Oh is that so, Thank you for your reply.They do not check device, but ttl time, see other topic already open about that.
If you use the pc, you are directly connected, and is ok,
But if you put between the router, the ttl is decreased by one (device) and the provider understand than you share the connection.
Ping result without VPN: Reply from 1.1.1.1: bytes=32 time=114ms TTL=52
the logic behind is that mobile operators want to discourage subscribers from using LTE to connect whole networks, assuming that networks generate more traffic than individual phones. So the ISPs offer specific (more expensive) tariff plans for connection of networks. And by the TTL value they distinguish packets sent by the mobile phone itself from packets sent by devices connected to the phone externally.if we change the TTL on the LTI we would be able to get more bandwidth, why is that?
Cant find any logical explanation
No it's just VPN client on windows. the PC is always connect to the rb4011.When you say "VPN on the PC" vs. "VPN on the router", does that really mean only where you run the VPN client, or do you also connect the PC directly to the ISP's modem (excluding the 4011 from the path)?
Hey manhi,
what @rextended trying to say most ISP capped your connection if they determined you put a router in between by observing the TTL and decremented by 1 and triggered them to reduced your bandwidth, since you try to reset the TTL to 65 the ISP shouldn't notice you put a router and in theory should not capped your connection, in this case this could be something else and i don't think this is a port negotiation mismatch issue on your Ethernet port towards the WAN interface, could you check if this is the case there's no harm in trying
The ISP given maximum upload speed is 8MbpsGiven the awful upload performance, are you sure you have MTU / MSS set properly?
If so, the MAC address of the 4011 plays no role in the VPN throughput, because the VPN provider can never see a MAC address, whereas the ISP can always see the MAC address of the 4011's WAN, no matter where the VPN client is running.No it's just VPN client on windows. the PC is always connect to the rb4011.
Thank you very much for your reply.If so, the MAC address of the 4011 plays no role in the VPN throughput, because the VPN provider can never see a MAC address, whereas the ISP can always see the MAC address of the 4011's WAN, no matter where the VPN client is running.No it's just VPN client on windows. the PC is always connect to the rb4011.
2 ms difference on 123 ms of ping round-trip time is nothing, so I would assume the issue to be caused by the PPTP transport packets getting fragmented and many of the fragments to get lost. The thing is that the VPN client on the PC advertises a small enough MTU on the payload interface so that fragmentation wouldn't happen, whereas the PPTP client on the Mikrotik may advertise a too high MTU on the payload interface, resulting in the PC sending 1500-byte packets as per the Ethernet MTU, and the 4011 passing them on fragmented, and a good deal of the small second fragments getting lost on the path between the 4011 and the VPN server. Post the text export of the Mikrotik configuration, following the mini-howto in my automatic signature below.
Definitely not with PPTP, whose encryption is so weak that it actually hides nothing; IPsec or something-over-IPsec is also obvious, so you'd have to use an SSTP VPN which looks like a normal HTTPS session, except that the packet sizes and traffic patterns may be unusual, plus SSTP has some drawbacks for the user (speed being one of the first ones to bother you). So no, no way to hide the fact that you are using a VPN from someone really determined to find out.Is there a way to completely cover the VPN so ISP never understand I'm using one?
No that PPPOE is disabled and it was for ADSL from past, right now the wan is just a Ethernet cable to port 10 of the rb4011 and no need any configuration. also about L2TP it's disabled as well I use only PPTPyour WAN interface is a PPPoE oneIs there a way to completely cover the VPN so ISP never understand I'm using one?
I changed them to 1400 and still the sameTo your speed issue - the default max-mtu and max-mru settings of PPTP client interface, 1450 bytes, assume that the PPTP transport packets will be sent over an Ethernet interface with MTU of 1500 bytes. However, your WAN interface is a PPPoE one, which means a MTU of 1480 bytes or smaller, hence reducing the max-mtu and max-mru values in /interface pptp-client to 1400 might do the trick.Is there a way to completely cover the VPN so ISP never understand I'm using one?
After I add those it's still the sameOK, so try just the mangle rules.
Oh man o man it worked it workedddddddddddddddddddddGrrr... I forgot the obvious... disable the action=fasttrack-connection rule in /ip firewall filter and try again.
@sindy What about Wireguard? I think it's available on RouterOS v7Definitely not with PPTP, whose encryption is so weak that it actually hides nothing; IPsec or something-over-IPsec is also obvious, so you'd have to use an SSTP VPN which looks like a normal HTTPS session, except that the packet sizes and traffic patterns may be unusual, plus SSTP has some drawbacks for the user (speed being one of the first ones to bother you). So no, no way to hide the fact that you are using a VPN from someone really determined to find out.Is there a way to completely cover the VPN so ISP never understand I'm using one?
