Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfSense hardware for home router - OpenVPN performance

    Scheduled Pinned Locked Moved Hardware
    110 Posts 30 Posters 58.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      Scampicfx
      last edited by

      @garyd9:

      If it helps someone…

      Intel(R) Atom(TM) CPU C2558 @ 2.40GHz

      (timings averaged over 3 runs, but they never varied more than .1 sec)

      (with aesni.ko loaded):  3200/24.03 = 133.17
      (with aesni.ko unloaded):  3200 / 23.58 = 135.71

      Dear garyd9,

      thanks for your tests!

      Just to get it right: This means C2558 gets a OpenVPN throughput of around 130 Mbit/s?

      Right now I'm trying to make a decision between C2358, C2558, C2758, Xeon D-1518…
      Basically, all I need is 500 Mbit/s WAN throughput and around 100 Mbit/s OpenVPN throughput. I would like to use snort.
      But the most important point to me right now is to have a stable OpenVPN throughput of 100 Mbit/s...

      I'm wondering if a C2358 will accomplish this performance as well?
      Since OpenVPN is single-threaded, afaik, a C2358 may have nearly the same openvpn performance as the c2558?

      EDIT: Well, I just see, there is a big difference in base clock rate... 1,7 GHz vs. 2,4 GHz... So I think the C2358 won't be able to run 100 Mbit/s OpenVPN throughput? According to other threads the OpenVPN throughput of C2358 is somewhere at 70 Mbit/s. Is that correct?

      1 Reply Last reply Reply Quote 0
      • G
        garyd9
        last edited by

        @Scampicfx:

        Just to get it right: This means C2558 gets a OpenVPN throughput of around 130 Mbit/s?

        Theoretically.  Real world performance would vary.

        @Scampicfx:

        I'm wondering if a C2358 will accomplish this performance as well?
        Since OpenVPN is single-threaded, afaik, a C2358 may have nearly the same openvpn performance as the c2558?

        EDIT: Well, I just see, there is a big difference in base clock rate… 1,7 GHz vs. 2,4 GHz... So I think the C2358 won't be able to run 100 Mbit/s OpenVPN throughput? According to other threads the OpenVPN throughput of C2358 is somewhere at 70 Mbit/s. Is that correct?

        I don't run openvpn.  I just ran the test proposed by the OP and posted the results.  However, based on the differences between the C2358 and C2558, I'd guess that the 2358 would have a difficult time getting to 100 megabit/sec openvpn performance.

        1 Reply Last reply Reply Quote 0
        • D
          DestructionIce
          last edited by

          @whosmatt:

          Can you report on exactly what you changed?  Is the config you just posted your current config?  Thanks!

          The changes I made were to disable lzo compression and use mauroman33's custom options. Like he mentioned the main difference in that is the "tls-cipher" line it would seem.

          I also made sure to turn off any crypto hardware "assistance" options I may have fiddled with. Most were already disabled, but I did play around with using "RDRAND", so I had to disable that again.

          My overall config isn't exactly like his screen shots, though.  I tick the boxes to disable addition of routes to the route table and handle those with AON.

          1 Reply Last reply Reply Quote 0
          • M
            mauroman33
            last edited by

            @DestructionIce:

            @whosmatt:

            Can you report on exactly what you changed?  Is the config you just posted your current config?  Thanks!

            The changes I made were to disable lzo compression and use mauroman33's custom options. Like he mentioned the main difference in that is the "tls-cipher" line it would seem.

            I also made sure to turn off any crypto hardware "assistance" options I may have fiddled with. Most were already disabled, but I did play around with using "RDRAND", so I had to disable that again.

            My overall config isn't exactly like his screen shots, though.  I tick the boxes to disable addition of routes to the route table and handle those with AON.

            The suggestion to disable the Cryptographic Hardware comes by Pippin's messages in this thread:
            https://forum.pfsense.org/index.php?topic=115627.30

            1 Reply Last reply Reply Quote 0
            • P
              Paint
              last edited by

              here are my advanced server settings:

              fast-io;sndbuf 0;rcvbuf 0;push "sndbuf 524288";push "rcvbuf 524288";keepalive 10 120;push "redirect-gateway def1";push "redirect-gateway-ipv6 def1";push "route-ipv6 2000::/3";

              Here are my advanced client settings:

              fast-io
              fragment 0
              mssfix 0
              sndbuf 524288
              rcvbuf 524288
              lport 0
              remote-random
              remote-cert-tls server
              resolv-retry 4
              key-method 2
              mute 10
              mute-replay-warnings
              keepalive 10 120
              auth-retry nointeract
              setenv FORWARD_COMPATIBLE 1
              verb 3
              reneg-sec 0
              script-security 2
              

              Ultimately, i think we should push to change to Softether as the VPN client.  It supports backwards compatibility to OpenVPN and is much faster than OpenVPN for the same hardware.

