Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Best Multi Site to Site VPN Protocol

    Scheduled Pinned Locked Moved OpenVPN
    19 Posts 6 Posters 16.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      Yeah, on 2.x. We don't see many things still running 1.2.x but they're out there. (Just saw one today with 1.2.3 and an uptime of ~540 days…)

      Typically the number of connections/interfaces isn't the limiting factor in a VPN deployment, but the total throughput is the killer.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • D
        dhatz
        last edited by

        jimp,

        I was basically trying to find out whether in real-life there is a difference between doing all processing in kernel (IPsec) vs user-space and having IP packets traversing the network stack back and forth (OpenVPN).

        I had found some numbers for OpenVPN performance under Linux, but I know from experience that FreeBSD can behave quite differently sometimes …

        1 Reply Last reply Reply Quote 0
        • S
          Stevej
          last edited by

          Im right in my thinking that each Site to Site would require a separate VPN Server instance on the pfSense box running on a different port? We have an OpenVPN AS behind our current firewall which we use to terminate connections to customers using Snom Handsets which work well. We'd like to get them terminating on pfSense, but havent had much luck as yet.

          Can i assume that multiple server "instances" as described in the pfSense documentation doesnt cause too much of an overhead?

          Cheers

          1 Reply Last reply Reply Quote 0
          • P
            podilarius
            last edited by

            I don't have time to look for it, but I think there is a road warrior setup using a single OpenVPN server to multiple clients at the same time. search the forums and docs.

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              You can do 1:1 or 1:many for site to site with OpenVPN. I have a few setups that have one server instance with many client sites. It does take a little doing (setting up iroutes and such) but it's easier to manage on the server side.

              There are instructions on the doc wiki.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • D
                dhatz
                last edited by

                @jimp:

                I've seen boxes with hundreds of clients connected, heard of boxes with even more. I'm not aware of any real limits.

                I was thinking about performance issues such as those described in http://forums.openvpn.net/topic9934.html

                Apparently he fixed it with ip.fastforwarding=1

                1 Reply Last reply Reply Quote 0
                • D
                  dhatz
                  last edited by

                  According this discussion at the Openvpn forums, several users reported that a single OpenVPN server under Linux is limited to ~160Mbps:

                  http://community.openvpn.net/openvpn/wiki/Gigabit_Networks_Linux
                  http://forums.openvpn.net/topic8723.html

                  Post subject: Gigabit Server but cannot exceed more than 160mbps

                  I have a gigabit server running openvpn proxy server serving a 200 road warrior users. Normal test using wget and http, traffic can achieve 700mbps without openvpn. However with more than 100 clients connecting to it, total bandwidth tops at 160Mbps. This is running in Centos 5.6. Server specs: 8GB RAM, AMD Quad Cores, SSD Drive.

                  From what I can observed is that once it reaches the 160Mbit, every users will be fighting for the available bandwidth within the max speed. MTU used is default value.

                  Really appreciate if anyone can tell me what are the best optimum settings (linux and openvpn) to utilize gigabit (server) transfer to road warriors (internet). even reaching 300Mbps is sufficient enough.

                  Post subject: Re: Gigabit Server but cannot exceed more than 160mbps

                  this is a known problem and thus far, there is very little that can be done about it. Take a look at
                  http://community.openvpn.net/openvpn/wiki/Gigabit_Networks_Linux
                  which is a result of my initial investigations: it is possible to optimize a single point-to-point link, but it is NOT possible to achieve more than 160 Mbps using a "regular" client/server setup. Since then some students have performed additional tests for me, but the conclusions are still the same.

                  The technical reason behind this is that encryption/decryption routines are not very efficient or fast when encrypting/decrypting packets of only 1500 bytes. Unless someone can come up with a more efficient way to do this then I'm afraid that this is about the maximum speed you'll get out of a VPN setup. Perhaps an SSL accelerator card might help here, but I've not been able to test that. As an SSL accelerator card costs only ~ $50 I'd say that's worth the effort.

                  Do note that commercial VPNs suffer the same problem: if you want gigabit IPsec speed you pay TOP dollar.

