Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Poor performace with Openvpn

    Scheduled Pinned Locked Moved OpenVPN
    29 Posts 4 Posters 2.9k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T Offline
      trumee @pete35
      last edited by

      @pete35 said in Poor performace with Openvpn:

      What is the value of cryptographic settings in Advanced- Miscellaneous? It should be "aes-ni" on both sites... and inside the tunnel configuration ... "none" ...

      These are the crypto settings on both sides, https://imgur.com/a/Qzar59q

      P 1 Reply Last reply Reply Quote 0
      • P Offline
        pete35 @trumee
        last edited by

        @trumee

        pls remove all configurations, where "cryptodev" is included and set it to aesni only.

        <a href="https://carsonlam.ca">bintang88</a>
        <a href="https://carsonlam.ca">slot88</a>

        T 1 Reply Last reply Reply Quote 0
        • T Offline
          trumee @pete35
          last edited by trumee

          @pete35 said in Poor performace with Openvpn:

          @trumee

          pls remove all configurations, where "cryptodev" is included and set it to aesni only.

          I have enabled AESNI in Advanced-Miscellaneous. In the tunnel configuration, should the 'Hardware Crypto' be set to 'No Hardware Crypto Acceleration'?

          alt text

          1 Reply Last reply Reply Quote 0
          • RicoR Offline
            Rico LAYER 8 Rebel Alliance
            last edited by

            Yes.

            -Rico

            1 Reply Last reply Reply Quote 0
            • stephenw10S Offline
              stephenw10 Netgate Administrator
              last edited by

              Set it to no-hardware crypto there.

              It will be interesting to see if that makes any measurable difference. The speeds you're seeing seem to be less than anything I would expect to be affected by that.

              Steve

              1 Reply Last reply Reply Quote 0
              • T Offline
                trumee
                last edited by

                I set it to 'No Hardware Crypto'. It did not make a difference.

                [  5] local 192.168.1.111 port 5201 connected to 192.16.9.21 port 33160
                [ ID] Interval           Transfer     Bitrate         Retr  Cwnd
                [  5]   0.00-1.00   sec  1.74 MBytes  14.6 Mbits/sec    2   92.3 KBytes       
                [  5]   1.00-2.00   sec  1.87 MBytes  15.7 Mbits/sec    0    109 KBytes       
                [  5]   2.00-3.00   sec  2.05 MBytes  17.2 Mbits/sec    0    117 KBytes       
                [  5]   3.00-4.00   sec  2.24 MBytes  18.8 Mbits/sec    0    125 KBytes       
                [  5]   4.00-5.00   sec  2.43 MBytes  20.3 Mbits/sec    0    138 KBytes       
                [  5]   5.00-6.00   sec  2.30 MBytes  19.3 Mbits/sec    3    110 KBytes       
                [  5]   6.00-7.00   sec  2.24 MBytes  18.8 Mbits/sec    0    131 KBytes       
                [  5]   7.00-8.00   sec  1.99 MBytes  16.7 Mbits/sec   12   71.5 KBytes       
                [  5]   8.00-9.00   sec  1.49 MBytes  12.5 Mbits/sec    0   81.9 KBytes       
                [  5]   9.00-10.00  sec  1.49 MBytes  12.5 Mbits/sec    0   94.9 KBytes       
                [  5]  10.00-10.05  sec   191 KBytes  29.6 Mbits/sec    0   96.2 KBytes       
                - - - - - - - - - - - - - - - - - - - - - - - - -
                [ ID] Interval           Transfer     Bitrate         Retr
                [  5]   0.00-10.05  sec  20.0 MBytes  16.7 Mbits/sec   17             sender
                -----------------------------------------------------------
                Server listening on 5201
                -----------------------------------------------------------
                
                1 Reply Last reply Reply Quote 0
                • RicoR Offline
                  Rico LAYER 8 Rebel Alliance
                  last edited by

                  Please share all your OpenVPN settings.
                  What is your Encryption Algorithm?
                  With GCM I have seen OpenVPN traffic beyond 400 MBit/s
                  My SG-5100 can easy do ~250 MBit/s

                  -Rico

                  T 1 Reply Last reply Reply Quote 0
                  • RicoR Offline
                    Rico LAYER 8 Rebel Alliance
                    last edited by

                    For testing...could you set the Encryption Algorithm to None? Just to rule this out...