              Here is a feature list: https://www.softether.org/1-features

              pfSense i5-4590
              940/880 mbit Fiber Internet from FiOS
              BROCADE ICX6450 48Port L3-Managed Switch w/4x 10GB ports
              Netgear R8000 AP (DD-WRT)

              1 Reply Last reply Reply Quote 0
              • S
                sirozha Banned
                last edited by

                What some people consider here to be VPN is quite different from what's VPN is in a corporate world. Hiding one's identity to be able to download stolen content is not the reson VPN was invented. When one lists VPN throughput to such a service, it's not what VPN's purpose is in pfSense.

                1 Reply Last reply Reply Quote 0
                • P
                  Paint
                  last edited by

                  @sirozha:

                  What some people consider here to be VPN is quite different from what's VPN is in a corporate world. Hiding one's identity to be able to download stolen content is not the reson VPN was invented. When one lists VPN throughput to such a service, it's not what VPN's purpose is in pfSense.

                  While softether can be used for obsfcation, softether actually supports more corporate features than OpenVPN. It supports IPSec, VLANs, OpenVPN, etc. In addition, the code is more modern and supports  multithreaded VPN. I get comparable speeds from my Raspberry Pi running Softether VPN versus my i7 pfsense box running pfSense.

                  Anyway, not trying to hijack the thread. Just adding my .02

                  pfSense i5-4590
                  940/880 mbit Fiber Internet from FiOS
                  BROCADE ICX6450 48Port L3-Managed Switch w/4x 10GB ports
                  Netgear R8000 AP (DD-WRT)

                  1 Reply Last reply Reply Quote 0
                  • G
                    garyd9
                    last edited by

                    @Paint:

                    Ultimately, i think we should push to change to Softether as the VPN client.

                    Well, it's already in freeBSD ports…

                    1 Reply Last reply Reply Quote 0
                    • W
                      whosmatt
                      last edited by

                      @sirozha:

                      What some people consider here to be VPN is quite different from what's VPN is in a corporate world. Hiding one's identity to be able to download stolen content is not the reson VPN was invented. When one lists VPN throughput to such a service, it's not what VPN's purpose is in pfSense.

                      And that doesn't have any bearing on the performance numbers, which is what we're discussing here.  We're talking about the technology and performance on given hardware, not the reasons we're using it.  This discussion is directly relevant to anyone using OpenVPN, regardless of the use case.

                      1 Reply Last reply Reply Quote 0
                      • M
                        mauroman33
                        last edited by

                        @sirozha:

                        What some people consider here to be VPN is quite different from what's VPN is in a corporate world. Hiding one's identity to be able to download stolen content is not the reson VPN was invented. When one lists VPN throughput to such a service, it's not what VPN's purpose is in pfSense.

                        Sorry mate, I don't understand. How do you know what is the reason why people are using a VPN here?
                        Are you maybe speaking of your personal experience?
                        Personally I have some good reasons to use it, starting from the systematic throttling performed by the ISP in my area if you don't use the services directly purchased from it …
                        But maybe, as rightly said whosmatt, this is not the forum for this kind of discussion.

                        1 Reply Last reply Reply Quote 0
                        • S
                          sirozha Banned
                          last edited by

                          Test VPN from the gear you own (and whose specs you know) to your pfSense box across a reliable internet connection. That will give you the performance indication of your hardware. Better yet, test the VPN throughput in the lab to see the maximum throughput your hardware is capable of.

                          Stating the VPN throughput of 5 Mbps to some third-party VPN service is hardly an indication that something is wrong with your hardware or software.

                          1 Reply Last reply Reply Quote 0
                          • P
                            Paint
                            last edited by

                            @Paint:

                            here are my advanced server settings:

                            fast-io;sndbuf 0;rcvbuf 0;push "sndbuf 524288";push "rcvbuf 524288";keepalive 10 120;push "redirect-gateway def1";push "redirect-gateway-ipv6 def1";push "route-ipv6 2000::/3";

                            Here are my advanced client settings:

                            fast-io
                            fragment 0
                            mssfix 0
                            sndbuf 524288
                            rcvbuf 524288
                            lport 0
                            remote-random
                            remote-cert-tls server
                            resolv-retry 4
                            key-method 2
                            mute 10
                            mute-replay-warnings
                            keepalive 10 120
                            auth-retry nointeract
                            setenv FORWARD_COMPATIBLE 1
                            verb 3
                            reneg-sec 0
                            script-security 2
                            

                            Ultimately, I think we should push to change to Softether as the VPN client.  It supports backwards compatibility to OpenVPN and is much faster than OpenVPN for the same hardware.

