[SOLVED] Slow PIA VPN connection on pfsense 2.4b
-
The "no suitable dump device found" error just means that you don't have swap, which is fine as long as that's the way you installed.
I'd try it again and leave it for 20-30min.
There are a few issues with reboot floating around, and there's an issue where reboot can hang for ~20min because it can't install packages but it will eventually continue the boot and then you can get packages installed once boot is complete. The 20 minute hang issue hopefully gets fixed….
So reinstall, let it start rebooting and just walk away, for a good bit of time.
For your hardware I don't think it's an issue but make sure you have latest BIOS/UEFI/firmware installed.
-
The "no suitable dump device found" error just means that you don't have swap, which is fine as long as that's the way you installed.
I did install without swap, so I can ignore that message in the future :)
I'd try it again and leave it for 20-30min.
There are a few issues with reboot floating around, and there's an issue where reboot can hang for ~20min because it can't install packages but it will eventually continue the boot and then you can get packages installed once boot is complete. The 20 minute hang issue hopefully gets fixed….
So reinstall, let it start rebooting and just walk away, for a good bit of time.
It just started its 20mins reboot countdown, so I'm crossing my fingers :)
For your hardware I don't think it's an issue but make sure you have latest BIOS/UEFI/firmware installed.
I am all ready, so shouldn't be a problem.
-
I'm now on 120 mins, no sign of it wanting to reboot..
-
So am I doing something wrong with the install?
Downloading the latest memstick image from here https://snapshots.pfsense.org/amd64/pfSense_master/installer/?C=M;O=D unpacking it, then using Win32DiskImager to make the bootable usb stick. Booting it up and following your guide https://forum.pfsense.org/index.php?action=thankyoupostlist;topic=126597.0;msg=699155 and choosing 2 disk mirror.
-
I don't think so, there have been multiple users reporting reboot issues. I've never encountered it though so I don't really know how to help except pointing you to these.
https://forum.pfsense.org/index.php?topic=128577.msg712180#msg712180
https://forum.pfsense.org/index.php?topic=126520.msg698661#msg698661
-
I don't think so, there have been multiple users reporting reboot issues. I've never encountered it though so I don't really know how to help except pointing you to these.
https://forum.pfsense.org/index.php?topic=128577.msg712180#msg712180
https://forum.pfsense.org/index.php?topic=126520.msg698661#msg698661
Thanks, its good to know I'm not the only one.
Will try to install pfsense 2.4 to my SSD instead, hopefully it will work and then when a fix has been implemented I will go back to the sticks.
-
Honestly if you have an SSD laying around you are better off using that.
In my ZFS Guide I do mention installs to USB sticks, but not because they are better. I mention it because it is a cost saving feature that might enable someone to afford it that otherwise couldn't. There are other reasons to install to USB, but generally speaking if you have an SSD definitely use the SSD.
USB drive installs need you to adjust things to make them last that you wouldn't ever have to worry about with an SSD.
The only advantage they have over SSDs is price, and how common they are (just about anyone can pull an SSD out of a drawer and install pfSense to their machine.
-
Honestly if you have an SSD laying around you are better off using that.
In my ZFS Guide I do mention installs to USB sticks, but not because they are better. I mention it because it is a cost saving feature that might enable someone to afford it that otherwise couldn't. There are other reasons to install to USB, but generally speaking if you have an SSD definitely use the SSD.
USB drive installs need you to adjust things to make them last that you wouldn't ever have to worry about with an SSD.
The only advantage they have over SSDs is price, and how common they are (just about anyone can pull an SSD out of a drawer and install pfSense to their machine.
Ja I totally understand, was just hoping to save the SSD for other projects. Its a bit overkill to have a 256gb disk in a router system IMO ;D
and as I said in my former post, I will properbly go back to the USB's if I hear news that the issue is fixed. -
Oh btw how would you configure the install with an SSD? how big of a swap size, if any?
-
I don't think the boot issue is USB specific, others have reported the issue on SSD/HDD.
Swap is normally double your RAM, I believe that's the default setting.
Defaults will work great.
-
I don't think the boot issue is USB specific, others have reported the issue on SSD/HDD.
Swap is normally double your RAM, I believe that's the default setting.
Defaults will work great.
hmm, for me the change to SSD worked, it rebooted straight away, with no issues.
In that case, I will need to add some more swap.
Will test VPN tommorrow.
-
So got OpenVPN configured this morning and with the standard settings, its slow as usual 5/10-30mbit.
