Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Site to site OpenVPN slow performance (2.7.2 CE)

    Scheduled Pinned Locked Moved OpenVPN
    14 Posts 2 Posters 739 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @snewby
      last edited by michmoor

      @snewby said in Site to site OpenVPN slow performance (2.7.2 CE):

      We are using OpenVPN site to site tunnel so I don't think MSS clamping applies? Correct me if I'm wrong but that seems to be for IPsec tunnels

      It applies to OVPN as well.

      Do not run iperf on the firewalls.

      You need to start digging into what the best MTU would be for a given situation.

      ping x.x.x.x -f -l 1472 if you start getting messages that DF is set, reduce the mtu value.
      ping x.x.x.x -f -l 1440 and so on...

      Once you figure out the MTU you can determine the optimal MSS value. Take the result of the above test which lets say is 1400 Bytes. Subtract the TCP and IP header value. 1400 - (IP header 20 bytes +tcp header 20 bytes) = 1360 bytes which is the optimal MSS.

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      S 1 Reply Last reply Reply Quote 0
      • S
        snewby @michmoor
        last edited by

        @michmoor I just ran the test and it does look like there is an issue. Default MTU on pfense is 1500. It seems okay when I lower to 1472. Do I change that value on firewall WAN interface, WAN or both? Also if I change it does that normally cause the network connection to drop? And to be clear for MSS value I would just do 1472 - 40 = 1,432?

        949feee5-7ed6-4ea6-811a-f0d69a03de6a-image.png

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @snewby
          last edited by

          @snewby Turn on MSS Clamping and try a value of 1400 to start and restest again.

          How to enable MSS clamping i provided the link above.

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          S 1 Reply Last reply Reply Quote 0
          • S
            snewby @michmoor
            last edited by

            @michmoor which interface do I enable that on? I'm guessing WAN connection? Also I guess I need to lower MTU value there to 1472. Lastly do you know if changing that setting would cause a network drop?

            3b906a4a-c39c-485e-bb3a-528a70aa30e8-image.png

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @snewby
              last edited by

              @snewby
              not there.

              https://docs.netgate.com/pfsense/en/latest/config/advanced-firewall-nat.html#mss-clamping

              System > Advanced > Firewall & NAT > VPN Packet Processing > Maximum MSS

              A value of 1400 should be good enough.

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              S 1 Reply Last reply Reply Quote 1
              • S
                snewby @michmoor
                last edited by

                @michmoor okay so I don't touch MTU settings on interfaces at all and just change this on both firewalls? In the future I may be implementing a wireguard VPN which this setting does not seem to apply to.

                f093d319-c899-44ca-a146-e80b22297285-image.png

                S 1 Reply Last reply Reply Quote 0
                • S
                  snewby @snewby
                  last edited by

                  @michmoor I changed Maximum MSS on both firewalls to 1400 as you suggested. I then restarted the VPN tunnel. Now when I run pings the speed has improved (about doubled) but it's still nowhere close to the line speed of almost 1Gbps. Yes, I know VPN adds some overhead, but it shouldn't be this much right? I would think I'd at least get 500 Mbits/sec. As I comparison I ran a ping to a server on the LAN. The internet speed at both sites is 1Gbps fiber. I included a speedtest from the remote site where you can see it is in the 900+ Mbps. Where else might there be a bottleneck? Do I need to change MTU value on the actual interface? I don't think it's a hardware bottleneck as both routers have powerful processors.

                  6650e0e2-ffdd-4c29-a3d0-4e69cc103c6e-image.png

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @snewby
                    last edited by

                    @snewby it’s possibly you are at a hardware bottleneck. Can you give a bit more details about your hardware?

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    S 1 Reply Last reply Reply Quote 0
                    • S
                      snewby @michmoor
                      last edited by

                      @michmoor

                      Site A (corporate office):

                      270bddc6-e5a9-48c4-bb41-c66271887fe4-image.png

                      Site B (branch office):

                      80b871e7-30d9-489a-8e44-a0b2c74cd20d-image.png

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @snewby
                        last edited by

                        @snewby review the following from documentation
                        Short of changing MSS, Options to scale ovpn are quite limited

                        https://docs.netgate.com/pfsense/en/latest/vpn/performance.html#scaling-openvpn

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.