Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ISP Throttling VPN

    Scheduled Pinned Locked Moved OpenVPN
    15 Posts 5 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @steve.comerford
      last edited by

      @steve-comerford
      This may be a case of VPN and MTU.
      Enable MSS Clamping under VPN > IPsec, Advanced Settings. Try with 1400 or lower values such as 1350 or 1300.

      If you are using OpenVPN i think to set the MTU its going to be under customer options
      tun-mtu 1400;
      mssfix 1350;

      of course toy around with the numbers to see if you see throughput changing for the better or worse.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      1 Reply Last reply Reply Quote 0
      • S
        steve.comerford
        last edited by

        Thanks for your input on this. Based on your feedback I have followed the guide below, but with no joy setting to 1470 or playing with lower numbers.

        https://www.thegeekpub.com/271035/openvpn-mtu-finding-the-correct-settings/#:~:text=The%20first%20thing%20you%20need,the%20packet%20size%20to%20use.

        I also went to system>advanced>firewall & nat and enabled MSS clamping and played with various numbers in there, again it had zero effect at all on the performance.

        Should I be matching the MTU and MSS settings on both sides, i.e server and client settings should match?

        Would this be affected by the MTU settings of the of the actual WAN interface?

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @steve.comerford
          last edited by

          @steve-comerford
          You're setting it on the firewalls, right? You dont have to touch the clients.
          Are you doing traffic shaping or using limiters in any way?

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 0
          • S
            steve.comerford
            last edited by

            Yes on the firewalls, sorry what I meant was the OpenVPN server, and OpenVPN client within pfsense, not the clients as in workstations.

            No traffic shaping or limiter in place, no IDS/IPS, no additional packages etc.

            The main site has a client-to-gateway OpenVPN. Both sites have some VLANs configured, and the firewall rules, are deny first with the required ports opened. Thats the height of the complexity.

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @steve.comerford
              last edited by

              @steve-comerford
              hmmm. When you go on VPN, assuming one of your clients is a Windows machine can you run the following?

              ping REMOTE_HOSTNAME -f -l 1500

              keep running the command until you get a ping response and that should be the MTU you set for the vpn tunnel.

              I cant think of what else to try to be honest.

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • S
                steve.comerford
                last edited by

                Yeah, that's what I did to come up with 1470. Ping from workstation to workstation over VPN starting at 1500, dropping 10 until I got a successful ping and set the MTU to that.

                I think im fighting a losing battle to be honest, due to the fact both the VPN traffic and Zerotier Peer to Peer traffic are being limited to the same speed, the only logical thing left is the ISP.

                I appreciate your time on this, if nothing else I learned something new, thanks very much for your efforts. If I get a result i'll bing you an update on here.

                Thanks @michmoor

                1 Reply Last reply Reply Quote 0
                • Bob.DigB
                  Bob.Dig LAYER 8
                  last edited by

                  Around here there are ISP which have bad peering and do throttle all kinds of stuff. Maybe name your ISP and connection technology and others can confirm.

                  M 1 Reply Last reply Reply Quote 1
                  • M
                    michmoor LAYER 8 Rebel Alliance @Bob.Dig
                    last edited by

                    @Bob-Dig
                    Could be bad peering i didnt think of that..

                    OP would need to do an iPerf test (using port forwards) to confirm that.

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • N
                      NOCling
                      last edited by NOCling

                      The best MSS for IPsec tunnel mode ist 1328 if you don't wand padding.
                      https://packetpushers.net/ipsec-bandwidth-overhead-using-aes/

                      Netgate 6100 & Netgate 2100

                      1 Reply Last reply Reply Quote 0
                      • JKnottJ
                        JKnott @steve.comerford
                        last edited by

                        @steve-comerford said in ISP Throttling VPN:

                        I have changed the ports and also to TCP from UDP on the OpenVPN to try and mask the traffic but the ISP is clearly wise to that, and it hasn't made any difference.

                        I'm aware of networks that block VPNs and the way around that is to use TCP port 80 to get through the firewall. That might also work for throttling, if that's actually what's happening.

                        PfSense running on Qotom mini PC
                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                        UniFi AC-Lite access point

                        I haven't lost my mind. It's around here...somewhere...

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.