With my added settings I'm hitting a max of 84mbps.
I switched to pfsense monitor for reference as it seems Speedtest.net is all over the place..
I tried to set it up as you described it in another thread. https://forum.pfsense.org/index.php?topic=128230.15Then do your best to max out your bandwidth, Steam downloads usually have great bandwidth and they have free titles (DOTA 2 is pretty big and free so it will run for long enough to see it on RRDs).
You have a pretty beefy connection so you might also stream a bunch of UHD youtube videos, I think you can search for even 5k and 8k content that will really suck down some bandwidth!Anyawys, after you max out the connection for 5-10 minutes,
go to Status / Monitoring and set it up like so:
System > Processor on one side
Traffic > WAN on the other side
1 Hour, 1 Minute, Line, On, Never
De-select everything on the graph except:
user util
nice util
system util
interrupt
inpass total
outpass totalScreenshot the graph and data summary with your mouse hovering over a point on the graph where your bandwidth is maxed out to display the stats you selected and post it up here.
That will give no bullshit real world VPN throughput:CPU usage data (assuming you are piping all of your traffic out through a VPN client as you stated).
I know that's all a very specific request, but it would be greatly appreciated!
I'm thinking its pretty good, though it sucks I know it could be a bit better.
Should I maybe give up and try running two OpenVPN clients? or is there still more I can tinker with?![Steam 2nd install SSD VPN.jpg](/public/imported_attachments/1/Steam 2nd install SSD VPN.jpg)
![Steam 2nd install SSD VPN.jpg_thumb](/public/imported_attachments/1/Steam 2nd install SSD VPN.jpg_thumb) -
I don't know if I've asked this already but what NIC are you using?
The CPU is obviously working just fine at ~17% for 86Mbps VPN throughout.
With this being a clean install it should be maxing your connection.
-
I don't know if I've asked this already but what NIC are you using?
The CPU is obviously working just fine at ~17% for 86Mbps VPN throughout.
With this being a clean install it should be maxing your connection.
I'ts running an IBM intel i340-T4 quad
Maybe its totally obvious and I just dont see it, but where do you see the 17% CPU usage?
EDIT: Found it, adding the % together ::)btw I got this magnificent reply from PIA support, which really answered all my technical questions in which I specifically told them that I could get 100/100 on my pc client and that my router was suppose to handle well beyond 100mbit…
Thanks for getting back to us.
You can expect to see at least a 10-15%* speed drop from the results you get when testing "disconnected" to our servers on our network page here: https://www.privateinternetaccess.com/pages/network/
- Typically it will be drop between 15-50% for computers and 25-75% (or more, depending on the router's capability) drop for routers.
- The higher encryption that you use, the more overhead that would be added slowing the connection. This can certainly be worsened by connecting to gateways that have additional routing latency or have a lot of traffic on them at the time.
- Our servers also have a 1 gigabit connection (for each server) shared among the customers connecting to the server. That in mind, we wouldn't normally expect you to reach higher than 50-100mbps.
We apologize for the inconvenience.
Let us know if you have anymore questions.
-
Yeah that's just a canned response.
I really have no idea why you aren't getting line speeds. You should be from what I can tell.
Maybe someone else can chime in here?
All I can siggest is playing around with the settings?
Maybe try LZ4v2, try no compression, try disabling NCP? Really idk though. I've run almost an identical setup on a J3355 and got line speeds at 150/10 no problems, no adding custom options.
-
I really have no idea why you aren't getting line speeds. You should be from what I can tell.
No worries, I'm just glad you want to try and help.
and we did fix one issue with the installer :DAll I can siggest is playing around with the settings?
Maybe try LZ4v2, try no compression, try disabling NCP? Really idk though. I've run almost an identical setup on a J3355 and got line speeds at 150/10 no problems, no adding custom options.
I tried different compressions and disabling NCP, without much difference although for the worse.