                            Here is a feature list: https://www.softether.org/1-features

                            I started a thread in the package sub-forum regarding my SoftEther FreeBSD package port and performance. My initial tests show I can easily push 150/150 mbps (maximum of my WAN speed) through SoftEther with very low load on my pfSense machine!

                            https://forum.pfsense.org/index.php?topic=117626

                            I will post some benchmarks and run some theoretical maximum tests to see how fast SoftEther is compared to OpenVPN on my machine (my theoretical OpenVPN max is 299 mbps).

                            pfSense i5-4590
                            940/880 mbit Fiber Internet from FiOS
                            BROCADE ICX6450 48Port L3-Managed Switch w/4x 10GB ports
                            Netgear R8000 AP (DD-WRT)

                            1 Reply Last reply Reply Quote 0
                            • I
                              IggyB
                              last edited by

                              ci323 nano u

                              Stats for you guys

                              hw.model: Intel(R) Celeron(R) CPU  N3150  @ 1.60GHz
                              (cryptodev) BSD cryptodev engine
                              (rsax) RSAX engine support
                              (rdrand) Intel RDRAND engine
                              (dynamic) Dynamic engine loading support

                              openssl speed aes-128-cbc aes-192-cbc aes-256-cbc
                              OpenSSL 1.0.1s-freebsd  1 Mar 2016
                              built on: date not available
                              options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
                              compiler: clang
                              The 'numbers' are in 1000s of bytes per second processed.
                              type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
                              aes-128 cbc      27446.63k    31065.88k    32203.01k    79808.59k    80497.95k
                              aes-192 cbc      23419.20k    25885.49k    26810.11k    66946.05k    67553.96k
                              aes-256 cbc      20250.74k    22164.16k    22912.07k    57832.11k    58552.27k

                              openssl speed -engine cryptodev -multi 4 aes-128-cbc aes-192-cbc aes-256-cbc
                              OpenSSL 1.0.1s-freebsd  1 Mar 2016
                              built on: date not available
                              options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
                              compiler: clang
                              aes-128 cbc    104805.14k  118668.96k  128936.14k  318822.11k  321327.26k
                              aes-192 cbc      93729.09k  103600.58k  107154.76k  267119.27k  271302.66k
                              aes-256 cbc      80937.83k    88656.43k    91726.42k  226115.54k  230708.57k

                              openssl speed -multi 4 bf-cbc
                              OpenSSL 1.0.1s-freebsd  1 Mar 2016
                              built on: date not available
                              options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
                              compiler: clang
                              blowfish cbc    164957.33k  185746.01k  191440.98k  193272.15k  193628.57k

                              openssl speed bf-cbc
                              OpenSSL 1.0.1s-freebsd  1 Mar 2016
                              built on: date not available
                              options:bn(64,64) rc4(16x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
                              compiler: clang
                              The 'numbers' are in 1000s of bytes per second processed.
                              type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
                              blowfish cbc    41251.69k    46459.56k    47838.06k    48378.47k    48452.95k

                              1 Reply Last reply Reply Quote 0
                              • S
                                spon901
                                last edited by

                                The measurement above using command:
                                time openvpn –test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc

                                seem to be total innacurate.

                                I made following tests.  I connect a i5 laptop and a RK3288 based linux box to a vlan switch.  The RK3288 is used as a vlan router. On Laptop I runned a speed test through this router. and I obtain 300M/150M which is what provider offer.
                                Running the above test command I got :
                                For RK3288  27 sec which mean 118.5Mbps
                                For I5 Laptop 6 sec which mean 533 Mbps.

                                So I expect a throughput of around 120Mbps .  However insialling openwrt on both RK3288 box and I5 laptop, performing same test I have only 32Mbps/43Mbps.  Why so big difference comparative with theoeretical speed of 120Mbps

                                1 Reply Last reply Reply Quote 0
                                • V
                                  VAMike
                                  last edited by

                                  @Pippin:

                                  Very much doubt these calculations or any….., to much variables to make a good estimate that will reflect reality.
                                  Cipher, digest, hash, compression, mtu, buffersizes, network, latency, etc. all play a role.
                                  And also the type of data that goes through the tunnel.