                    -Rico

                    T 1 Reply Last reply Reply Quote 0
                    • T Offline
                      trumee @Rico
                      last edited by trumee

                      @Rico I am using 'cipher AES-256-CBC', 'auth SHA256' and ncp-ciphers 'AES-256-GCM:AES-128-GCM'. The server side VPN config is the following and the client side config is posted above.

                      $less /var/etc/openvpn/server1.conf
                      dev ovpns1
                      verb 1
                      dev-type tun
                      dev-node /dev/tun1
                      writepid /var/run/openvpn_server1.pid
                      #user nobody
                      #group nobody
                      script-security 3
                      daemon
                      keepalive 10 60
                      ping-timer-rem
                      persist-tun
                      persist-key
                      proto udp4
                      cipher AES-256-CBC
                      auth SHA256
                      up /usr/local/sbin/ovpn-linkup
                      down /usr/local/sbin/ovpn-linkdown
                      local 127.0.0.1
                      tls-server
                      server 10.8.9.0 255.255.255.0
                      client-config-dir /var/etc/openvpn-csc/server1
                      ifconfig 10.8.9.1 10.8.9.2
                      tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'VoipVPNServer' 1"
                      lport 1194
                      management /var/etc/openvpn/server1.sock unix
                      route 192.168.0.0 255.255.255.0
                      route 192.168.1.0 255.255.255.0
                      route 192.168.2.0 255.255.255.0
                      route 192.168.5.0 255.255.255.0
                      route 192.168.6.0 255.255.255.0
                      route 192.168.10.0 255.255.255.0
                      route 192.168.18.0 255.255.255.0
                      route 192.168.40.0 255.255.255.0
                      route 192.168.50.0 255.255.255.0
                      ca /var/etc/openvpn/server1.ca 
                      cert /var/etc/openvpn/server1.cert 
                      key /var/etc/openvpn/server1.key 
                      dh /etc/dh-parameters.2048
                      crl-verify /var/etc/openvpn/server1.crl-verify 
                      tls-auth /var/etc/openvpn/server1.tls-auth 0
                      ncp-ciphers AES-256-GCM:AES-128-GCM
                      compress lz4-v2
                      persist-remote-ip
                      float
                      topology subnet
                      
                      1 Reply Last reply Reply Quote 0
                      • T Offline
                        trumee @Rico
                        last edited by

                        @Rico said in Poor performace with Openvpn:

                        For testing...could you set the Encryption Algorithm to None? Just to rule this out...

                        -Rico

                        There is no change to the result,

                        $ iperf3 -c 192.168.1.111 -R
                        Connecting to host 192.168.1.111, port 5201
                        Reverse mode, remote host 192.168.1.111 is sending
                        [  5] local 172.16.9.21 port 33962 connected to 192.168.1.111 port 5201
                        [ ID] Interval           Transfer     Bitrate
                        [  5]   0.00-1.00   sec  1.21 MBytes  10.2 Mbits/sec                  
                        [  5]   1.00-2.00   sec  1.61 MBytes  13.5 Mbits/sec                  
                        [  5]   2.00-3.00   sec   905 KBytes  7.41 Mbits/sec                  
                        [  5]   3.00-4.00   sec  1.01 MBytes  8.48 Mbits/sec                  
                        [  5]   4.00-5.00   sec   538 KBytes  4.41 Mbits/sec                  
                        [  5]   5.00-6.00   sec   753 KBytes  6.17 Mbits/sec                  
                        [  5]   6.00-7.00   sec   987 KBytes  8.09 Mbits/sec                  
                        [  5]   7.00-8.00   sec  1.18 MBytes  9.88 Mbits/sec                  
                        [  5]   8.00-9.00   sec  1.43 MBytes  12.0 Mbits/sec                  
                        [  5]   9.00-10.00  sec  1.65 MBytes  13.9 Mbits/sec                  
                        - - - - - - - - - - - - - - - - - - - - - - - - -
                        [ ID] Interval           Transfer     Bitrate         Retr
                        [  5]   0.00-10.05  sec  11.6 MBytes  9.67 Mbits/sec  150             sender
                        [  5]   0.00-10.00  sec  11.2 MBytes  9.40 Mbits/sec                  receiver
                        
