• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

pfSense and OpenVPN speeds

General pfSense Questions
6
25
2.2k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • I
    inf3rno @A Former User
    last edited by inf3rno May 8, 2020, 1:21 PM May 8, 2020, 1:18 PM

    @Morpheus101 I have no idea. I know that it can be installed on FreeBSD, and pfSense is FreeBSD based. So maybe. I guess trying it does not hurt. VPN speed depends on the number of the users too. If you don't have many parallel connections and your hardware is capable, then something else causes the low speed.

    1 Reply Last reply Reply Quote 0
    • S
      stephenw10 Netgate Administrator
      last edited by May 8, 2020, 1:53 PM

      @teamits said in pfSense and OpenVPN speeds:

      I'm curious why the SG-3100 tested slower than the SG-1100?

      It does look like an anomaly but it's almost certainly because OpenSSL compiled for aarch64 can take advantage of the additional instructions available there. Both those numbers seem low though.

      Wireguard cannot, yet, easily be added to pfSense. I believe there is a thread detailing it here but it is all manual at this point. No gui config. Nothing backed up etc.

      Steve

      R S 2 Replies Last reply May 8, 2020, 2:14 PM Reply Quote 0
      • R
        Rico LAYER 8 Rebel Alliance @stephenw10
        last edited by May 8, 2020, 2:14 PM

        @stephenw10 said in pfSense and OpenVPN speeds:

        Both those numbers seem low though.

        Are there any Netgate lab numbers around? No matter official or unofficial. ☺
        Like OpenVPN SSL/TLS between two SG-5100, settings used for TLS key, Encryption Algo, Auth digest and so on and the speed to expect?

        -Rico

        S 1 Reply Last reply May 8, 2020, 2:19 PM Reply Quote 0
        • S
          SteveITS Galactic Empire @Rico
          last edited by May 8, 2020, 2:19 PM

          @Rico
          This has IPSec numbers: https://www.netgate.com/products/appliances/

          This has a chart at the bottom for TNSR but shows pfSense on a SG-5100: https://www.netgate.com/blog/choosing-the-right-netgate-appliance.html

          Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
          When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
          Upvote 👍 helpful posts!

          1 Reply Last reply Reply Quote 0
          • R
            Rico LAYER 8 Rebel Alliance
            last edited by Rico May 8, 2020, 2:28 PM May 8, 2020, 2:28 PM

            Yes...but this thread is about OpenVPN @pfSense.
            Impossible to relate anything for OpenVPN with IPsec numbers...

            -Rico

            1 Reply Last reply Reply Quote 0
            • S
              stephenw10 Netgate Administrator
              last edited by May 8, 2020, 2:45 PM

              I expect to see over 100Mbps on the 3100 if you are using a CESA supported cipher, which AES-CBC should be.

              I would also expect to see over 125Mbps on the 1100 using AES-GCM.

              There are many variables etc!

              Steve

              1 Reply Last reply Reply Quote 0
              • R
                Rico LAYER 8 Rebel Alliance
                last edited by May 8, 2020, 4:20 PM

                Well I don‘t care about 5-10Mbps VPN traffic more or less.
                Only would see a problem if you say like in your testings the speed is double or 1/3 more. :-)

                -Rico

                1 Reply Last reply Reply Quote 0
                • S
                  sgw @stephenw10
                  last edited by Apr 1, 2025, 10:14 AM

                  @stephenw10 coming here because I look for a quick solution to free CPU on a 2100.

                  We seem to outmax the hardware by running ~20 ovpn clients (1 Gbit/s WAN) plus a wireguard site to site tunnel and pfblockerng ...

                  A stronger hardware is in preparation but I look for a config tweak to decrease the load.

                  I wanted to switch from AES-256-GCM to AES-128-GCM in the ovpn-server to decrease the overall load, but the numbers mentioned above seem to tell me that that won't do much.

                  I am not looking for more throughput, I need to decrease the CPU load. (I already disabled telegraf, that was quite heavy as well)

                  hints welcome

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Apr 1, 2025, 10:40 AM

                    What's using the CPU currently? Check the output of top -HaSP at the command line.

                    There may not be much you can do though. With a 1G WAN it will be possible to hit the limits of the CPU. You could potentially set limiters for connecting clients to prevent that.

                    S 1 Reply Last reply Apr 1, 2025, 10:54 AM Reply Quote 0
                    • S
                      sgw @stephenw10
                      last edited by Apr 1, 2025, 10:54 AM

                      @stephenw10 currently very low load.