                                  Intel Celeron N3150 4x1.6GHz    -TDP 6W  -CPU Mark 1642 -Single Thread  456
                                  3200/27,5 = 116 Mbps OpenVPN performance (estimate)

                                  As argument, with N3150 (Gigabyte N3150N-D3V), I can tell you that in a client to client Iperf test, I was getting 160 Mbit/s throughput, I used:
                                  No crypto hardware selected (meaning AES-NI will be used automatically if it`s supported, N3150 does)
                                  no compression
                                  DH 2048
                                  AES-256-CBC
                                  SHA512
                                  prng SHA512 32 #(prng_hash = 'RSA-SHA512'/prng_nonce_secret_len = 32)
                                  cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384/2048 bit RSA

                                  As you can see, with these somewhat "heavier" settings it is higher then the calculated 116 Mbit/s.

                                  Furthermore, keep in mind that this was client to client, meaning there is an extra round of crypto happening at server…..

                                  I'd guess that the original benchmark was done with aesni.ko loaded, hence the low crypto performance. Without aesni.ko I benchmark just about exactly 160Mbps on that hardware…

                                  1 Reply Last reply Reply Quote 0
                                  • V
                                    VAMike
                                    last edited by

                                    @spon901:

                                    I made following tests.  I connect a i5 laptop and a RK3288 based linux box to a vlan switch.  The RK3288 is used as a vlan router. On Laptop I runned a speed test through this router. and I obtain 300M/150M which is what provider offer.
                                    Running the above test command I got :
                                    For RK3288  27 sec which mean 118.5Mbps
                                    For I5 Laptop 6 sec which mean 533 Mbps.

                                    So I expect a throughput of around 120Mbps .  However insialling openwrt on both RK3288 box and I5 laptop, performing same test I have only 32Mbps/43Mbps.  Why so big difference comparative with theoeretical speed of 120Mbps

                                    Do I understand correctly that you changed the OS after running the benchmark? Try running the benchmark on the OS you're using for the test.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      spon901
                                      last edited by

                                      No,  was the same OS .  I did not change anything.  Just test  directly and the immediately run same test through openvpn. The again run same test directly just to be sure.  The results are :

                                      Directly 300/150, through vpn 32/43.

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        Guest
                                        last edited by

                                        @spon901:

                                        The measurement above using command:
                                        time openvpn –test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc

                                        seem to be total innacurate.

                                        I made following tests.  I connect a i5 laptop and a RK3288 based linux box to a vlan switch.  The RK3288 is used as a vlan router. On Laptop I runned a speed test through this router. and I obtain 300M/150M which is what provider offer.
                                        Running the above test command I got :
                                        For RK3288  27 sec which mean 118.5Mbps
                                        For I5 Laptop 6 sec which mean 533 Mbps.

                                        So I expect a throughput of around 120Mbps .  However insialling openwrt on both RK3288 box and I5 laptop, performing same test I have only 32Mbps/43Mbps.  Why so big difference comparative with theoeretical speed of 120Mbps

                                        OpenWRT is Linux based and not BSD based! This at first. But you will be also getting total
                                        other results if you take on both sides Intel Core i5 CPUs and or i7 CPUs. And theoretical
                                        you could do a test on the same devices for OpenSSL likes many others are doing, but
                                        what you get then out as a result in the real life you should know, is totally another thing!

                                        This numbers even can be and will be different pending on the;
                                        used hardware (horse power), devices it self and topology of the network or done test.

                                        And pease don´t forget that you will need more horse power such OpenWRT is needing,
                                        but on the other side you get then not only a small router, you might be able to set up until
                                        a fully UTM device if needed.

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          Dalsland
                                          last edited by

                                          Here is my benchmark for

                                          Intel J1900 Quad Core 4x2GHz
                                          Network 4*Intel WG82583
                                          Eglobal Fanless Mini PC

                                          [2.3.2-RELEASE][admin@pfSense.localdomain]/root: time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc
                                          30.309u 0.023s 0:30.35 99.9%    742+177k 0+0io 0pf+0w
                                          
                                          

                                          30s = 106 Mbps according to the calculation.

                                          "Real world"  performance:
                                          I have a 100/100 connection

                                          No VPN

                                          VPN

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            mauroman33
                                            last edited by

                                            @spon901:

                                            No,  was the same OS .  I did not change anything.  Just test  directly and the immediately run same test through openvpn. The again run same test directly just to be sure.  The results are :

                                            Directly 300/150, through vpn 32/43.

                                            Don't you have doubt that it could be related to your VPN provider?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.