Hey guys,
I have set up a IPsec site-to-site VPN with a hap ac2 and a hexs trough the internet. Everything is working quite good, but with really really low performance.
Using iperf3 i get following results:
Connecting to host 192.168.21.23, port 5201
[ 4] local 10.0.2.84 port 51820 connected to 192.168.21.23 port 5201
[ ID] Interval Transfer Bandwidth
[ 4] 0.00-1.00 sec 512 KBytes 4.19 Mbits/sec
[ 4] 1.00-2.01 sec 384 KBytes 3.13 Mbits/sec
[ 4] 2.01-3.00 sec 256 KBytes 2.11 Mbits/sec
[ 4] 3.00-4.00 sec 384 KBytes 3.13 Mbits/sec
[ 4] 4.00-5.01 sec 256 KBytes 2.09 Mbits/sec
[ 4] 5.01-6.01 sec 384 KBytes 3.16 Mbits/sec
[ 4] 6.01-7.01 sec 256 KBytes 2.10 Mbits/sec
[ 4] 7.01-8.00 sec 384 KBytes 3.16 Mbits/sec
[ 4] 8.00-9.00 sec 256 KBytes 2.10 Mbits/sec
[ 4] 9.00-10.00 sec 384 KBytes 3.15 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bandwidth
[ 4] 0.00-10.00 sec 3.38 MBytes 2.83 Mbits/sec sender
[ 4] 0.00-10.00 sec 3.17 MBytes 2.66 Mbits/sec receiver
iperf Done.
My interesting export, i reduced it to neccessary things:
# nov/08/2020 12:28:54 by RouterOS 6.47.4
# software id = FVNK-2IPL
#
# model = RBD52G-5HacD2HnD
# serial number = C6140C7A47AD
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/ip ipsec profile
set [ find default=yes ] enc-algorithm=aes-256,aes-128,3des
add dh-group=ecp256,modp2048 enc-algorithm=aes-256 hash-algorithm=sha256 \
name=profile_site-to-site
/ip ipsec peer
add address=xxx.net name=landeck profile=\
profile_site-to-site
add address=xxx.at name=vialli profile=profile_site-to-site
/ip ipsec proposal
set [ find default=yes ] auth-algorithms=sha256,sha1 enc-algorithms="aes-256-c\
bc,aes-256-gcm,aes-192-cbc,aes-192-gcm,aes-128-cbc,aes-128-gcm,3des" \
pfs-group=modp2048
add auth-algorithms=sha256 enc-algorithms=aes-256-cbc name=\
proposal_site-to-site pfs-group=none
/ip ipsec mode-config
add address-pool=pool_vpn name=vpndhcp
/ppp profile
add local-address=10.0.254.254 name=l2tp_vpn remote-address=pool_vpn \
use-encryption=required use-mpls=yes
/queue simple
add max-limit=1M/10M name=queue1 target=vlan_guest
/interface bridge port
add bridge=bridge1 interface=ether2 pvid=20
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
add bridge=bridge1 interface=hap1_solo
add bridge=bridge1 interface=hap1_2
add bridge=bridge1 interface=hap1_5
add bridge=bridge1 interface=cap1_2
add bridge=bridge1 interface=cap1_5
add bridge=bridge1 interface=cap1_iot pvid=10
add bridge=bridge1 interface=hap1_iot pvid=10
add bridge=bridge1 interface=hap1_m2 pvid=20
add bridge=bridge1 interface=hap1_m5 pvid=20
add bridge=bridge1 interface=cap1_m2 pvid=20
add bridge=bridge1 interface=cap1_m5 pvid=20
add bridge=bridge1 interface=cap1_solo
add bridge=bridge1 interface=cap1_guest pvid=30
add bridge=bridge1 interface=hap1_guest pvid=30
/interface bridge vlan
add bridge=bridge1 tagged=bridge1,ether3,ether5,cap1_iot,hap1_iot vlan-ids=10
add bridge=bridge1 tagged=\
bridge1,ether1,ether3,ether5,cap1_m2,cap1_m5,hap1_m2,hap1_m5 untagged=\
ether2 vlan-ids=20
add bridge=bridge1 tagged=bridge1,ether3 vlan-ids=30
add bridge=bridge1 tagged=bridge1,ether3 vlan-ids=40
/interface l2tp-server server
set default-profile=l2tp_vpn enabled=yes max-mru=1480 max-mtu=1460 use-ipsec=\
yes
/interface list member
add interface=ether1 list=WAN
add interface=bridge1 list=LAN
add interface=vlan_manuel list=LAN
add interface=vlan_iot list=LAN
add interface=vlan_guest list=LAN
/ip accounting
set account-local-traffic=yes enabled=yes
/ip accounting web-access
set accessible-via-web=yes
/ip cloud
set ddns-enabled=yes ddns-update-interval=30m
/ip firewall address-list
add address=10.0.0.0/24 list=Main