                        iperf Done.
                        
                        1 Reply Last reply Reply Quote 0
                        • stephenw10S Offline
                          stephenw10 Netgate Administrator
                          last edited by

                          Did you disable NCP? Otherwise it will still be negotiating those.

                          But as I said this looks like some sort of mtu/fragmenting issue. Run a packet capture and see what's happening.

                          Steve

                          T 1 Reply Last reply Reply Quote 0
                          • T Offline
                            trumee @stephenw10
                            last edited by

                            @stephenw10 said in Poor performace with Openvpn:

                            Did you disable NCP? Otherwise it will still be negotiating those.

                            But as I said this looks like some sort of mtu/fragmenting issue. Run a packet capture and see what's happening.

                            Steve

                            I have done packet capture. What should i be looking for in wireshark?

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S Offline
                              stephenw10 Netgate Administrator
                              last edited by

                              Fragmented packets is the first thing I would be looking for. Then what size the large fragments are.

                              Otherwise check the initial TCP transactions for the window size etc. Do you see retranmissions or missing packet errors.

                              Steve

                              T 1 Reply Last reply Reply Quote 0
                              • T Offline
                                trumee @stephenw10
                                last edited by

                                @stephenw10 said in Poor performace with Openvpn:

                                Fragmented packets is the first thing I would be looking for. Then what size the large fragments are.

                                Otherwise check the initial TCP transactions for the window size etc. Do you see retranmissions or missing packet errors.

                                Steve

                                I captured VPN interface and opened the capture in wireshark. I dont see any fragmented packet in the Info column.

                                • Should I capture the WAN interface instead of the VPN interface?
                                • Is there any wireshark tutorial which shows how to identify whether fragmentation is occuring?
                                1 Reply Last reply Reply Quote 0
                                • stephenw10S Offline
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  I'm not aware of any specific tutorial for that, there are many though.

                                  Packet fragmentation is not difficult to spot though even just from the pfSense interface.

                                  11:54:54.373954 IP 172.21.16.35 > 172.21.16.5: ICMP echo request, id 39018, seq 0, length 1480
                                  11:54:54.373963 IP 172.21.16.35 > 172.21.16.5: ip-proto-1
                                  11:54:55.374734 IP 172.21.16.35 > 172.21.16.5: ICMP echo request, id 39018, seq 1, length 1480
                                  11:54:55.374743 IP 172.21.16.35 > 172.21.16.5: ip-proto-1
                                  11:54:56.375739 IP 172.21.16.35 > 172.21.16.5: ICMP echo request, id 39018, seq 2, length 1480
                                  11:54:56.375749 IP 172.21.16.35 > 172.21.16.5: ip-proto-1
                                  

                                  Pinging size 2000 byte packets, each full size packet is followed by a fragment to make up the full packet.

                                  In that particular case there is a switch I have that doesn't pass packet fragments. 🙄

                                  Try looking at the OpenVPN traffic on the WAN also. If that is fragmented it will kill performance.

                                  Steve

                                  T 1 Reply Last reply Reply Quote 0
                                  • T Offline
                                    trumee @stephenw10
                                    last edited by

                                    For comparison sake i setup wireguard between the two networks. Wireguard starts with an MTU of 1420, and it reaches almost the line-speed in both forward and reverse directions.