![Steam pfsense VPN SSD no compression.jpg_thumb](/public/imported_attachments/1/Steam pfsense VPN SSD no compression.jpg_thumb)
![Steam pfsense VPN SSD no compression.jpg](/public/imported_attachments/1/Steam pfsense VPN SSD no compression.jpg)
![Steam pfsense VPN SSD adaptive LZO.jpg](/public/imported_attachments/1/Steam pfsense VPN SSD adaptive LZO.jpg)
![Steam pfsense VPN SSD adaptive LZO.jpg_thumb](/public/imported_attachments/1/Steam pfsense VPN SSD adaptive LZO.jpg_thumb)
![Steam pfsense VPN SSD LZO4v2.jpg](/public/imported_attachments/1/Steam pfsense VPN SSD LZO4v2.jpg)
![Steam pfsense VPN SSD LZO4v2.jpg_thumb](/public/imported_attachments/1/Steam pfsense VPN SSD LZO4v2.jpg_thumb)
![Steam pcvpn SSD.jpg](/public/imported_attachments/1/Steam pcvpn SSD.jpg)
![Steam pcvpn SSD.jpg_thumb](/public/imported_attachments/1/Steam pcvpn SSD.jpg_thumb)
![Steam straight SSD.jpg](/public/imported_attachments/1/Steam straight SSD.jpg)
![Steam straight SSD.jpg_thumb](/public/imported_attachments/1/Steam straight SSD.jpg_thumb) -
Could you explain me how to setup two VPN's as one? or do you have a link to a guide?
Just want to try it out and see if that gets me closer to the 100 mark. :)
-
Could you explain me how to setup two VPN's as one? or do you have a link to a guide?
Just want to try it out and see if that gets me closer to the 100 mark. :)
What hardware is your pfsense box running on?
What PIA setup guide are you using, and are you connecting to the "strong crypto" gateways or the standard PIA gateways with less encryption?
Its entirely possible that your CPU can't process the encryption faster than 75mbps on the throughput. This explains why you see full line rates when running it on a PC, and slower rates when its running on pfsense.
If you're connecting to the stronger encryption gateways, the only thing you can do to improve your throughput is to start connecting to the default (lower encryption) ones.
-
What hardware is your pfsense box running on?
Asrock J3455-ITX
2x4gb Hyperx DDR3L 1866MHz
256gb SSDAccording to the synthetic benchmarks I have done, it should be able to handle up to 280mbps over VPN.
What PIA setup guide are you using, and are you connecting to the "strong crypto" gateways or the standard PIA gateways with less encryption?
If you're connecting to the stronger encryption gateways, the only thing you can do to improve your throughput is to start connecting to the default (lower encryption) ones.
Its the standard pfsense guide, with 128bit encryption found on their website here: https://www.privateinternetaccess.com/pages/client-support/pfsense
It gives me roughly 5mbps download.
I have then added:
fast-io sndbuf 524288 rcvbuf 524288
which improves that figure to 86mbps
-
J3455 can definitely do a lot more then ~80Mbps.
Here are some instructions for gateway groups with VPN:
https://forum.pfsense.org/index.php?topic=115992.msg652957#msg652957 -
So after a lot of trial and error, it seems I have gotten two vpn clients up and running in a gateway group.
The speeds are finally at maximum! But the latency seems to have gone up and so webpages seems to be loading slower than before. Is this a trade off with this configuration?
https://ipleak.net/ seems fast and reports my ip and dns servers to be the correct for my VPN choice, with no exceptions.
But I'm a little worried that I'm maybe running traffic around the VPN with these speed and the low CPU usage..?
I made a lot of back and forth settings changes and think I might be better of restoring from a backup and trying again tomorrow.
EDIT
It seems I have the same problems with everything showing up offline as pigbait on page 2.
Also bretthoward sums up pretty much what I'm experiencing on the same page as well.![Steam VPNGG SSD.jpg](/public/imported_attachments/1/Steam VPNGG SSD.jpg)
![Steam VPNGG SSD.jpg_thumb](/public/imported_attachments/1/Steam VPNGG SSD.jpg_thumb) -
So after a lot of trial and error, it seems I have gotten two vpn clients up and running in a gateway group.
The speeds are finally at maximum! But the latency seems to have gone up and so webpages seems to be loading slower than before. Is this a trade off with this configuration?
https://ipleak.net/ seems fast and reports my ip and dns servers to be the correct for my VPN choice, with no exceptions.
But I'm a little worried that I'm maybe running traffic around the VPN with these speed and the low CPU usage..?
I made a lot of back and forth settings changes and think I might be better of restoring from a backup and trying again tomorrow.
EDIT
It seems I have the same problems with everything showing up offline as pigbait on page 2.
Also bretthoward sums up pretty much what I'm experiencing on the same page as well.you can verify if traffic isnt being passed thorugh the VPN setup by going to diagnostic -> packet capture -> wan and leave the default options. Launch the packet cap, then do a bunch of broswing/speed tests. I'd recommend keeping the capture UNDER 5 SECONDS, otherwise youre going to be reading through a LARGE packet cap log.