add address=10.0.1.0/24 list=Main
add address=10.0.2.0/24 list=Main
add address=10.0.3.0/24 list=Main
/ip firewall filter
add action=accept chain=input connection-state=established,related,untracked \
log-prefix=input_accept
add action=drop chain=input connection-state=invalid
add action=accept chain=input protocol=icmp
add action=accept chain=input in-interface-list=LAN protocol=tcp src-port=53
add action=accept chain=input in-interface-list=LAN protocol=udp src-port=53
add action=accept chain=input src-address=127.0.0.1
add action=accept chain=input disabled=yes log-prefix=input_accept \
src-address=192.168.10.0/24
add action=accept chain=input in-interface-list=LAN log-prefix=input_accept
add action=accept chain=input dst-port=500,1701,4500 in-interface=ether1 \
protocol=udp
add action=accept chain=input in-interface=ether1 protocol=ipsec-esp
add action=drop chain=input log-prefix=input_drop
add action=accept chain=forward comment=vialli dst-port=8001,445,5201,443 \
log-prefix=vialli protocol=tcp src-address=192.168.10.0/24
add action=accept chain=forward comment=landeck dst-port=443,445,5201,8080 \
log-prefix=vialli protocol=tcp src-address=192.168.21.0/24
add action=fasttrack-connection chain=forward connection-state=\
established,related disabled=yes in-interface=!vlan_guest out-interface=\
!vlan_guest
add action=accept chain=forward connection-state=\
established,related,untracked log-prefix=input_accept
add action=drop chain=forward comment="drop invalid" connection-state=invalid
add action=accept chain=forward comment="pass all outgoing" out-interface=\
ether1
add action=accept chain=forward comment="Accept vlan_manuel -> AP" \
dst-address=10.0.0.81 in-interface=vlan_manuel
add action=accept chain=forward comment="accept firetv-plex" dst-address=\
10.0.2.200 dst-port=32400 protocol=tcp src-address=10.0.1.95 src-port=\
48170
add action=accept chain=forward comment="allow vlan_iot->pihole udp" \
dst-address=10.0.2.201 dst-port=53 in-interface=vlan_iot protocol=udp
add action=accept chain=forward comment="allow vlan_iot->pihole tcp" \
dst-address=10.0.2.201 dst-port=53 in-interface=vlan_iot protocol=tcp
add action=drop chain=forward comment="drop all forward" log-prefix="dp fw"
/ip firewall mangle
add action=change-mss chain=forward dst-address=192.168.21.0/24 log=yes \
log-prefix=mangle_la new-mss=1350 passthrough=yes protocol=tcp \
src-address=192.168.0.1 tcp-flags=syn tcp-mss=!0-1350
add action=change-mss chain=forward dst-address=192.168.10.0/24 log-prefix=\
mangle new-mss=1350 passthrough=yes protocol=tcp src-address=192.168.0.1 \
tcp-flags=syn
/ip firewall nat
add action=accept chain=srcnat comment=vialli dst-address=192.168.10.0/24 \
src-address=10.0.2.0/24
add action=accept chain=srcnat comment=ldk dst-address=192.168.21.0/24 \
src-address=10.0.2.0/24
add action=masquerade chain=srcnat out-interface-list=WAN
/ip ipsec identity
add peer=vialli
add peer=landeck
/ip ipsec policy
add template=yes
add dst-address=192.168.10.0/24 peer=vialli sa-dst-address=XXXXXXXXX\
sa-src-address=192.168.0.1 src-address=10.0.2.0/24 tunnel=yes
add dst-address=192.168.21.0/24 peer=landeck proposal=proposal_site-to-site \
sa-dst-address=XXXXXXXXXXX sa-src-address=192.168.0.1 src-address=\
10.0.2.0/24 tunnel=yes
/ip service
set www-ssl certificate=ssl disabled=no
/ppp secret
add name=reima profile=l2tp_vpn service=l2tp
/system clock
set time-zone-name=Europe/Vienna
/tool bandwidth-server
set authenticate=no
i also tried with disabling fasttrack, without results. On the second site there is the same configuration
EDIT: The speed from the Internet Uplink i on one site 150/20 and on the other 250/25
thanks
Manuel