• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Poor performance on vultr.com virtual pfSense Router as OpenVpn Server

Scheduled Pinned Locked Moved Virtualization
1 Posts 1 Posters 1.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    bnhf
    last edited by Jan 10, 2018, 11:52 PM

    I have a pfSense virtual router up-and-running on vultr.com.  I'm planning to use it to access my mobile LAN which never has a public IP.  By connecting my LAN's router running an OpenVPN client to the virtual pfSense router (which does have a public IP) running an OpenVPN server, I can port forward from the virtual router to my LAN.  All that appears to be fine.

    My issue is that the performance I'm getting is less than 10% the speed of my usual Internet connection.  5-6Mbps vs. 60-65Mbps on the download – and I actually had to do some tweaking to get there, since I started with speeds less than 1Mbps.  I followed the 2 recommendations in this link, which got me to where I am now.  I contacted vultr support and they had nothing additional to offer.

    https://discuss.vultr.com/discussion/979/freebsd-vtnet0-tuning

    Here's my redacted OpenVPN client file :

    dev tun
    persist-tun
    persist-key
    cipher AES-128-CBC
    auth SHA1
    tls-client
    client
    resolv-retry infinite
    remote [IP Removed] 1194 udp
    verify-x509-name "OpenVPN Server" name
    auth-user-pass
    remote-cert-tls server
    
     <ca>-----BEGIN CERTIFICATE-----
    [Certificate Removed]
    -----END CERTIFICATE-----</ca> 
     <cert>-----BEGIN CERTIFICATE-----
    [Certificate Removed]
    -----END CERTIFICATE-----</cert> 
     <key>-----BEGIN PRIVATE KEY-----
    [Key Removed]
    -----END PRIVATE KEY-----</key> 
     <tls-auth>#
    # 2048 bit OpenVPN static key
    #
    -----BEGIN OpenVPN Static key V1-----
    [Key Removed]
    -----END OpenVPN Static key V1-----</tls-auth> 
    key-direction 1
    
    1 Reply Last reply Reply Quote 0
    1 out of 1
    • First post
      1/1
      Last post
    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
      This community forum collects and processes your personal information.
      consent.not_received