Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Poor performace with Openvpn

    Scheduled Pinned Locked Moved OpenVPN
    29 Posts 4 Posters 2.9k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • RicoR Offline
      Rico LAYER 8 Rebel Alliance
      last edited by

      For testing...could you set the Encryption Algorithm to None? Just to rule this out...

      -Rico

      T 1 Reply Last reply Reply Quote 0
      • T Offline
        trumee @Rico
        last edited by trumee

        @Rico I am using 'cipher AES-256-CBC', 'auth SHA256' and ncp-ciphers 'AES-256-GCM:AES-128-GCM'. The server side VPN config is the following and the client side config is posted above.

        $less /var/etc/openvpn/server1.conf
        dev ovpns1
        verb 1
        dev-type tun
        dev-node /dev/tun1
        writepid /var/run/openvpn_server1.pid
        #user nobody
        #group nobody
        script-security 3
        daemon
        keepalive 10 60
        ping-timer-rem
        persist-tun
        persist-key
        proto udp4
        cipher AES-256-CBC
        auth SHA256
        up /usr/local/sbin/ovpn-linkup
        down /usr/local/sbin/ovpn-linkdown
        local 127.0.0.1
        tls-server
        server 10.8.9.0 255.255.255.0
        client-config-dir /var/etc/openvpn-csc/server1
        ifconfig 10.8.9.1 10.8.9.2
        tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'VoipVPNServer' 1"
        lport 1194
        management /var/etc/openvpn/server1.sock unix
        route 192.168.0.0 255.255.255.0
        route 192.168.1.0 255.255.255.0
        route 192.168.2.0 255.255.255.0
        route 192.168.5.0 255.255.255.0
        route 192.168.6.0 255.255.255.0
        route 192.168.10.0 255.255.255.0
        route 192.168.18.0 255.255.255.0
        route 192.168.40.0 255.255.255.0
        route 192.168.50.0 255.255.255.0
        ca /var/etc/openvpn/server1.ca 
        cert /var/etc/openvpn/server1.cert 
        key /var/etc/openvpn/server1.key 
        dh /etc/dh-parameters.2048
        crl-verify /var/etc/openvpn/server1.crl-verify 
        tls-auth /var/etc/openvpn/server1.tls-auth 0
        ncp-ciphers AES-256-GCM:AES-128-GCM
        compress lz4-v2
        persist-remote-ip
        float
        topology subnet
        
        1 Reply Last reply Reply Quote 0
        • T Offline
          trumee @Rico
          last edited by

          @Rico said in Poor performace with Openvpn:

          For testing...could you set the Encryption Algorithm to None? Just to rule this out...

          -Rico

          There is no change to the result,

          $ iperf3 -c 192.168.1.111 -R
          Connecting to host 192.168.1.111, port 5201
          Reverse mode, remote host 192.168.1.111 is sending
          [  5] local 172.16.9.21 port 33962 connected to 192.168.1.111 port 5201
          [ ID] Interval           Transfer     Bitrate
          [  5]   0.00-1.00   sec  1.21 MBytes  10.2 Mbits/sec                  
          [  5]   1.00-2.00   sec  1.61 MBytes  13.5 Mbits/sec                  
          [  5]   2.00-3.00   sec   905 KBytes  7.41 Mbits/sec                  
          [  5]   3.00-4.00   sec  1.01 MBytes  8.48 Mbits/sec                  
          [  5]   4.00-5.00   sec   538 KBytes  4.41 Mbits/sec                  
          [  5]   5.00-6.00   sec   753 KBytes  6.17 Mbits/sec                  
          [  5]   6.00-7.00   sec   987 KBytes  8.09 Mbits/sec                  
          [  5]   7.00-8.00   sec  1.18 MBytes  9.88 Mbits/sec                  
          [  5]   8.00-9.00   sec  1.43 MBytes  12.0 Mbits/sec                  
          [  5]   9.00-10.00  sec  1.65 MBytes  13.9 Mbits/sec                  
          - - - - - - - - - - - - - - - - - - - - - - - - -
          [ ID] Interval           Transfer     Bitrate         Retr
          [  5]   0.00-10.05  sec  11.6 MBytes  9.67 Mbits/sec  150             sender
          [  5]   0.00-10.00  sec  11.2 MBytes  9.40 Mbits/sec                  receiver
          
          iperf Done.
          
          1 Reply Last reply Reply Quote 0
          • stephenw10S Offline
            stephenw10 Netgate Administrator
            last edited by

            Did you disable NCP? Otherwise it will still be negotiating those.

            But as I said this looks like some sort of mtu/fragmenting issue. Run a packet capture and see what's happening.

            Steve

            T 1 Reply Last reply Reply Quote 0
            • T Offline
              trumee @stephenw10
              last edited by

              @stephenw10 said in Poor performace with Openvpn:

              Did you disable NCP? Otherwise it will still be negotiating those.

              But as I said this looks like some sort of mtu/fragmenting issue. Run a packet capture and see what's happening.

              Steve

              I have done packet capture. What should i be looking for in wireshark?

              1 Reply Last reply Reply Quote 0
              • stephenw10S Offline
                stephenw10 Netgate Administrator
                last edited by

                Fragmented packets is the first thing I would be looking for. Then what size the large fragments are.

                Otherwise check the initial TCP transactions for the window size etc. Do you see retranmissions or missing packet errors.

                Steve

                T 1 Reply Last reply Reply Quote 0
                • T Offline
                  trumee @stephenw10
                  last edited by

                  @stephenw10 said in Poor performace with Openvpn:

                  Fragmented packets is the first thing I would be looking for. Then what size the large fragments are.

                  Otherwise check the initial TCP transactions for the window size etc. Do you see retranmissions or missing packet errors.