I found very very interesting thing. So let's say the speed drop to about 17Mbps - 28Mbps (17Mbps when downloading files - 28Mbps when using speedtest) with VPN but when I start downloading a file it start with about 4MB/sec then find stability at about 1.8MB/sec and then I start downloading another one and again start with about 4MB/sec then find stability at about 1.8MB/sec so apparently I was downloading at the speed of 3.6MB/sec in total, then I start downloading another one and again start with about 4MB/sec then find stability at about 1.8MB/sec so now I was downloading at 5.4MB/sec (about 43Mbps) in total (PPTP was enabled on the router). any idea why it was limit for each file that was downloading but in total it was about 40Mbps? (and I know there is not any kind of speed limiter on the download server)Also once I got this speed but after it was mostly 17Mbps - 28Mbps which I think it's because of the VPN connection, maybe with SSTP it will be better.
Screenshot 2021-09-06 014845.jpg
Yeah you are right I test this by disabling those mangles and disable fasttrack-connection and it works pretty fine.Solution was at #26 by disable fasttrack-connection and this #26 should be marked as SOLVED tag..
Yes, Wireguard is available in ROS 7, and it is pretty fast as such on a 4011. However, TCP and ~120 ms round trip delay may mean lower throughput even if encryption and decryption alone works very fast.What about Wireguard? I think it's available on RouterOS v7
Not in this case. Packet fragmentation does cause issues with VPNs for multiple reasons (increasing the PPS rate to 150 % wrt the non-fragmented case, higher loss rate for tiny packets/second fragments in some networks). But here, it was the well-known incompatibility between fasttracking and assigning routing-marks using mangle rules.So the problem was because of packet fragmentation ?
Thanks man I test them and will share the results.Yes, Wireguard is available in ROS 7, and it is pretty fast as such on a 4011. However, TCP and ~120 ms round trip delay may mean lower throughput even if encryption and decryption alone works very fast.
The only VPN protocol to be hardware accelerated on some Mikrotik devices (including the 4011) to date is bare IPsec. As it is more flexible than Wireguard, its configuration is more complex. You have to try which of the two performs better with your VPN provider.
Regarding obfuscation, there is little difference between the two.
SSTP can never be faster than L2TP or PPTP because all of them use the same PPP encapsulation, but SSTP encypts it using TLS (which means higher CPU load) and the transport protocol of SSTP is TCP whereas L2TP uses UDP and PPTP uses GRE, so at least SSTP has more overhead, but also tunneling TCP (the payload) inside TCP (the SSTP transport) is a very bad idea as soon as packet drops may occur.
My CPU load is almost always at 0%Regarding the "solution" - disabling the action=fasttrack-connection rule was actually a diagnostic step in first place. If the CPU load of the 4011 is below 30 % even now, it can stay as a solution; if it is higher, you can make it work even with that rule enabled if you let the routing table for the VPN traffic be chosen using an /ip route rule row rather than an /ip firewall mangle rule, or use the fasttracking rule selectively.
You can try to disable them and see whether it affects the performance or not. Given that the overall performance is not stable, you may have to do several tests in each state to make a reliable conclusion.My CPU load is almost always at 0%
Can I disable those two /ip firewall mangle rules?
I have seen the post, but I know nothing about the load of the VPN servers nor about the network path between your home and the VPN server. The fact that the VPN server has 10 Gbit/s interfaces says nothing about the total number of clients using it, nor about the bottlenecks between your home and the VPN server. The 120 ms round-trip delay didn't come out of blue. Use /tool traceroute ip.of.the.vpn.server to see where the delay is.Also can you take a look at post #29 and tell me what you think and why it was like that (right now it's okay)?
I would say no difference after I disabled them so I will keep it this wayYou can try to disable them and see whether it affects the performance or not. Given that the overall performance is not stable, you may have to do several tests in each state to make a reliable conclusion.
I've done that but didn't understand the results that muchI have seen the post, but I know nothing about the load of the VPN servers nor about the network path between your home and the VPN server. The fact that the VPN server has 10 Gbit/s interfaces says nothing about the total number of clients using it, nor about the bottlenecks between your home and the VPN server. The 120 ms round-trip delay didn't come out of blue. Use /tool traceroute ip.of.the.vpn.server to see where the delay is.
Plus there may be some intentional bandwidth throttling somewhere along the path, I've seen people from ISPs to openly admit here that they decrease priority of TCP connections once they've passed enough data for a typical speedtest session - which kind of makes sense, because you mostly need the bandwidth for interactive services, huge downloads can wait.
The results show you (or not) IP addresses of the routers between your home and the destination, and the total round-trip delay (i.e. including the previous hops) to each of them.I've done that but didn't understand the results that much
Here you go:The results show you (or not) IP addresses of the routers between your home and the destination, and the total round-trip delay (i.e. including the previous hops) to each of them.I've done that but didn't understand the results that much
Can you paste the result here, hiding the actual addresses of the servers that did respond, but allowing the rows where no IP address has been shown to be distinguished from those which did contain an IP address?
