Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to site OpenVPN slow performance (2.7.2 CE)

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 2 Posters 741 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      snewby @snewby
      last edited by

      @snewby here is more verbose output from the firewall.

      54604fc1-8ba8-4989-826a-a6a252756702-image.png

      1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @snewby
        last edited by michmoor

        @snewby said in Site to site OpenVPN slow performance (2.7.2 CE):

        We are using OpenVPN site to site tunnel so I don't think MSS clamping applies? Correct me if I'm wrong but that seems to be for IPsec tunnels

        It applies to OVPN as well.

        Do not run iperf on the firewalls.

        You need to start digging into what the best MTU would be for a given situation.

        ping x.x.x.x -f -l 1472 if you start getting messages that DF is set, reduce the mtu value.
        ping x.x.x.x -f -l 1440 and so on...

        Once you figure out the MTU you can determine the optimal MSS value. Take the result of the above test which lets say is 1400 Bytes. Subtract the TCP and IP header value. 1400 - (IP header 20 bytes +tcp header 20 bytes) = 1360 bytes which is the optimal MSS.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        S 1 Reply Last reply Reply Quote 0
        • S
          snewby @michmoor
          last edited by

          @michmoor I just ran the test and it does look like there is an issue. Default MTU on pfense is 1500. It seems okay when I lower to 1472. Do I change that value on firewall WAN interface, WAN or both? Also if I change it does that normally cause the network connection to drop? And to be clear for MSS value I would just do 1472 - 40 = 1,432?

          949feee5-7ed6-4ea6-811a-f0d69a03de6a-image.png

          M 1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @snewby
            last edited by

            @snewby Turn on MSS Clamping and try a value of 1400 to start and restest again.

            How to enable MSS clamping i provided the link above.

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            S 1 Reply Last reply Reply Quote 0
            • S
              snewby @michmoor
              last edited by

              @michmoor which interface do I enable that on? I'm guessing WAN connection? Also I guess I need to lower MTU value there to 1472. Lastly do you know if changing that setting would cause a network drop?

              3b906a4a-c39c-485e-bb3a-528a70aa30e8-image.png

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @snewby
                last edited by

                @snewby
                not there.

                https://docs.netgate.com/pfsense/en/latest/config/advanced-firewall-nat.html#mss-clamping

                System > Advanced > Firewall & NAT > VPN Packet Processing > Maximum MSS

                A value of 1400 should be good enough.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                S 1 Reply Last reply Reply Quote 1
                • S
                  snewby @michmoor
                  last edited by

                  @michmoor okay so I don't touch MTU settings on interfaces at all and just change this on both firewalls? In the future I may be implementing a wireguard VPN which this setting does not seem to apply to.

                  f093d319-c899-44ca-a146-e80b22297285-image.png

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    snewby @snewby
                    last edited by

                    @michmoor I changed Maximum MSS on both firewalls to 1400 as you suggested. I then restarted the VPN tunnel. Now when I run pings the speed has improved (about doubled) but it's still nowhere close to the line speed of almost 1Gbps. Yes, I know VPN adds some overhead, but it shouldn't be this much right? I would think I'd at least get 500 Mbits/sec. As I comparison I ran a ping to a server on the LAN. The internet speed at both sites is 1Gbps fiber. I included a speedtest from the remote site where you can see it is in the 900+ Mbps. Where else might there be a bottleneck? Do I need to change MTU value on the actual interface? I don't think it's a hardware bottleneck as both routers have powerful processors.

                    6650e0e2-ffdd-4c29-a3d0-4e69cc103c6e-image.png

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @snewby
                      last edited by

                      @snewby it’s possibly you are at a hardware bottleneck. Can you give a bit more details about your hardware?

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        snewby @michmoor
                        last edited by

                        @michmoor

                        Site A (corporate office):

                        270bddc6-e5a9-48c4-bb41-c66271887fe4-image.png

                        Site B (branch office):

                        80b871e7-30d9-489a-8e44-a0b2c74cd20d-image.png

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          michmoor LAYER 8 Rebel Alliance @snewby
                          last edited by

                          @snewby review the following from documentation
                          Short of changing MSS, Options to scale ovpn are quite limited

                          https://docs.netgate.com/pfsense/en/latest/vpn/performance.html#scaling-openvpn

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.