Use case: An engineer working from home in Honolulu needs to access a project folder on a Boulder file server (10.15.0.x).

HopGlobalProtect Path (hairpin)NetBird Path (direct)
1User (Honolulu home)User (Honolulu home)
2Internet (user’s home ISP)Internet (user’s home ISP)
3PA-2020 (Honolulu office, 98.147.1.83)WireGuard P2P tunnel (direct to Boulder)
4VPN decrypt, re-encrypt for site-to-siteNetgate 6100 routing peer (10.15.0.254)
5Site-to-site IPsec tunnel (Hawaii to Colorado)File server (10.15.0.x)
6Comcast Boulder (50.198.217.249)
7Netgate 6100, File server (10.15.0.x)
8Entire path in reverse for response
FactorGlobalProtectNetBirdImprovement
Network hopsUser -> Hawaii -> Boulder -> Hawaii -> UserUser -> Boulder -> UserEliminates hairpin
Round-trip latency~140-180ms (double ocean crossing)~70-90ms (direct)~50% lower
VPN throughput limit200 Mbps shared (PA-2020 ceiling)Line speed (ISP-limited)No appliance bottleneck
Estimated per-user SMB10-30 Mbps50-200 Mbps3-6x faster
100MB CAD file transfer~30-80 seconds~4-16 seconds4-5x faster

Why SMB is especially affected: SMB is a chatty protocol — each file operation requires multiple round trips (open, read, acknowledge, read, acknowledge…). SMB throughput degrades linearly with latency. The formula is roughly: Effective throughput = Window size / RTT. By cutting the RTT in half, NetBird approximately doubles SMB throughput before even accounting for the PA-2020’s encryption bottleneck.


Scenario 2: Employee in Maryland to RDP to VM in Boulder

Section titled “Scenario 2: Employee in Maryland to RDP to VM in Boulder”

Use case: A project manager in Maryland needs to RDP into a virtual machine (e.g., GSI-HYPV-WKS01 at 10.15.0.100) hosted on DATA007 in Boulder to run project management software.

HopGlobalProtect PathNetBird Path
1User (Maryland)User (Maryland)
2InternetInternet
3PA-2020 (Honolulu, Hawaii) — traffic crosses entire US to HawaiiWireGuard P2P (direct to Boulder) — Maryland to Colorado, ~30ms
4Site-to-site tunnel — then crosses back to ColoradoNetgate 6100 routing peer
5Netgate 6100 (Boulder)VM (10.15.0.100)
6VM (10.15.0.100)
FactorGlobalProtectNetBirdImprovement
Geographic pathMD -> HI -> CO (7,800+ miles)MD -> CO (1,600 miles)5x shorter path
Round-trip latency~160-220ms~30-50ms75-80% lower
RDP responsivenessNoticeable lag, sluggish mouse/typingNear-LAN feelDramatically better UX
Video/screen redrawChoppy, artifacts on fast updatesSmoothNight and day
VPN bottleneckPA-2020 200 Mbps sharedNone (direct P2P)Eliminated

Why this matters for RDP: Remote Desktop Protocol adapts its quality based on available bandwidth and latency. At 160-220ms RTT (GlobalProtect hairpin), RDP throttles graphics quality, disables animations, and introduces visible input lag. At 30-50ms (NetBird direct), RDP delivers near-local-desktop responsiveness. Users currently tolerating sluggish RDP sessions may not even realize how much performance they’re losing to the Hawaii hairpin.


Scenario 3: Field Worker in Honolulu to Sage Server in Honolulu

Section titled “Scenario 3: Field Worker in Honolulu to Sage Server in Honolulu”

Use case: A field worker on a job site in Honolulu connects via cellular to access the Sage accounting system (GSI-HYPV-SAGE at 10.100.7.40) hosted on DATA005 in the Honolulu office.