Also, do a /tool traceroute 8.8.8.8 routing-mark=PPTP_OVH238 and post the results as well, obfuscated the same way.
Thanks man.. So I guess it's something that we can't do anything about it.Those pictures show that most of the delay is between your ISP and the VPN provider's network.
The first one shows that the responses from the last private IP in the ISP's network arrive in 15 ms on average, whereas the responses from the first responding OVH server arrive in 116 ms on average.
The second one shows that the path from the OVH's VPN server to the local copy of 8.8.8.8 contributes just 9 ms (110 vs 101) to the total.
Thank you very muchIt depends. If you are in mainland France, you may be able to choose an ISP for your home that has a better connection to OVH's network. If you are overseas, so there is a satellite link somewhere in the path, it's very likely that all ISPs will have the same issue.
This software is like TeraCopy ? What it's ?Screenshot 2021-09-06 023232.jpg
intresting. I'm assuming you combine l2tp with ipsecSolution was at #26 by disable fasttrack-connection and this #26 should be marked as SOLVED tag..
About limit 40Mbps I discover it at all RB who not have a IPSec acceleration.
PPTP and L2TP etc have limit ~40Mbps per one vpn connection. I do a both type vpn and use them in route as ECMP. I can reach some 60-80 max.
Clear L2TP what is done between both MikroTik.intresting. I'm assuming you combine l2tp with ipsec
That's not exactly true. The mangle rules adjusting TCP MSS actually do work even when the fasttracking rule is enabled, because these particular rules handle just the first two packets of each TCP session, the SYN and SYN+ACK one. And the initial SYN packet has connection-state=new, so the default action=fasttrack-connection rule ignores it as it doesn't match on connection-state=new, whereas the SYN+ACK packet already matches connection-state=established the connection doesn't get actually fasttracked until one of its packets matches the action=fasttrack-connection rule, and that packet itself still takes the "slow" path. So only the third packet of a connection can be actually fasttracked.Yes i know that the mangle rules did not work because of fast-track being enabled
Because short fragments are not treated well in some ISPs' networks, and 1300 is a low enough MTU value to make sure that even with several layers of encapsulation the outermost transport packet will still fit into the MTU of the physical interface. So by using this low value, I wanted to exclude any issues related to fragmentation.my question was actually, why did you suggested an MTU of 1300 Byte on the PPTP ?
i was more exciting, and i did the test. By using ECMP one site can use one tunnel ,other site other one tunnel which is fine. (see picture below)nichky write:Clear L2TP what is done between both MikroTik.intresting. I'm assuming you combine l2tp with ipsec
Two location have CRS125 (1xCPU 600Mhz without IPSec acceleration) and
Site A ISP Orange 300/100
Site B ISP ATMan 100/100
I cannot reach stable 80/80 between them at any VPN I configure, whatever Site is a Server of VPN.
PPTP or L2TP have ~20/10Mbps
SSTP ~8/8Mbps
IPSec - no comment..
I back to 1x PPTP and 1xL2TP and use at both of them ECMP, what can give me sometimes transfers like ~ 40/40Mbps from 100/100 possible.
-----------------
Other Client location
Site A CCR1009 && Site B hEX - both with IPsec hardware acceleration whenre a hEX max ~470 Mbps what is not reach here.
Max of PPTP or L2TP is 40Mbps per one VPN type.
ECMP both the same type like PPTP & PPTP not change max limit of 40Mbps
ECMP both differ tyle like PPTP & L2TP give more like max 80Mbps and not more...
IPSec not tested yet, I wait for maintenance window...
@sindy, you' re right...That's not exactly true. The mangle rules adjusting TCP MSS actually do work even when the fasttracking rule is enabled, because these particular rules handle just the first two packets of each TCP session, the SYN and SYN+ACK one. And the initial SYN packet has connection-state=new, so the default action=fasttrack-connection rule ignores it as it doesn't match on connection-state=new, whereas the SYN+ACK packet already matches connection-state=established the connection doesn't get actually fasttracked until one of its packets matches the action=fasttrack-connection rule, and that packet itself still takes the "slow" path. So only the third packet of a connection can be actually fasttracked.Yes i know that the mangle rules did not work because of fast-track being enabled
Because short fragments are not treated well in some ISPs' networks, and 1300 is a low enough MTU value to make sure that even with several layers of encapsulation the outermost transport packet will still fit into the MTU of the physical interface. So by using this low value, I wanted to exclude any issues related to fragmentation.my question was actually, why did you suggested an MTU of 1300 Byte on the PPTP ?
sorry for the late reply. It's IDM (Internet Download Manager) https://www.internetdownloadmanager.com/jaxed8 write:This software is like TeraCopy ? What it's ?Screenshot 2021-09-06 023232.jpg