Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Internet is slow behind pfsense

    Scheduled Pinned Locked Moved Virtualization
    36 Posts 8 Posters 13.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      doktornotor Banned
      last edited by

      @johnpoz:

      What tools?  The native tools, there has been nothing but issues with the native tools..

      Yeah, that package is totally horrible, best removed altogether from 2.2

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        Not sure where he is getting that build number for his tools, that is not a valid number.

        on pfsense with the openvpn tools install I show this

        [2.2-RELEASE][root@pfSense.local.lan]/root: vmware-toolbox-cmd -v
        9.4.0.25793 (build-1280544)

        On a linux box with the current native tools I show this
        ubuntu:~$ vmware-toolbox-cmd -v
        9.4.11.42879 (build-2400950)

        If I google that buld number for vmware tools shows as unmanaged.. not a standard build number and is just the decimal value of 0x7fffffff, so not sure where or what he has installed for tools if any to be honest.

        Other question I have is what build number of esxi 5.5 - the version of freebsd 10.1, in 2.2 is not fully supported until update 2 of esxi 5.5, build 2068190, the current build number is 2456374 which 4 patches past update 2.

        I am running 2.2 pfsense on vm on esxi with the openvm tools and it is running fantastic..  Other than the apinger showing me that my gateway is like 1.2 ms, I WISH ;) I have really not seen any issues at all.

        My connections in esxi host to the real world is like this - see attached.  So would be curious to see how he has it setup.

        My host has 4 physical nic ports connected to vswitches.  Pfsense has a nic in each vswitch, the wan physical nic is directly connected to my cable modem.  This puts a public IP on pfsense wan.  Then there is wlan and lan and dmz.  The vmkern is on its own nic not connected to pfsense just tied to the lan.  When you share port groups with vmkern and another network (lan say)  seems to slow down performance moving files to and from the datastore - since I have enough phsyical nics why not break it out, etc.

        I run a vlan on the wlan nic in pfsense for guest wireless, etc.  The lan and wlan physical nics connect to a managed switch with vlans for the lan and wlan/guestwlan segments because there a few physical devices on the wlan not just AP and controller, printer makes airprint easier when on the wireless network.  And I put my dvrs which are wired on it as well since makes it easier or ipad app to find them, etc.

        So curious how the OP setup is..  I would assume it should be something very sim to this.

        networkingesxi.png
        networkingesxi.png_thumb
        nics.png
        nics.png_thumb

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • G
          gjaltemba
          last edited by

          I am experiencing a slow down on the wan port when running pfsense 2.2 on esxi 5.5 u2 with open-vm-tools install. Everything seems normal on the lan port. I have tried replacing nic and cables but the results are the same. Cannot find the problem.

          Here are some test results running iperf client on pfsense

          –----------------------------------------------------------
          LAN side iperf server listening on TCP port 5001
          TCP window size: 85.3 KByte (default)

          [  4] local 192.168.5.22 port 5001 connected with 192.168.5.3 port 41971 (pfsense on esxi)
          [ ID] Interval      Transfer    Bandwidth
          [  4]  0.0-10.0 sec  712 MBytes  596 Mbits/sec
          [  5] local 192.168.5.22 port 5001 connected with 192.168.5.1 port 37565 (pfsense on hyperv)
          [  5]  0.0-10.3 sec  684 MBytes  559 Mbits/sec
          [  4] local 192.168.5.22 port 5001 connected with 192.168.5.2 port 51702 (pfsense on atom pc)
          [  4]  0.0-10.0 sec  442 MBytes  370 Mbits/sec

          –----------------------------------------------------------
          WAN side iperf server listening on TCP port 5001
          TCP window size: 85.3 KByte (default)

          [  4] local 192.168.1.22 port 5001 connected with 192.168.1.3 port 39355
          [ ID] Interval      Transfer    Bandwidth
          [  4]  0.0-11.2 sec  7.12 MBytes  5.32 Mbits/sec  <-?????? esxi pfsense running iperf client to wan side server
          [  5] local 192.168.1.22 port 5001 connected with 192.168.1.1 port 54856
          [  5]  0.0-10.9 sec  700 MBytes  536 Mbits/sec
          [  4] local 192.168.1.22 port 5001 connected with 192.168.1.2 port 58495
          [  4]  0.0-10.9 sec  537 MBytes  413 Mbits/sec