Once you think youve generated enough traffic, stop the packet cap and read through the connections. If you see anything exiting your wan interface and headed to hosts other than your VPN provider, you've got a routing leak.
Its worth mentioning since I'm unaware of how your setup is configured, that a multi wan (in this case its multi WAN, because youve got multiple VPN gateways traffic can exit) setup can cause havoc on session tracking for websites if youre set to round robin. You'll want traffic headed to websites to always leave through the same gateway, therefor its always returning via the same route.
Since your procs can handle line speeds, its likely your speed issue is due to the gateway youre heading to. PIA aggregates i think 10 users per IP (which their servers have a 1gbps connection, so 100mbps per user in a perfect world), so you might just be on a node that has heavy traffic.
-
PIA doesn't have a 100Mbps per user cap.
It's common to get much more than that. The highest I think I've seen reported on here was in the 600Mbps range on a single instance.
Using gateway groups as is works just fine, you don't need to do anything funky with your website traffic or session tracking at all. You're unnecessarily overcomplicating it.
Looking for anything going to !PIA_IP on pcap will only work if you are routing all of your traffic to the VPN, most people do not do this because many services don't work over VPN.
-
PIA doesn't have a 100Mbps per user cap.
It's common to get much more than that. The highest I think I've seen reported on here was in the 600Mbps range on a single instance.
Using gateway groups as is works just fine, you don't need to do anything funky with your website traffic or session tracking at all. You're unnecessarily overcomplicating it.
Looking for anything going to !PIA_IP on pcap will only work if you are routing all of your traffic to the VPN, most people do not do this because many services don't work over VPN.
you CAN get more than 100, i just pulled 153mbps. but PIA themselves say if youre running slow to try another gateway. If hes experiencing slow throughput (since his CPUs can handle the speed) the issue would be on the receiving end's network. I'm just identifying possible bottlenecks, which the gateway group providing better throughput also points to the bottleneck being the VPN gateway hes using.
I personally push all traffic over PIA, and exclude based on destination (craigslist for one, doesnt like PIA and blocks their IPs) and also based on source host (I dont want to tunnel my gaming traffic from PS4's for latency reasons). My main concern is protecting user traffic from ISP logging due to congress's recent decision in the US.
The reason i mention multi wan session tracking is because of how the gateway handles the traffic (depending on PBR, and gateway configuration). I'm not saying there IS an issue, im just providing relevant 'possible issue' information so the OP is aware. If OP starts to experience issues, he'll know where to start looking. Just wanted to clarify where i was coming from so there wasn't a misunderstanding. :)
-
you can verify if traffic isnt being passed thorugh the VPN setup by going to diagnostic -> packet capture -> wan and leave the default options. Launch the packet cap, then do a bunch of broswing/speed tests. I'd recommend keeping the capture UNDER 5 SECONDS, otherwise youre going to be reading through a LARGE packet cap log.
Once you think youve generated enough traffic, stop the packet cap and read through the connections. If you see anything exiting your wan interface and headed to hosts other than your VPN provider, you've got a routing leak.
Running Packet capture confirms my suspicion, the traffic is about 50/50 split between VPN and ISP.
I will revert back and try from scratch.
Also in the pictures I have attached. Shouldn't the VPN gateways be online?
![Gateway offline.JPG](/public/imported_attachments/1/Gateway offline.JPG)
![Gateway offline.JPG_thumb](/public/imported_attachments/1/Gateway offline.JPG_thumb)
![Interfaces up.JPG](/public/imported_attachments/1/Interfaces up.JPG)
![Interfaces up.JPG_thumb](/public/imported_attachments/1/Interfaces up.JPG_thumb) -
You can add a different monitor IPs to your VPN gateways to check if they're up. Try 8.8.8.8 & 8.8.4.4 or something like that.
Can you post a screenshot of your gateway group settings?
-
You can add a different monitor IPs to your VPN gateways to check if they're up. Try 8.8.8.8 & 8.8.4.4 or something like that.
Can you post a screenshot of your gateway group settings?
It seems they have allready got monitor IP's set automatically. should I still switch them to your IP's?
-
Those are just google's public DNS servers, give it a shot. Sometimes switching them lets the monitor function work.
Your gateway is configured correctly. What are your firewall rules? If traffic is going out the wAN and you have gateway and firewall rules configured correctly then something is very wrong.
My guess is that you simply have some traffic that is allowed to go out the WAN and some going through the gateway group which is why the pcap is showing the WAN.