                  Steve

                  I captured VPN interface and opened the capture in wireshark. I dont see any fragmented packet in the Info column.

                  • Should I capture the WAN interface instead of the VPN interface?
                  • Is there any wireshark tutorial which shows how to identify whether fragmentation is occuring?
                  1 Reply Last reply Reply Quote 0
                  • stephenw10S Offline
                    stephenw10 Netgate Administrator
                    last edited by

                    I'm not aware of any specific tutorial for that, there are many though.

                    Packet fragmentation is not difficult to spot though even just from the pfSense interface.

                    11:54:54.373954 IP 172.21.16.35 > 172.21.16.5: ICMP echo request, id 39018, seq 0, length 1480
                    11:54:54.373963 IP 172.21.16.35 > 172.21.16.5: ip-proto-1
                    11:54:55.374734 IP 172.21.16.35 > 172.21.16.5: ICMP echo request, id 39018, seq 1, length 1480
                    11:54:55.374743 IP 172.21.16.35 > 172.21.16.5: ip-proto-1
                    11:54:56.375739 IP 172.21.16.35 > 172.21.16.5: ICMP echo request, id 39018, seq 2, length 1480
                    11:54:56.375749 IP 172.21.16.35 > 172.21.16.5: ip-proto-1
                    

                    Pinging size 2000 byte packets, each full size packet is followed by a fragment to make up the full packet.

                    In that particular case there is a switch I have that doesn't pass packet fragments. 🙄

                    Try looking at the OpenVPN traffic on the WAN also. If that is fragmented it will kill performance.

                    Steve

                    T 1 Reply Last reply Reply Quote 0
                    • T Offline
                      trumee @stephenw10
                      last edited by

                      For comparison sake i setup wireguard between the two networks. Wireguard starts with an MTU of 1420, and it reaches almost the line-speed in both forward and reverse directions.

                      # wg-quick up wg0  
                      [#] ip link add wg0 type wireguard
                      [#] wg setconf wg0 /dev/fd/63
                      [#] ip -4 address add 10.0.0.2/32 dev wg0
                      [#] ip link set mtu 1420 up dev wg0
                      [#] ip -4 route add 10.0.0.0/24 dev wg0
                      
                      root@wireguard:/etc/wireguard# iperf3 -c 10.0.0.1 
                      Connecting to host 10.0.0.1, port 5201
                      [  4] local 10.0.0.2 port 34842 connected to 10.0.0.1 port 5201
                      [ ID] Interval           Transfer     Bandwidth       Retr  Cwnd
                      [  4]   0.00-1.00   sec  14.8 MBytes   124 Mbits/sec    0   1.74 MBytes       
                      [  4]   1.00-2.00   sec  16.8 MBytes   141 Mbits/sec    0   2.58 MBytes       
                      [  4]   2.00-3.00   sec  17.0 MBytes   142 Mbits/sec    3   2.96 MBytes       
                      [  4]   3.00-4.00   sec  16.0 MBytes   134 Mbits/sec    1   2.07 MBytes       
                      [  4]   4.00-5.00   sec  16.7 MBytes   140 Mbits/sec    1   1.52 MBytes       
                      [  4]   5.00-6.00   sec  17.0 MBytes   142 Mbits/sec    0   1.62 MBytes       
                      [  4]   6.00-7.00   sec  16.9 MBytes   142 Mbits/sec    0   1.70 MBytes       
                      [  4]   7.00-8.00   sec  16.8 MBytes   141 Mbits/sec    0   1.75 MBytes       
                      [  4]   8.00-9.00   sec  16.9 MBytes   142 Mbits/sec    0   1.79 MBytes       
                      [  4]   9.00-10.00  sec  17.0 MBytes   142 Mbits/sec    2    920 KBytes       
                      - - - - - - - - - - - - - - - - - - - - - - - - -
                      [ ID] Interval           Transfer     Bandwidth       Retr
                      [  4]   0.00-10.00  sec   166 MBytes   139 Mbits/sec    7             sender
                      [  4]   0.00-10.00  sec   163 MBytes   137 Mbits/sec                  receiver
                      
                      iperf Done.
                      root@wireguard:/etc/wireguard# iperf3 -c 10.0.0.1 -R
                      Connecting to host 10.0.0.1, port 5201
                      Reverse mode, remote host 10.0.0.1 is sending
                      [  4] local 10.0.0.2 port 35042 connected to 10.0.0.1 port 5201
                      [ ID] Interval           Transfer     Bandwidth
                      [  4]   0.00-1.00   sec  13.0 MBytes   109 Mbits/sec                  
                      [  4]   1.00-2.00   sec  16.9 MBytes   141 Mbits/sec                  
                      [  4]   2.00-3.00   sec  16.9 MBytes   142 Mbits/sec                  
                      [  4]   3.00-4.00   sec  16.9 MBytes   142 Mbits/sec                  
                      [  4]   4.00-5.00   sec  16.9 MBytes   142 Mbits/sec                  
                      [  4]   5.00-6.00   sec  16.9 MBytes   142 Mbits/sec                  
                      [  4]   6.00-7.00   sec  16.9 MBytes   142 Mbits/sec                  
                      [  4]   7.00-8.00   sec  16.9 MBytes   141 Mbits/sec                  
                      [  4]   8.00-9.00   sec  16.9 MBytes   142 Mbits/sec                  
                      [  4]   9.00-10.00  sec  16.9 MBytes   142 Mbits/sec                  
                      - - - - - - - - - - - - - - - - - - - - - - - - -
                      [ ID] Interval           Transfer     Bandwidth       Retr
                      [  4]   0.00-10.00  sec   168 MBytes   141 Mbits/sec    3             sender
                      [  4]   0.00-10.00  sec   168 MBytes   141 Mbits/sec                  receiver
                      
                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.