Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Instability and High Resource Usage on pfSense 24.11 with OpenVPN + OSPF (Site-to-Site Failover)

    Scheduled Pinned Locked Moved OpenVPN
    3 Posts 2 Posters 95 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • V
      vincenzo974
      last edited by vincenzo974

      Hi all,

      we're running a site-to-site setup between two locations (Rome and Perugia) using OpenVPN tunnels in Peer to Peer (SSL/TLS) mode. We're also using FRR/OSPF to dynamically manage routing and enable failover between two tunnels (each with different cost).

      After updating the pfSense firewall in Rome to 24.11, we started experiencing the following issues:
      🔴 Problems observed:

      High resource usage (CPU/RAM) on the pfSense in Rome when both tunnels are active
      
      OSPF becomes unstable or slow to switch routes when one tunnel degrades
      
      OpenVPN clients reconnect frequently or delay during transitions
      
      We've seen intermittent "No route to host" errors in logs
      
      Crash reports in /vpn_openvpn_client.php and /vpn_wg_settings.php (after trying to test WireGuard as alternative)
      

      🧪 What we’ve done:

      Verified all OpenVPN and FRR configurations
      
      Ran multiple tests (ICMP, MTR, speedtest-cli) from both locations
      
      Confirmed that the issue appears mostly on the Rome firewall, particularly when the tunnel over Fastweb MPLS is active
      
      Switched tunnel priority via OSPF cost — the one with Fastweb always results in latency and routing instability
      
      Tried to configure WireGuard, but ran into PHP crash (possibly due to WireGuard package instability on 24.11)
      

      💡 Setup summary:

      pfSense Plus 24.11 on both ends (Rome and Perugia)
      
      OpenVPN clients on Perugia, OpenVPN server on Rome
      
      2 tunnels: one over internet connection (Meshcom), one over Fastweb MPLS
      
      OSPF for routing and automatic failover
      
      Manual outbound NAT, rules per tunnel, static port enabled
      

      ❓Questions:

      Is anyone else experiencing resource or routing issues after the 24.11 upgrade using OpenVPN + OSPF?
      
      Is there a known issue with OpenVPN tunnel handling in 24.11?
      
      Should we avoid using FRR + OpenVPN on this release? Would switching to WireGuard improve stability?
      

      We’d be grateful for suggestions or similar experiences. I can also provide logs, configs, or test outputs if needed.

      Thanks in advance!

      Vincenzo

      1 Reply Last reply Reply Quote 0
      • L
        luca.pietroni
        last edited by

        Hi all,

        I’ve read through the thread and wanted to add some clarification based on the on-site intervention I handled yesterday at the Perugia office.

        In my opinion — and based on the tests I performed — the issue is not related to OSPF or dynamic routing, which is working consistently according to the current configuration.

        The real bottleneck appears to be entirely due to the performance of the two OpenVPN tunnels connecting to Rome. During troubleshooting, I compared the actual throughput over:

        MPLS and Meshcom (fiber) connections → both showed high and stable bandwidth

        versus the OpenVPN tunnels, where I observed significantly reduced performance (about 1/10th of the available bandwidth) and noticeable instability

        In particular:

        there’s high latency and significant jitter

        on-site operators confirmed serious issues with VoIP audio, with stuttering and delays — classic symptoms of tunnel congestion

        To restore connectivity, I implemented a temporary workaround with a single tunnel using a different protocol, which is currently stable, although not redundant.

        I’m happy to discuss or run further tests if needed, but based on all observed data, the issue points clearly to degraded OpenVPN throughput, not OSPF behavior or routing logic.

        Best regards,
        Luca

        1 Reply Last reply Reply Quote 0
        • L
          luca.pietroni
          last edited by

          For reference, the site-to-site environment we had set up between the two locations was based on this official Netgate configuration:
          👉 [OpenVPN + OSPF Site-to-Site Setup]

          This is the exact topology and integration model that was implemented, that worked flawlessly until the upgrade to 24.11, which further supports the conclusion that the issue lies with the OpenVPN tunnel performance rather than OSPF itself.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.