Using 1024 bit keys, openvpn over udp, an easy-rsa cert authority, using certificates and a setup as per <a href="http://openvpn.net/index.php/open-source/documentation/howto.html">http://openvpn.net/index.php/open-source/documentation/howto.html</a><br>
<br>(all the howtos on the web are obsolete, this one worked, I created a dir, did a make install, <br> and followed those instructions)<br><br>I hooked up 3 wndr3700 boxes in series for this test. I had to manually set it up to<br>
tunnel appropriately (it set up a tunnel to the wrong place, by default, it's just a config<br>option I haven't figured out, or so I hope)<br><br>connected via jupiter (acting as an openvpn server)<br> |<br>
leda (acting as a router)<br> |<br> aitne (acting as a client)<br clear="all"><br>I get 19Mbits/second, using iperf. Obviously, using openvpn as a server on these routers will not scale to a lot of users. However, 19Mbits is not bad, for the clients, for a first try, and is<br>
probably adversely effected by using a weak box as a server. <br><br>I'd be very interested to know if the clients can be made to work well through NAT.<br><br>A ping<br><br>20:46:46.674942 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125<br>
20:46:46.681440 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125<br>20:46:47.675078 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125<br>20:46:47.681193 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125<br>
20:46:48.675203 IP 192.168.115.171.38804 > 192.168.22.1.openvpn: UDP, length 125<br>20:46:48.675818 IP 192.168.22.1.openvpn > 192.168.115.171.38804: UDP, length 125<br><br>I'd like to give strongswan a shot at some point as the basic ipsec-tools, but I was<br>
pleased this turned out so easy once I found a piece of doc that was up to date.<br><br>-- <br>Dave Täht<br>SKYPE: davetaht<br>US Tel: 1-239-829-5608<br><a href="http://the-edge.blogspot.com" target="_blank">http://the-edge.blogspot.com</a> <br>