-
Those are just google's public DNS servers, give it a shot. Sometimes switching them lets the monitor function work.
That got them online! Thank you ;D
Your gateway is configured correctly. What are your firewall rules? If traffic is going out the wAN and you have gateway and firewall rules configured correctly then something is very wrong.
My guess is that you simply have some traffic that is allowed to go out the WAN and some going through the gateway group which is why the pcap is showing the WAN.
This is where it got really confusing for me and I started the whole "trial and error thing" and I may have ended up with a lot of unnecessary rules or in worst case, wrong rules.
I have attached pictures of all the rule pages I made changes or added new rules.
During this I realized that I had set the LAN rule adress to WLAN net instead of the intended WAN net, so I changed this.
I have set the OpenVPN rule to any, is this correct?
Also I was unsure of which protocol to use for all these rules..
EDIT
I was wondering if its normal to leak your internal network IP and another long IPv6? address? As seen in the last picture.![FW rule LAN 02.JPG](/public/imported_attachments/1/FW rule LAN 02.JPG)
![FW rule LAN 02.JPG_thumb](/public/imported_attachments/1/FW rule LAN 02.JPG_thumb)
![FW rule PIAVPN1.JPG](/public/imported_attachments/1/FW rule PIAVPN1.JPG)
![FW rule PIAVPN1.JPG_thumb](/public/imported_attachments/1/FW rule PIAVPN1.JPG_thumb)
![FW rule PIAVPN2.JPG](/public/imported_attachments/1/FW rule PIAVPN2.JPG)
![FW rule PIAVPN2.JPG_thumb](/public/imported_attachments/1/FW rule PIAVPN2.JPG_thumb)
![FW rule OpenVPN.JPG](/public/imported_attachments/1/FW rule OpenVPN.JPG)
![FW rule OpenVPN.JPG_thumb](/public/imported_attachments/1/FW rule OpenVPN.JPG_thumb)
![FW NAT OUTBOUND.JPG](/public/imported_attachments/1/FW NAT OUTBOUND.JPG)
![FW NAT OUTBOUND.JPG_thumb](/public/imported_attachments/1/FW NAT OUTBOUND.JPG_thumb)
-
Don't have time to read all right now but change WAN net to LAN net on your gateway group rule in the first screen shot.
I'll try to check out rest later. -
Don't have time to read all right now but change WAN net to LAN net on your gateway group rule in the first screen shot.
I'll try to check out rest later.Will do.
No problem. Thank you for taking your time to help, its very appreciated. :)
EDIT
After setting it to LAN net and switching one VPN clints server (apparently the closest one to me is congested), I'm now running at full speed 106mbitBut again I'm seeing less CPU usage than running with with a single VPN.
I found this guide https://nguvu.org/pfsense/pfsense-multi-vpn-wan/
Is it any good?
He's doing a lot of things I haven't done fx. the way he set up the FW rules to block and log all IP traffic.![Steam VPNGG LAN net.JPG_thumb](/public/imported_attachments/1/Steam VPNGG LAN net.JPG_thumb)
![Steam VPNGG LAN net.JPG](/public/imported_attachments/1/Steam VPNGG LAN net.JPG) -
Tried pinging a few websites to test my latency and found that 99% of the time the first ping fails and then the rest comes through and if I then ping the same page again they all go through.
It fits with how every homepage I open hangs for 2-12 seconds and then loads.
![Ping VPNGG.jpg](/public/imported_attachments/1/Ping VPNGG.jpg)
![Ping VPNGG.jpg_thumb](/public/imported_attachments/1/Ping VPNGG.jpg_thumb) -
Delete the second allow any rule on your LAN to any Gateway
Delete all rules on PIAVPN1&2 interfaces
Then repost your rules.
-
Delete the second allow any rule on your LAN to any Gateway
Delete all rules on PIAVPN1&2 interfaces
Then repost your rules.
There you go.