          1 Reply Last reply Reply Quote 0
          • J
            Jamerson
            last edited by

            Hi John,
            i've run the command on the box to detect the install vmware tools

            [2.2-RELEASE][root@firewall.pfsense.lan]/root: vmware-toolbox-cmd -v
            9.4.0.25793 (build-1280544)
            [2.2-RELEASE][root@firewall.pfsense.lan]/root: 
            

            my switch is 1Gigabit switch and all ports are 1GB
            on my ESXI 5.5 i've got 4 1GB NICS, and have all of them on one group.
            all the traffic is travelling on those 4 NICS at once over 1Gigabit switch ( HP 1810-24G v2 ).
            i have the same switch and configuration on production all seems to works fine even faster .
            i have removed the vmware tools and reinstalled them but the issue still exist .

            my ESXI 5.5 is having the latest patches.
            are you saying the pfsesne 2.2 isn't supporting the latest U2 Patches ? because my production is patched Build Number: 2456374

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              "on my ESXI 5.5 i've got 4 1GB NICS, and have all of them on one group."

              What??  That makes NO SENSE – how do you isolate between your wan and your lan on pfsense..

              So you have 1 vswitch? Please post your esxi setup like I did for vswitches and lets see this setup of your 4 nics - did you setup a lagg on your switch?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                Long time no bridge…  ::)

                1 Reply Last reply Reply Quote 0
                • J
                  Jamerson
                  last edited by

                  @johnpoz:

                  "on my ESXI 5.5 i've got 4 1GB NICS, and have all of them on one group."

                  What??  That makes NO SENSE – how do you isolate between your wan and your lan on pfsense..

                  So you have 1 vswitch? Please post your esxi setup like I did for vswitches and lets see this setup of your 4 nics - did you setup a lagg on your switch?

                  between pfsense and internet there is my ISP Modem.
                  this is a lab and the VM's are having a static iP, and the ISP Modem DHCP is off.
                  so all the traffic is going through 4 NICS ( WAN and LAN ).

                  yes using one vSwitch but all the VMS are statics.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    So your trying to run 2 networks over the same wire (wan and lan)??  Just by changing the ips..  Yeah sorry it doesn't work that way..

                    Break out a nic for you WAN, then another one for your LAN put them on 2 different vswitches.  I would also break out your vmkern..  IF you have a managed switch you can use the same switch with vlans.  But your wan connection should really just be direct to your esxi host interface..

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • J
                      Jamerson
                      last edited by

                      @johnpoz:

                      So your trying to run 2 networks over the same wire (wan and lan)??  Just by changing the ips..  Yeah sorry it doesn't work that way..

                      Break out a nic for you WAN, then another one for your LAN put them on 2 different vswitches.  I would also break out your vmkern..  IF you have a managed switch you can use the same switch with vlans.  But your wan connection should really just be direct to your esxi host interface..

                      thank John,
                      you mean 1 NIC for the WAN and Managenement of the ESXI and 3 Groups NICS for the LAN and traffic.

                      Like WAN = gonna use Vlan 2
                      and LAN= Vlan 3
                      ect.. ?

                      According to VMware NIC Teaming is the best practise for ESXI provide reduncency, speed, and increase the netwrok capacity

                      isn't John ?

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        dude this is a LAB not some mission critical production setup..  And even if it was you sure wouldn't run 4 nics all to the same vswitch for both wan and lan networks.  Was it a trunk and you were setting up vlans on pfsense?  If so you made no mention of vlans in your setup.

                        Break out your NICS  What is your internet speed again, how and the F do you think you need 3 nics to lan??  If you want to do failover then put 2 on each and sure you can share your vmkern port with your lan.  But it hurts performance to and from the datastore for moving files.  This is normally rare - but you have 4 nics to play with.

                        Doesn't really matter what vlan numbers you put on them.. They will be physically isolated I would hope - but sure if you have to run your wan through your switch it can be on a different vlan.  Pfsense doesn't really care in that sort of setup.

                        I can tell you what vmware doesn't say is try and run 2 different networks over the same freaking wire that is for damn sure..  So what mode did you have these nics in when groups?  teamed/lagged/loadbalanced/failover?  Did you lagg them on the switch?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • J
                          Jamerson
                          last edited by

                          @johnpoz:

                          dude this is a LAB not some mission critical production setup..  And even if it was you sure wouldn't run 4 nics all to the same vswitch for both wan and lan networks.  Was it a trunk and you were setting up vlans on pfsense?  If so you made no mention of vlans in your setup.