                  Preliminary result of the tests and hope that others will be able to use this as well.
                  This is what I have done to bypass the limitations on bandwidth saturation using Gigabit, the tests were conducted on Centos.
                  1. Allocated 4 additional IP aliases to the main ETH0
                  2. Create openvpn1.conf to openvpn5.conf, each with a different IP addresses but listening on the same port.
                  3. Starts OpenVPN and now having 5 addresses in 5 diff tun devices, listening to user connections
                  4. Each tun/config files is configured with a max of 60 users (/30).
                  5. All tun devices is routed back to the internet using ETH0.

                  With this output, it seems that the bottleneck is tun device itself. Each tun can handle only 160mbit transfer rate. Though the tests is not conducted in lab environment, the real world production showed that this can be a workaround to those facing the same issues. It probably useful for the road warrior setup than the LAN setup. It probably be another 10 years for mobile users to achieve gigabit connectivity. At least my users are now happy with the performance.

                  I hope that OpenVPN team can run the tests more thoroughly and update us on this.

                  I think the bottleneck is not the tun device but the CPU. A single openvpn server can only use a single core of your processor thereby limiting how much data it can process. AFAIK openvpn is still not multithreaded. When you created multiple vpn servers listening on different IPs you are distributing the work on all the cores of your CPU. I already read some posts just like janjust that they have achieve gigabit speeds on a single tun device with encryption turned off.

                  1 Reply Last reply Reply Quote 0
                  • P
                    pkwong
                    last edited by

                    I'm a fan of OpenVPN, but using a pfsense box as a VPN concentrator while convenient seems to be somewhat counter-intuitive from a resource utilization perspective.  I've done something very similar for a client, a completely tuned voip encrypted network Where all the clients can communicate with the PBX or Softswitch, but nobody else.  It's really a great way to make things work.

                    I've used IPSEC, but the reality for me is I only deploy it on IPV6.  (It's an extension).  So it makes life much easier.  Using an OpenVPN server (dedicated) also allows you to tune specifically for VOIP (A HUGE PLUS) and when configured properly, tunnels re-establish very quickly.  The PFsense implementation of OpenVPN is great, but there is so much missing vs. a dedicated openvpn server that you can do (magic wise).. like real-time tuning of traffic / bandwidth-optimization using scripts.  It's all doable in pfsense, but it becomes a completely customized system at that point.

                    Cheers.

                    Percy
                    http://swimminginthought.com

                    When all else fails, don't blame the machine.  Blame your architecture.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dhatz
                      last edited by

                      @pkwong:

                      I'm a fan of OpenVPN, but using a pfsense box as a VPN concentrator while convenient seems to be somewhat counter-intuitive from a resource utilization perspective.

                      For serving a relatively small number (e.g. a few dozen) of OpenVPN clients, wouldn't it in fact more efficient from a resource utilization perspective to use pfsense as VPN concentrator ?

                      @pkwong:

                      Using an OpenVPN server (dedicated) also allows you to tune specifically for VOIP (A HUGE PLUS) and when configured properly, tunnels re-establish very quickly.  The PFsense implementation of OpenVPN is great, but there is so much missing vs. a dedicated openvpn server that you can do (magic wise).. like real-time tuning of traffic / bandwidth-optimization using scripts.  It's all doable in pfsense, but it becomes a completely customized system at that point.

                      Can you be more specific about traffic-shaping optimization with scripts ? iirc pfsense can do traffic shaping of traffic inside the tunnel with the regular traffic shaping subsystem.

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        We always welcome patches to add functionality like that. If there are things that openvpn is capable of but our GUI doesn't support, it's generally not that difficult to add options to the GUI for them.

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • D
                          demian
                          last edited by

                          Hi ! Is there any aditional configs (on advanced tab or some options to check) to get better performance on multi site PKI OpenVpn?
                          I already got connect 3 sites against a central server…And I want to know if there ant tips that you guys can give me..
                          Thanks

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate
                            last edited by

                            No, it works best just how it's described on the wiki. No special tweaks needed.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            1 Reply Last reply Reply Quote 0
                            • D
                              demian
                              last edited by

                              Excellent!! thanks for reply!!

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.