Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSEC speed issue - 2 Netgate Fws 7100 and 5100

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    8 Posts 3 Posters 955 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      aaronatplanet
      last edited by

      Hello All,

      Im configuring for the first time 2 Netgate fws for IPSEC. A 7100 in a customer office, and a 5100 in a remote office. According to specs on Netgates site, using AES-GCM-128 w/QAT, I should be able to get 500ish Mbps across the tunnel. Ive verified switch speed tests that non-vpn traffic cant exceed 800m in both locations, however with the tunnel established, I only seem to be able to get maybe 85m. Im not aiming for the full 500m, but id like to realistically do 200-300. I verified the hardware encryption is enabled on both sides, but I still dont seem to see any improvement. Any pointers at what im doing wrong? Ive been strictly using the GUI, so I dont know if theres any special CLI config I need to deal with.

      Thank you.

      A 1 Reply Last reply Reply Quote 0
      • A
        aaronatplanet @aaronatplanet
        last edited by

        Guess Im the only one to have this issue?

        1 Reply Last reply Reply Quote 0
        • jimpJ jimp locked this topic on
        • jimpJ jimp unlocked this topic on
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          There shouldn't be any special CLI config but a few things to note:

          • Make sure both ends have the QAT encryption module chosen under System > Advanced, Misc tab. Though if you are using AES-GCM then using AES-NI on both is good as well.
          • Post your whole tunnel config for P1 and P2. Make sure you have only AES-GCM selected in P2 with no hash selected.
          • Make sure the packets you are pushing do not get fragmented. This may also mean enabling MSS clamping for the VPN.
          • Check how you are testing, always test through the firewall (e.g. LAN-to-LAN) and never test directly to either firewall endpoint, especially when dealing with encrypted traffic.
          • Ensure your testing methodology is comparable to the traffic you want to push. For example if you are wanting to test large file transfers, use large packets and not small frames during a test, and vice versa. A test with many small packets will have a high PPS rate and low total throughput while a test with large packets will have high throughput and lower PPS. IMIX tests will be in between, but closer to large packets.

          There is some more general advice on https://docs.netgate.com/pfsense/en/latest/vpn/performance.html

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          A 1 Reply Last reply Reply Quote 1
          • A
            aaronatplanet @jimp
            last edited by

            @jimp
            Alright, Incoming images.

            Office Side:
            P1
            Office side p1.png

            P2
            Office side p2.png

            Remote Side:
            P1
            Remoteside p1.png

            P2
            Remoteside p2.png

            I also reviewed the link you sent. And it looks like ive got those settings set as well.

            Thank you.

            1 Reply Last reply Reply Quote 0
            • jimpJ
              jimp Rebel Alliance Developer Netgate
              last edited by

              You'll want to change that PSK immediately, probably should have redacted that or omitted it from the screenshots.

              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

              Need help fast? Netgate Global Support!

              Do not Chat/PM for help!

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                Otherwise the tunnel config looks OK, so I'd focus on the other parts surrounding it -- nudging packets to be smaller via MSS, maybe try forcing NAT-T in case your ISP in one or both sides (or in between) is artificially limiting ESP traffic rates.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                A 1 Reply Last reply Reply Quote 0
                • A
                  aaronatplanet @jimp
                  last edited by

                  @jimp
                  Yip, Changing that now. Still asleep.

                  1 Reply Last reply Reply Quote 1
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Were you able to see any improvement here?

                    That's between New York and New Jersey? What latency do you see across the tunnel?

                    I would certainly expect to see more than 85Mbps provided the WAN connections at each end allow it.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.