                          Break out your NICS  What is your internet speed again, how and the F do you think you need 3 nics to lan??  If you want to do failover then put 2 on each and sure you can share your vmkern port with your lan.  But it hurts performance to and from the datastore for moving files.  This is normally rare - but you have 4 nics to play with.

                          Doesn't really matter what vlan numbers you put on them.. They will be physically isolated I would hope - but sure if you have to run your wan through your switch it can be on a different vlan.  Pfsense doesn't really care in that sort of setup.

                          I can tell you what vmware doesn't say is try and run 2 different networks over the same freaking wire that is for damn sure..  So what mode did you have these nics in when groups?  teamed/lagged/loadbalanced/failover?  Did you lagg them on the switch?

                          hi John,
                          on the switch i have Two Vlans
                          Vland 1 Default and Vlan 4 for productions,

                          2 NICS for the LAN and 2 for the WAN both are Teamed " Route Based on the original VLAN ID" and both on Fail over.
                          the switch is also new not completely configured but have created 1 Extra VLAN,
                          if i break out the NICS to two different Wire , should i create a rules on pfsense to be able to communicate with the WAN VLAN too ?
                          i want to be able to manage the WAN from the LAN too.

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            Manage the wan from the lan?  What??

                            Do you understand what a firewall/router is?

                            Please draw up what you want your network to be..  Yes devices connect to your lan can access stuff on your wan.  Out of the box pfsense creates a any any rule for lan to wan (normally internet)  It also out of the box NATs this traffic to look like it came from the IP on the pfsense wan.

                            If you want to just use it as a router/firewall and not the nat, you can do that too.  The rules you allow between segments is would determines what you can "manage" ??  This term makes no sense.  Are you talking about accessing pfsense gui or ssh from the wan side?  What is it you want to "manage"

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • J
                              Jamerson
                              last edited by

                              @johnpoz:

                              Manage the wan from the lan?  What??

                              Do you understand what a firewall/router is?

                              Please draw up what you want your network to be..  Yes devices connect to your lan can access stuff on your wan.  Out of the box pfsense creates a any any rule for lan to wan (normally internet)  It also out of the box NATs this traffic to look like it came from the IP on the pfsense wan.

                              If you want to just use it as a router/firewall and not the nat, you can do that too.  The rules you allow between segments is would determines what you can "manage" ??  This term makes no sense.  Are you talking about accessing pfsense gui or ssh from the wan side?  What is it you want to "manage"

                              i want to manage the ISP Modem, Switch and other devices that are running on the WAN
                              John i love you man,
                              i have 1 NIC on the LAN and 2 NICS on the WAN ( one Group ) , i've noticed the traffic is faster, Internet pages load faster than before !
                              Thank you so much for the tip no having two Networks on one wire.
                              If i have 3 NICS " for better performance should i group two NICS on the LAN or WAN ?

                              you are the man again thank you so much.

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                Again its a router firewall, why would you not be able to access stuff on the wan segment or internet as long as you don't forbid it in the firewall of pfsense.  You access the internet right ;)

                                Not really much to "manage" on a modem if you ask me..  What you want to check your signals?  Why would your switch management interface be on the wan??  Put its management IP on the lan side..

                                As to your 2 nics on the wan?  Thought your internet speed was 4mbps or something.. WTF you need 2 gig interfaces for??  Failover ok – thought this was a lab do you really need failover redundancy in a lab?  You sure and the hell don't need the extra bandwidth ;)  you do understand 1000mbps is WAY faster than 4Mbps!!  Where are you wanting to go that you think you need a 2 Gig lan super highyway when right after you leave your driveway at 1 gig you hit a gravel road with a speed limit of 4mbps..

                                Where do you think you need this "performance"  I would leverage your interfaces for actual segments if needed.. Ie 1 for vmkern, 1 for wan, 1 for lan and last one maybe wireless segment?  Or DMZ segment, or Lan2, etc..  using it for "performance" you will never need or use is misuse.  As to failover - ok if it was production mission critical and that connection can not go done, ok..  But I don't see that in this setup..

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  1000mbps=1bps.  :P

                                  1 Reply Last reply Reply Quote 0
                                  • K
                                    kejianshi
                                    last edited by

                                    Damn thats fast…. haha

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.