[:O]
I tried everything, and I decide to switch to Cisco VPN Ipsec\UDM and is looks like much better , i get in download speed 15-18 on line 25 .
Im in Manitoba and line from MTS to Shaw is sucks, from Shaw to Shaw all perfect.Some internet providers try decrypt traffic ....
config openvpn 'VPNserver'
option enabled '1'
# --- Protocol ---#
option dev 'tun'
option dev 'tun0'
option topology 'subnet'
option proto 'udp'
option port '1194'
#--- Routes ---#
option server '10.1.1.0 255.255.255.0'
#--- Client Config ---#
# option ccd_exclusive '1'
# option ifconfig_pool_persist '/etc/openvpn/clients/ipp.txt'
# option client_config_dir '/etc/openvpn/clients/'
option ifconfig '10.1.1.1 255.255.255.0'
#--- Pushed Routes ---#
list push 'route 192.168.1.0 255.255.255.0'
list push 'dhcp-option DNS 192.168.1.1'
list push 'dhcp-option WINS 192.168.1.1'
list push 'dhcp-option DNS 8.8.8.8'
list push 'dhcp-option DNS 8.8.4.4'
list push 'dhcp-option NTP 129.6.15.30'
#--- Encryption ---#
option cipher 'AES-256-CBC'
option dh '/etc/openvpn/keys/dh2048.pem'
option pkcs12 '/etc/openvpn/keys/my-server.p12'
option tls_auth '/etc/openvpn/keys/ta.key 0'
#--- Logging ---#
option log '/tmp/openvpn.log'
option status '/tmp/openvpn-status.log'
option verb '7'
#--- Connection Options ---#
option keepalive '10 120'
option comp_lzo 'yes'
#--- Connection Reliability ---#
option client_to_client '1'
option persist_key '1'
option persist_tun '1'
#--- Connection Speed ---#
option sndbuf '393216'
option rcvbuf '393216'
option fragment '0'
option mssfix '0'
option tun_mtu '48000'
#--- Pushed Buffers ---#
list push 'sndbuf 393216'
list push 'rcvbuf 393216'
#--- Permissions ---#
option user 'nobody'
option group 'nogroup'
client
dev tun
tun-mtu 48000
fragment 0
mssfix 0
proto udp
remote your.ddns.com 1194
float
resolv-retry infinite
nobind
persist-key
persist-tun
pkcs12 OpenWRT-VPNclient1.p12
key-direction 1
-----BEGIN OpenVPN Static key V1-----
#---PASTE KEY HERE---#
-----END OpenVPN Static key V1-----
remote-cert-tls server
cipher AES-256-CBC
auth-nocache
verb 5
comp-lzo
client
dev tun
tun-mtu 48000
fragment 0
mssfix 0
proto udp
remote your.ddns.com 1194
float
nobind
persist-key
persist-tun
key-direction 1
-----BEGIN OpenVPN Static key V1-----
#---PASTE KEY HERE---#
-----END OpenVPN Static key V1-----
remote-cert-tls server
cipher AES-256-CBC
auth-nocache
verb 5
comp-lzo
We have the same exact problem with a SG230, the SSL VPN seems limitted to 10Mbps even though we have 300/100Mbps in the remote site where the firewall is and 100/10 in the office.
The current configuration is UDP, no compression, SHA2 256, Key size 2048 bit, AES-256-CBC. We have tried TCP and other combinations with the algorithms with no luck. IPS and flood protections are disabled.
Jon, what result do you get withSHA1, 1024 and AES-128-CBC? Watch the Intrusion Prevention Live Log when you try.
Cheers - Bob
Actually, it was the other things in that log that might be of interest. Snort rarely causes these issues, but Anti-DoS Flooding can.
Cheers - Bob