Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to distribute connections between two wan-ip interfaces

    Scheduled Pinned Locked Moved OpenVPN
    32 Posts 4 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GertjanG
      Gertjan @wesleylc1
      last edited by

      @wesleylc1 said in How to distribute connections between two wan-ip interfaces:

      I can't even find material

      I advise to to stop using the "one script-solution-for-all-needs".

      Because :
      Your setup is unusual. And thus less know, less documented, less tested. You're probably the first mentioning it on this forum.
      On the other hand, the doc was mentioned ones already - let's do it twice now : you use OpenVPN ? then read the OpenVPN manual : https://openvpn.net/community-resources/reference-manual-for-openvpn-2-4/ - the remote-random is explained over there. Google will add in another thousand or so references. That's what you have. Up to you to decide if it's is enough to implement.
      For more better support is of course available at the OpenVPN support channels.
      Do not break the rule : keep it simple.

      @wesleylc1 said in How to distribute connections between two wan-ip interfaces:

      but I don't know where to start

      So, you are in this plane, in the cockpit to be precise. And you want to fly it. And you're not type rated. Do what works best : learn. You can even test and try, something that isn't really possible with planes.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      W 1 Reply Last reply Reply Quote 0
      • W
        wesleylc1 Rebel Alliance @Gertjan
        last edited by

        @Gertjan said in How to distribute connections between two wan-ip interfaces:

        I advise to to stop using the "one script-solution-for-all-needs".

        Thank you for your replies.
        I didn't understand "one script-solution-for-all-needs".

        GertjanG 1 Reply Last reply Reply Quote 0
        • dotdashD
          dotdash @wesleylc1
          last edited by

          @wesleylc1 said in How to distribute connections between two wan-ip interfaces:

          Yes, I was told to use the random remote control in the configuration option, but I don't know where to start and I can't even find material to use as a reference.

          I think you just add it in the advanced configuration options when you roll the client (it's the EXAMPLE option...)
          Per my understanding, it basically scrambles the server list when the client starts. Not ideal, but better than nothing.

          W 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @wesleylc1
            last edited by

            @wesleylc1 said in How to distribute connections between two wan-ip interfaces:

            "one script-solution-for-all-needs".

            Ad @dotdash above : use a OpenVPN settings file for each the WAN connections. Use 2 separate OpenVPN servers processes.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            dotdashD W 2 Replies Last reply Reply Quote 0
            • dotdashD
              dotdash @Gertjan
              last edited by

              @Gertjan said in [How to distribute connections between two wan-ip interfaces]

              Ad @dotdash above : use a OpenVPN settings file for each the WAN connections. Use 2 separate OpenVPN servers processes.

              I would actually advise him to follow the 'port forward method' of multi-WAN described in the book. Perhaps if the loads were very high, it might make sense to have separate processes. I've never heard of binding to all interfaces before this thread, and it seems a bit sloppy...
              https://docs.netgate.com/pfsense/en/latest/book/openvpn/openvpn-and-multi-wan.html

              W 1 Reply Last reply Reply Quote 0
              • W
                wesleylc1 Rebel Alliance @dotdash
                last edited by

                @dotdash
                I don't know if I understood your answer very well.
                But I'm already using the advanced configuration options with a list of URLs (vpn.company.com.br / vpn2.company.com.br), but, by default, I always connect to (vpn.company.com.br) that way connections are never balanced.

                1 Reply Last reply Reply Quote 0
                • W
                  wesleylc1 Rebel Alliance @Gertjan
                  last edited by

                  @Gertjan
                  I think I understand your suggestion, because of COVID-19, I already have many clients connected remotely to the office and I believe that if I use this configuration option with 2 OpenVPN servers, these clients may have connection problems.

                  1 Reply Last reply Reply Quote 0
                  • dotdashD
                    dotdash
                    last edited by

                    I thought I was clear, but I'll be more specific-
                    Add the line
                    remote-random
                    to the client openvpn config file.
                    This can be included in the installer by adding it to the advanced configuration options on the client export page.

                    W 2 Replies Last reply Reply Quote 0
                    • W
                      wesleylc1 Rebel Alliance @dotdash
                      last edited by

                      @dotdash
                      My problem is not in the CPU usage of my server, this load is very low, despite having 40 clients connected simultaneously to the OpenVPN server. I believe that this port forwarding solution should be an option.

                      last pid: 77788;  load averages:  0.18,  0.11,  0.11                                                                                            up 70+15:28:24  11:26:10
                      77 processes:  1 running, 68 sleeping, 8 zombie
                      CPU:  0.5% user,  0.0% nice,  0.5% system,  0.1% interrupt, 98.9% idle
                      Mem: 64M Active, 204M Inact, 678M Wired, 176K Buf, 2984M Free
                      ARC: 217M Total, 42M MFU, 165M MRU, 331K Anon, 1059K Header, 9024K Other
                           96M Compressed, 204M Uncompressed, 2.14:1 Ratio
                      Swap: 2048M Total, 2048M Free
                      