![FW rule WAN.JPG](/public/imported_attachments/1/FW rule WAN.JPG)
![FW rule WAN.JPG_thumb](/public/imported_attachments/1/FW rule WAN.JPG_thumb)
![FW rule LAN new.JPG](/public/imported_attachments/1/FW rule LAN new.JPG)
![FW rule LAN new.JPG_thumb](/public/imported_attachments/1/FW rule LAN new.JPG_thumb)
![FW rule WLAN.JPG](/public/imported_attachments/1/FW rule WLAN.JPG)
![FW rule WLAN.JPG_thumb](/public/imported_attachments/1/FW rule WLAN.JPG_thumb)
![FW rule PIA1_WAN.JPG](/public/imported_attachments/1/FW rule PIA1_WAN.JPG)
![FW rule PIA1_WAN.JPG_thumb](/public/imported_attachments/1/FW rule PIA1_WAN.JPG_thumb)
![FW rule PIA2_WAN.JPG](/public/imported_attachments/1/FW rule PIA2_WAN.JPG)
![FW rule PIA2_WAN.JPG_thumb](/public/imported_attachments/1/FW rule PIA2_WAN.JPG_thumb)
![FW rule OpenVPN.JPG](/public/imported_attachments/1/FW rule OpenVPN.JPG)
![FW rule OpenVPN.JPG_thumb](/public/imported_attachments/1/FW rule OpenVPN.JPG_thumb) -
On your LAN & WLAN, if oyu want all of your traffic to go through the Gatewat group, you need to specify the gateway group as the only gateway.
The way those are written, nothing will go out of your gateway group except your OpenVPN server.
-
On your LAN & WLAN, if oyu want all of your traffic to go through the Gatewat group, you need to specify the gateway group as the only gateway.
The way those are written, nothing will go out of your gateway group except your OpenVPN server.
Ok, I thought that was fine as the NAT i specified was the OpenVPN.
but I've changed it now.
EDIT
Just to clarify, what I've change is what you said. haven't changed anything in NAT rules.download speed is on pair with running over my pc client now, but latencies are still high.
![FW rule LAN to GG.JPG](/public/imported_attachments/1/FW rule LAN to GG.JPG)
![FW rule LAN to GG.JPG_thumb](/public/imported_attachments/1/FW rule LAN to GG.JPG_thumb)
![FW rule WLAN to GG.JPG](/public/imported_attachments/1/FW rule WLAN to GG.JPG)
![FW rule WLAN to GG.JPG_thumb](/public/imported_attachments/1/FW rule WLAN to GG.JPG_thumb) -
OK, great! Can you get full speed with just one VPN client now that your rules are set up correctly? Try just changing one of the VPNs in the gateway group to never.
High latency is a fact of life when you are routing all of your traffic via a VPN.
To pick the best VPN server for you check out this list. https://www.privateinternetaccess.com/pages/network/
Closer is generally better latency but not always.
I would expand out from your closest server and test them out on pfSense to see which one is the best for you.
Also, VPN servers performance will vary over time. If there are a lot of users on it you will notice. So, when using a gateway group, it is probably to your advantage to pick the two best servers for you, and put one of them in each of your clients so that if one network goes down or gets shitty. You will seamlessly be using a different server. This is what gateway grouping is usually used for.
The OpenVPN gateway group is just a hack to get around the fact that OpenVPN is single threaded.
-
I got full speed again with one VPN set to never (see picture bellow)
But it seems that pfsense ignored it completely and still used both VPN's![GG group VPN2 NEVER.JPG](/public/imported_attachments/1/GG group VPN2 NEVER.JPG)
![GG group VPN2 NEVER.JPG_thumb](/public/imported_attachments/1/GG group VPN2 NEVER.JPG_thumb)
![Bandwidth monitor with VPN2 disabled.JPG](/public/imported_attachments/1/Bandwidth monitor with VPN2 disabled.JPG)
![Bandwidth monitor with VPN2 disabled.JPG_thumb](/public/imported_attachments/1/Bandwidth monitor with VPN2 disabled.JPG_thumb) -
Sorry, set your gateway group back to the way you had it, just change the LAN firewall rule from your gateway group to one of your VPN clients and try again.
-
Sorry, set your gateway group back to the way you had it, just change the LAN firewall rule from your gateway group to one of your VPN clients and try again.
Not quite, I would say its the same as before bandwidth wise, running with only one VPN.. Also it seems that pfsense refrains from using my VPN2 connection at in the beginning as the monitor reported no bw. but somehow it kicks in midway in the Ubuntu download and starts using it anyway..
The picture dosn't show the beginning of the download, but the VPN2 connection was completely dead, nothing was going in or out.
![Bandwidth monitor with VPN2 disabled 2nd try.JPG](/public/imported_attachments/1/Bandwidth monitor with VPN2 disabled 2nd try.JPG)
![Bandwidth monitor with VPN2 disabled 2nd try.JPG_thumb](/public/imported_attachments/1/Bandwidth monitor with VPN2 disabled 2nd try.JPG_thumb)