Using 1024 bit keys, openvpn over udp, an easy-rsa cert authority, using certificates and a setup as per http://openvpn.net/index.php/open-source/documentation/howto.html
(all the howtos on the web are obsolete, this one worked, I created a dir, did a make install,
and followed those instructions)
I hooked up 3 wndr3700 boxes in series for this test. I had to manually set it up to
tunnel appropriately (it set up a tunnel to the wrong place, by default, it's just a config
option I haven't figured out, or so I hope)
connected via jupiter (acting as an openvpn server)
|
leda (acting as a router)
|
aitne (acting as a client)
I get 19Mbits/second, using iperf. Obviously, using openvpn as a server on these routers will not scale to a lot of users. However, 19Mbits is not bad, for the clients, for a first try, and is
probably adversely effected by using a weak box as a server.
I'd be very interested to know if the clients can be made to work well through NAT.
A ping
20:46:46.674942 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125
20:46:46.681440 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125
20:46:47.675078 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125
20:46:47.681193 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125
20:46:48.675203 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125
20:46:48.675818 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125
I'd like to give strongswan a shot at some point as the basic ipsec-tools, but I was
pleased this turned out so easy once I found a piece of doc that was up to date.
--
Dave Täht
SKYPE: davetaht
US Tel: 1-239-829-5608
http://the-edge.blogspot.com