Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    J1900 dual wan performace

    Scheduled Pinned Locked Moved Hardware
    17 Posts 2 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 4
      4o4rh @4o4rh
      last edited by 4o4rh

      @stephenw10 silly me..... I had only speedtest.net bypass the vpn.
      So the servers being selected was occurring over the vpn.

      Once I added those to the bypass alias, I am now recording the full bandwidth of 100Mbps with balancing.

      But I still come back to my original question to you Steve,
      How would you optimize to get the best through put based on below.

      local provider (100Mbps fibre) PPPoE to Fritzbox, 1Gbps to pfsense - weight 2
      91Mbps down / 46Mbps up
      RTT 3.5ms RTTsd 1.4ms monitor 1.1.1.1
      
      vodafone (120Mbps coax) modem to pfsense 1 Gbps  - weight 1
      126Mbps down / 6Mps up
      RTT 34.4ms RTTsd 1.3ms monitor 1.1.1.2
      

      Do you consider 30% in throughput with expressvpn above normal?
      Obviously I expect some reduction.
      p.s. why don't i see the total of the balanced connection. i seem to only see the bandwidth of one connection at any given time

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        The speedtest.net client is usually pretty good at testing a balanced connection, especially at relatively low speeds like this. I would expect it to show close to the full speed from both WANs combined if you're really routing that client correctly.

        Policy routing by destination as an FQDN is never going to work correctly for something like speedtest.net that could resolve to thousands of IPs. You need to route by the source IP of your test host to see that.

        OpenVPN will open one connection on one WAN, all traffic will go over it.
        If you want to use both WANs you need to define 2 OpenVPN clients, one on each WAN, and then policy route to those as a group.

        Steve

        4 1 Reply Last reply Reply Quote 0
        • 4
          4o4rh @stephenw10
          last edited by

          @stephenw10 I have
          WAN1 Tier 1
          WAN2 Tier 1 GW-WAN

          VPN1 Tier1 GW-VPN
          VPN2 Tier2

          Both VPNs have GW-WAN as their interface.
          Are you saying this is wrong?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Yes, you should put each VPN client on a specific gateway otherwise they may easily end up using the same WAN. There is only ever one connection from each VPN client so they cannot load-balance each tunnel.

            Steve

            4 1 Reply Last reply Reply Quote 0
            • 4
              4o4rh @stephenw10
              last edited by

              @stephenw10 but i am using two ExpressVPN access points in a failover. Are you saying the issue is with using openvpn with such a failover, or with openvpn using the wan with loadbalancing. Sorry dude, treat me like a baby.

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                We can't see which interfaces or gateway groups the VPN clients themselves are using.

                However since you look to be running the two VPN clients in a failover group only one will be carrying any traffic. And since that one client is a single connection it can only ever use one WAN at a time.

                If you want to get the highest VPN throughput you need the two VPN clients in a load-balance gateway. And you need the clients themselves to be set to a specific, WAN gateway so both are used.

                Steve

                4 1 Reply Last reply Reply Quote 0
                • 4
                  4o4rh @stephenw10
                  last edited by 4o4rh

                  @stephenw10 so i reconfig'd to

                  default router -> WAN1_Failover
                  (was load balanced - I read this was not a valid config, next time I should RTFM)
                  VPN1 -> WAN1_failover
                  VPN2 -> WAN2_failover

                  VPN_GW -> VPN1 T1, VPN2 T2

                  But the bottom line is, VPN_GW doesn't really do me any good then, because I don't get to maximize bandwidth. I am better to assign the profile routing to VPN1 or 2 depending on whether the service is more upload or download hungry to utilize the two wan connections the best.

                  Thanks. I think my knowledge has increased from catastrophic, to only dangerous

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    To use both VPN tunnels you need to set the VPN_GW group as load-balance, both VPNs as the same tier. Right now it's failover so clients routed to it will only use one tunnel, even if there are a lot of clients and a lot of connections.

                    Steve

                    4 1 Reply Last reply Reply Quote 0
                    • 4
                      4o4rh @stephenw10
                      last edited by

                      @stephenw10 last time i tried that, expressvpn didn't seem to like going through two different access points at the same time. I will try again and if still an issue, probably get a backup vpn provider

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Mmm, they have to allow you connect with two clients at the same time. I have no idea if they do. I know some providers allow that.

                        4 1 Reply Last reply Reply Quote 0
                        • 4
                          4o4rh @stephenw10
                          last edited by

                          @stephenw10 the problem is not getting two connections, that I have as a hot failover.

                          If i set the VPN GW services in load balancing, i start to get the below errors.

                          There were error(s) loading the rules: /tmp/rules.debug:534: sticky-address cannot be redefined - The line in question reads [534]: pass in quick on $VLAN_27_MEDIA $GWGW_GRP_WAN inet proto { tcp udp } from any to ! $LAN_LOCAL_ALL port $PORTS_WAN_GAMING tracker 1572529018 keep state label "USER_RULE: Pass WAN_PSN Ports"

                          The error goes away if I revert to failover. I did ask once, and they said it is not supported to have the two connections in load balance. Although they let you have 5 connections in total.

                          I get a 30% performance hit with them anyway, so I am thinking to try protonvpn anyhow.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            That's a pfSense error though, nothing to do with ExpressVPN. If you are NATing out of those VPN gateways ExpressVPN wouldn't have idea you were load-balancing anyway.

                            What is GW_GRP_WAN?

                            It looks like that traffic would be not via the VPN no?

                            Steve

                            4 1 Reply Last reply Reply Quote 0
                            • 4
                              4o4rh @stephenw10
                              last edited by

                              @stephenw10 that was WAN_loadBalance. I changed it to the VPN_loadbalance and error is gone and vpn loadbalance appears to to be working.

                              so i have
                              VPN_Balance / VPN1_failover -> WAN1_Failover
                              \ VPN2_failover -> WAN2_Failover

                              WAN_Balance / WAN1_failover
                              \ WAN2_failover

                              default_route -> WAN1_failover

                              all seems to be working now.

                              Thanks for all the help

                              1 Reply Last reply Reply Quote 1
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Ok, great, that's what I would expect to need there.

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.