                                    # wg-quick up wg0  
                                    [#] ip link add wg0 type wireguard
                                    [#] wg setconf wg0 /dev/fd/63
                                    [#] ip -4 address add 10.0.0.2/32 dev wg0
                                    [#] ip link set mtu 1420 up dev wg0
                                    [#] ip -4 route add 10.0.0.0/24 dev wg0
                                    
                                    root@wireguard:/etc/wireguard# iperf3 -c 10.0.0.1 
                                    Connecting to host 10.0.0.1, port 5201
                                    [  4] local 10.0.0.2 port 34842 connected to 10.0.0.1 port 5201
                                    [ ID] Interval           Transfer     Bandwidth       Retr  Cwnd
                                    [  4]   0.00-1.00   sec  14.8 MBytes   124 Mbits/sec    0   1.74 MBytes       
                                    [  4]   1.00-2.00   sec  16.8 MBytes   141 Mbits/sec    0   2.58 MBytes       
                                    [  4]   2.00-3.00   sec  17.0 MBytes   142 Mbits/sec    3   2.96 MBytes       
                                    [  4]   3.00-4.00   sec  16.0 MBytes   134 Mbits/sec    1   2.07 MBytes       
                                    [  4]   4.00-5.00   sec  16.7 MBytes   140 Mbits/sec    1   1.52 MBytes       
                                    [  4]   5.00-6.00   sec  17.0 MBytes   142 Mbits/sec    0   1.62 MBytes       
                                    [  4]   6.00-7.00   sec  16.9 MBytes   142 Mbits/sec    0   1.70 MBytes       
                                    [  4]   7.00-8.00   sec  16.8 MBytes   141 Mbits/sec    0   1.75 MBytes       
                                    [  4]   8.00-9.00   sec  16.9 MBytes   142 Mbits/sec    0   1.79 MBytes       
                                    [  4]   9.00-10.00  sec  17.0 MBytes   142 Mbits/sec    2    920 KBytes       
                                    - - - - - - - - - - - - - - - - - - - - - - - - -
                                    [ ID] Interval           Transfer     Bandwidth       Retr
                                    [  4]   0.00-10.00  sec   166 MBytes   139 Mbits/sec    7             sender
                                    [  4]   0.00-10.00  sec   163 MBytes   137 Mbits/sec                  receiver
                                    
                                    iperf Done.
                                    root@wireguard:/etc/wireguard# iperf3 -c 10.0.0.1 -R
                                    Connecting to host 10.0.0.1, port 5201
                                    Reverse mode, remote host 10.0.0.1 is sending
                                    [  4] local 10.0.0.2 port 35042 connected to 10.0.0.1 port 5201
                                    [ ID] Interval           Transfer     Bandwidth
                                    [  4]   0.00-1.00   sec  13.0 MBytes   109 Mbits/sec                  
                                    [  4]   1.00-2.00   sec  16.9 MBytes   141 Mbits/sec                  
                                    [  4]   2.00-3.00   sec  16.9 MBytes   142 Mbits/sec                  
                                    [  4]   3.00-4.00   sec  16.9 MBytes   142 Mbits/sec                  
                                    [  4]   4.00-5.00   sec  16.9 MBytes   142 Mbits/sec                  
                                    [  4]   5.00-6.00   sec  16.9 MBytes   142 Mbits/sec                  
                                    [  4]   6.00-7.00   sec  16.9 MBytes   142 Mbits/sec                  
                                    [  4]   7.00-8.00   sec  16.9 MBytes   141 Mbits/sec                  
                                    [  4]   8.00-9.00   sec  16.9 MBytes   142 Mbits/sec                  
                                    [  4]   9.00-10.00  sec  16.9 MBytes   142 Mbits/sec                  
                                    - - - - - - - - - - - - - - - - - - - - - - - - -
                                    [ ID] Interval           Transfer     Bandwidth       Retr
                                    [  4]   0.00-10.00  sec   168 MBytes   141 Mbits/sec    3             sender
                                    [  4]   0.00-10.00  sec   168 MBytes   141 Mbits/sec                  receiver
                                    
                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.