                        PID USERNAME    THR PRI NICE   SIZE    RES STATE   C   TIME    WCPU COMMAND
                      30696 root          1  20    0 16356K 13684K select  1  16:17   2.02% openvpn
                      52568 root          1  21    0 97764K 36552K accept  1   0:28   0.60% php-fpm
                        425 root          1  20    0 99812K 38836K accept  2   0:35   0.31% php-fpm
                      99249 www           1  20    0 20692K 15620K kqread  1   2:09   0.16% haproxy
                      58210 root          1  20    0  6404K  2632K select  3 113:32   0.14% syslogd
                      
                      
                      1 Reply Last reply Reply Quote 0
                      • W
                        wesleylc1 Rebel Alliance @dotdash
                        last edited by

                        @dotdash
                        As shown in the image below?
                        2020_04_01_11_34_14_prjgwsp.intranet.projectus.com.br_OpenVPN_Client_Export_Utility.png

                        1 Reply Last reply Reply Quote 0
                        • dotdashD
                          dotdash
                          last edited by

                          Yes, that looks correct.

                          W 1 Reply Last reply Reply Quote 0
                          • W
                            wesleylc1 Rebel Alliance @dotdash
                            last edited by

                            @dotdash said in How to distribute connections between two wan-ip interfaces:

                            Yes, that looks correct.

                            My doubts are ..
                            After using this parameter, it is necessary to update the config.OVPN of all clients that are already configured on their computers.

                            What if, after using this parameter, load balancing is done between the wan1-ip / wan2-ip interfaces, which listen to the URLs (vpn.company.com.br / vpn2.company.com.br)?

                            dotdashD 1 Reply Last reply Reply Quote 0
                            • RicoR
                              Rico LAYER 8 Rebel Alliance
                              last edited by

                              Hmm I never tried with (Open)VPN and maybe it's kind of shoddy....you could also round robin your DNS (target IPs).

                              -Rico

                              W 1 Reply Last reply Reply Quote 0
                              • dotdashD
                                dotdash @wesleylc1
                                last edited by dotdash

                                @wesleylc1 said in How to distribute connections between two wan-ip interfaces:

                                My doubts are ..
                                After using this parameter, it is necessary to update the config.OVPN of all clients that are already configured on their computers.

                                Yes, for existing clients, you would need to edit the ovpn config, or re-import the config.

                                What if, after using this parameter, load balancing is done between the wan1-ip / wan2-ip interfaces, which listen to the URLs (vpn.company.com.br / vpn2.company.com.br)?

                                My understanding of this setting is that it is only client-specific. When the client starts, it randomizes the order of the servers in the config. In theory, half your clients will pick vpn2 as their first choice. Once a particular client has started, it will continue to prefer the same server until they exit the OpenVPN client and re-load it.

                                1 Reply Last reply Reply Quote 0
                                • W
                                  wesleylc1 Rebel Alliance @dotdash
                                  last edited by

                                  @dotdash
                                  How to validate if the customer connected to "vpn2.company.com.br", after including the parameter in .config.OVPN?

                                  dotdashD 1 Reply Last reply Reply Quote 0
                                  • dotdashD
                                    dotdash @wesleylc1
                                    last edited by

                                    @wesleylc1
                                    If you are running a single openvpn server, I think you would need to check the state table to see which connection clients came in on.

                                    W 1 Reply Last reply Reply Quote 0
                                    • W
                                      wesleylc1 Rebel Alliance @dotdash
                                      last edited by

                                      @dotdash
                                      According to the image, this client connected to WAN2-IP, after including "remote-random" in config.OVPN.
                                      But is it possible to validate clients by accessing the two WAN interfaces in a balanced way?

                                      Captura de tela de 2020-04-01 19-12-01.png

                                      W 1 Reply Last reply Reply Quote 0
                                      • W
                                        wesleylc1 Rebel Alliance @wesleylc1
                                        last edited by

                                        @wesleylc1 said in How to distribute connections between two wan-ip interfaces:

                                        @dotdash
                                        According to the image, this client connected to WAN2-IP, after including "remote-random" in config.OVPN.
                                        But is it possible to validate clients by accessing the two WAN interfaces in a balanced way?

                                        Captura de tela de 2020-04-01 19-12-01.png

                                        According to this other image, it is possible to identify that the same client made a connection using WAN1-ip, aleratorically, but during this connection there were few clients connected, compared to the moment of the first image.

                                        Captura de tela de 2020-04-01 21-52-51.png

                                        1 Reply Last reply Reply Quote 0
                                        • dotdashD
                                          dotdash
                                          last edited by

                                          The remote-random option only randomizes the server order on the client side. It is never going to work in any sort of balanced or intelligent way. You could look at a front end load balancer, but that is beyond the scope of this topic, or this forum.

                                          W 1 Reply Last reply Reply Quote 0
                                          • W
                                            wesleylc1 Rebel Alliance @dotdash
                                            last edited by

                                            @dotdash
                                            I understand that, at this point, it may be a random solution, but I want a solution that works intelligently as a load balancer between the two WAN interfaces. Do you think a new topic should be opened for that matter?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.