HopGlobalProtect PathNetBird Path
1User (Honolulu job site, cellular)User (Honolulu job site, cellular)
2Cellular carrier, InternetCellular carrier, Internet
3PA-2020 (Honolulu office, 98.147.1.83)WireGuard tunnel to Honolulu routing peer
4Decrypt, forward to LANSage VM (10.100.7.40)
5Sage VM (10.100.7.40)
FactorGlobalProtectNetBirdImprovement
Network pathSimilar (both go through Honolulu)SimilarComparable
Round-trip latency~20-60ms (cellular + VPN overhead)~15-40ms (cellular + WireGuard)~20% lower
ThroughputLimited by PA-2020 (200 Mbps shared)Limited by cellular bandwidthRemoves PA bottleneck
Connection stabilityIPsec re-keying on cell tower handoffWireGuard roaming (seamless)Much better on cellular
Reconnection after signal lossGP reconnect: 10-30 secondsWireGuard: ~5 seconds (keepalive)2-6x faster recovery

Key advantage on cellular: WireGuard handles IP address changes (cell tower handoffs) gracefully — the tunnel stays up when the device’s IP changes because WireGuard identifies peers by cryptographic key, not by IP address. GlobalProtect’s IPsec tunnels must renegotiate IKE, causing 10-30 second reconnection delays every time the cell signal switches towers.


Scenario 4: Boulder Office Worker to File Server in Honolulu (Remote Site Access)

Section titled “Scenario 4: Boulder Office Worker to File Server in Honolulu (Remote Site Access)”

Use case: An engineer physically in the Boulder office needs to access the FILES server (GSI-HYPV-FILES at 10.100.7.15) or GIS data in Honolulu.

HopCurrent IPsec S2S PathNetBird S2S Path
1User workstation (Boulder LAN, 10.15.0.x)User workstation (Boulder LAN, 10.15.0.x)
2Netgate 6100, Comcast WANNetgate 6100 (also NetBird routing peer)
3Site-to-site IPsec tunnelWireGuard tunnel (direct Boulder to Honolulu routing peer)
4PA-2020 (Honolulu), decrypt, forward to LANFILES server (10.100.7.15)
5FILES server (10.100.7.15)
FactorCurrent IPsec S2SNetBird S2SImprovement
Round-trip latency~60-80ms~55-75msSlight improvement
Throughput ceilingPA-2020 IPsec: 200 MbpsWireGuard: line speedHigher ceiling
Encryption overheadPA-2020 hardware (2010-era)Netgate 6100 + Honolulu VM (modern)Lower CPU load
FailoverManual (PA-2020 single point)NetBird HA routing peersAutomatic

Note: For same-path site-to-site traffic (Boulder to Honolulu), the latency improvement is modest because the geographic distance is the same. The main gains are throughput ceiling (no PA-2020 bottleneck) and connection reliability.


Scenario 5: Remote Worker Anywhere to AD Password Reset

Section titled “Scenario 5: Remote Worker Anywhere to AD Password Reset”

Use case: Any of the 90% of users who only need VPN connectivity to reset their AD password.

FactorGlobalProtectNetBird + SSPR
User action requiredOpen GP app -> connect -> wait -> navigate to password changeNone (NetBird is always connected)
Time to complete3-10 minutes (connect + reset + wait for cached creds)30-60 seconds (browser -> SSPR -> done)
Helpdesk tickets generated~200/year~0/year
Attack surface during processLogin portal exposed to credential sprayingZero (no portal, SSPR is Microsoft-hosted)
Works from any deviceOnly devices with GP client installedAny device with a browser (SSPR) + company laptop (cached creds update via always-on tunnel)

User LocationTarget ResourceGlobalProtect RTTNetBird RTTThroughput GainExperience
Hawaii (remote)Boulder SMB/RDP140-180ms70-90ms3-6xMajor improvement
MarylandBoulder RDP160-220ms30-50ms4-7xTransformative
East Coast (any)Boulder resources150-200ms25-60ms3-5xMajor improvement
West Coast (any)Boulder resources100-140ms15-30ms2-3xNoticeable improvement
Hawaii (field)Honolulu Sage/CAD20-60ms15-40ms~1.2xModest + better stability
Boulder (office)Honolulu FILES/GIS60-80ms55-75ms~1.1xModest (geography-limited)
AnywherePassword reset3-10 min process30-60 secN/AEliminates the process

The takeaway: Any user accessing Boulder resources through the Hawaii VPN hairpin is losing 50-80% of their potential throughput and experiencing 2-4x the latency they should be. The further east the user is from Hawaii, the worse the penalty. A Maryland user accessing Boulder through the Honolulu VPN is sending packets on a 7,800-mile detour when the direct path is 1,600 miles.