                      Right now it doesn't look overloaded at all.

                      Now and then there is sftp-traffic between the two sites which are connected by the wireguard site to site tunnel. This, in combination with the other services maxes out the hw.

                      It's a multi-layered issue: the delivering server vm is restricted etc etc

                      Maybe I could tune the wg-tunnel somehow.

                      Right now I can't see any limits (of the 2100) hit ... in the morning we hit the CPU-limits all the time.

                      thanks

                      1 Reply Last reply Reply Quote 0
                      • S
                        stephenw10 Netgate Administrator
                        last edited by Apr 1, 2025, 1:04 PM

                        So what issues do you see when this happens?

                        If it's maxed out by traffic over the Wireguard tunnel you might apply a limit to that.

                        S 1 Reply Last reply Apr 2, 2025, 7:44 AM Reply Quote 0
                        • S
                          sgw @stephenw10
                          last edited by sgw Apr 2, 2025, 7:46 AM Apr 2, 2025, 7:44 AM

                          @stephenw10 thanks for asking.

                          I am in the process of pinpointing an issue that might not even have to do with openvpn. I think multiple things overlay each other and give different results at different times:

                          basically I have 2 pfSense plus 24.11 boxes in 2 sites "office" and let's call it "data center" ;-)

                          They are crossconnected with a wireguard site2site vpn, only the LANs are routed over wireguard.

                          The data center pfSense is also a ovpn-gw for customers, they access VMs via VPN. The VMs run on a 3-server proxmox cluster in the data center.
                          All that works fine.

                          They run a linux VM there also that provides update-zips for the customers via sftp. If the customer accesses the related URI via the DNS-record pointing to the WAN-IP of the datacenter-pfSense the download speed is fine.

                          If my customer accesses the same URI (using the same DNS-name and in turn WAN-IP of datacenter) from behind the office pfSense it's way slower. a tenth or so.

                          That's the initial issue, and I am digging through everything ...

                          Yes, sftp isn't cool, I try to switch to scp.

                          We outruled wireguard-usage. We used the IP only.
                          I upgraded the VM in terms of software, and edited the vCPU to "host". I switched to a virtio-NIC. etc etc

                          I have to ask the coder there if his software (the one his customers upgrade by pulling stuff via sftp) maybe caches something and that leads to this difference.

                          In the process of debugging yesterday I had times when the datacenter-pfsense maxxed out its CPU (that's the 2100), so I tried to remove load there by disabling telegraf etc ... / in the afternoon the load was low and the sftp-transfer still wasn't higher. The vCPU in the VM also plays a role etc

                          I am quite sure that I have routing and NAT set up OK. The line there is 1 Gbit/s symmetric, that also shouldn't be the bottleneck.
                          Still scratching my head here ;-)

                          thanks for reading all this, ideas welcome.

                          1 Reply Last reply Reply Quote 0
                          • S
                            stephenw10 Netgate Administrator
                            last edited by Apr 2, 2025, 1:38 PM

                            Hmm, so you're sure that traffic is not going over the tunnel in either direction when clients access it from behind the 2100?

                            Can you test between those sites using something else just to check there's no throttling in the route?

                            S 1 Reply Last reply Apr 3, 2025, 8:36 AM Reply Quote 0
                            • S
                              sgw @stephenw10
                              last edited by Apr 3, 2025, 8:36 AM

                              @stephenw10 I might do tests from my laptop when I visit them some day.

                              I even tested against a fresh debian VM, that made no real difference.

                              mtr looked correctly, btw.

                              That's a tricky one ;-)

                              1 Reply Last reply Reply Quote 0
                              • S
                                stephenw10 Netgate Administrator
                                last edited by Apr 3, 2025, 1:20 PM

                                Hmm, well the first thing I would do is confirm you can actually pass traffic between those sites at a reasonable speed when not using a tunnel. Because I've seen countless customers who were diagnosing VPN issues for weeks when the actual issue was some bad router/link.

                                S 1 Reply Last reply Apr 4, 2025, 5:18 AM Reply Quote 0
                                • S
                                  sgw @stephenw10
                                  last edited by Apr 4, 2025, 5:18 AM

                                  @stephenw10 I agree. I think I did iperf-tests some months ago that looked much better than the scp/sftp-stuff. Sure, it has to be faster, but it was way better.

                                  I will repeat that asap.

                                  1 Reply Last reply Reply Quote 1
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.