Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Jirka1
Contributor III

SSL VPN poor speed

Hello,

 

we having trouble with throughput the SSL VPN on Windows Latency from the client to the Fortigate is about 20ms and bandwidth in Fortigate site is 1Gbps and client site is 100Mbbps First, when connecting locally over the internal gigabit network (with near-zero latency), performance easily exceeds about 60Mbps for download on the client. I verified through trace routes, the route table, and Task Manager that tested traffic was indeed flowing through SSL VPN. This tells me that the underlying hardware is capable. However, when testing from off-site (at least 100Mbps and 20ms latency), the performance changes. From the client' s perspective, the download rate through SSL VPN is about 13Mbps and the upload is the problem in that it cannot exceed about 2-3Mbps.It seems that the increased latency is the contributing factor. Given that the SSL VPN uses TCP, my guess is that there' s an issue with TCP window scaling of the SSL VPN connection itself, especially when the client is sending data to the Fortigate.

I tried disable all UTM, change IP on wan. wan has no errors, MTU 1500, speed 1GbitFD (fix).

 

Important: If I configured IPsec VPN and test it, throughput from the corporate LAN to the client is over 80Mbps on both sides. And also traffic to the internet (through the Fortigate, no split-tunnel) reaches maximum client line (about 90Mbps).

Has anyone else been able to achieve better performance on either Windows SSL VPN clients? Our clients need good throughput in both directions from corporate LAN and Internet-based sources where latency far from zero...

My testing has included Windows 7 and Windows 10 Transfer tests included iperf (tcp and udp modes), SMB, FTP, Speedtest.net (and similar tools hosted by the ISP). Fortigate 100D running on v5.4.3,build1111 and FortiClient 5.4.2.0860

 

config vpn ssl settings
set reqclientcert disable
set sslv3 disable
set tlsv1-0 disable
set tlsv1-1 enable
set tlsv1-2 enable
unset banned-cipher
set ssl-big-buffer disable
set ssl-insert-empty-fragment enable
set https-redirect disable
set ssl-client-renegotiation disable
set force-two-factor-auth disable
set servercert "**********"
set algorithm high
set idle-timeout 0
set auth-timeout 28800
set tunnel-ip-pools "*********"
set dns-suffix "*******.local"
set dns-server1 172.22.91.100
set dns-server2 172.22.91.101
set wins-server1 172.22.91.100
set wins-server2 172.22.91.101
set ipv6-dns-server1 ::
set ipv6-dns-server2 ::
set ipv6-wins-server1 ::
set ipv6-wins-server2 ::
set route-source-interface disable
set url-obscuration disable
set http-compression disable
set http-only-cookie enable
set port 443
set port-precedence enable
set auto-tunnel-static-route enable
set header-x-forwarded-for add
set source-interface "wan1"
set source-address "all"
set source-address-negate disable
set source-address6 "all"
set source-address6-negate disable
set default-portal "web-access"
set dtls-tunnel enable
set check-referer disable
set http-request-header-timeout 20
set http-request-body-timeout 30

 

config system interface
    edit "wan1"
        set vdom "root"
        set mode static
        set dhcp-relay-service disable
        set ip ********* 255.255.255.240
        set allowaccess ping https ssh snmp http fgfm
        set fail-detect disable
        set pptp-client disable
        set arpforward enable
        set broadcast-forward disable
        set bfd global
        set l2forward disable
        set icmp-redirect enable
        set vlanforward enable
        set stpforward disable
        set ips-sniffer-mode disable
        set ident-accept disable
        set ipmac disable
        set subst disable
        set substitute-dst-mac 00:00:00:00:00:00
        set status up
        set netbios-forward disable
        set wins-ip 0.0.0.0
        set type physical
        set netflow-sampler disable
        set sflow-sampler disable
        set scan-botnet-connections disable
        set sample-rate 2000
        set polling-interval 20
        set sample-direction both
        set explicit-web-proxy disable
        set explicit-ftp-proxy disable
        set tcp-mss 0
        set inbandwidth 0
        set outbandwidth 0
        set spillover-threshold 0
        set ingress-spillover-threshold 0
        set weight 0
        set external disable
        set description "WAN"
        set alias "WAN"
        set security-mode none
        set device-identification disable
        set lldp-transmission vdom
        set fortiheartbeat disable
        set estimated-upstream-bandwidth 0
        set estimated-downstream-bandwidth 0
        set vrrp-virtual-mac disable
        set role wan
        set snmp-index 2
        set secondary-IP disable
        set auto-auth-extension-device disable
        set ap-discover enable
        set fortilink disable
        config ipv6
            set ip6-mode static
            unset ip6-allowaccess
            set ip6-reachable-time 0
            set ip6-retrans-time 0
            set ip6-hop-limit 0
            set dhcp6-prefix-delegation disable
            set ip6-address ::/0
            set ip6-send-adv disable
            set autoconf disable
            set dhcp6-relay-service disable
            set speed 1000full
            set mtu-override disable
            set wccp disable
            set drop-overlapped-fragment disable
            set drop-fragment disable

We are faced with this problem from the beginning (I think FortiOS version 5.0) and we hope to improve with each new version of FortiOS or FortiClient :/ If anyone has any idea how this fix it, I will be grateful.

Thanks!

1 Solution
recha
New Contributor III

Hi Smartypants,

 

I had the same issue, between 2 fortigate site2site IPSEC, with fiber both side (100Mb for one and 1Gb the other), and i had poor transfer bandwidth.

What is your fortios build ?

For me, i was on 5.0 and just upgrading to 5.4 was enough to resolve this issue...

View solution in original post

39 REPLIES 39
recha
New Contributor III

Hi,

 

I have the exact same issue with one of my client.

They got a HA 200D (5.0.10) and the transfer rate is very slow when it's in the IPSEC tunnel (FTP, CIFS).

I test with SSL, it's the same.

Test was done between fiber 100Mb to fiber 1Gb.

When there is no IPSEC or SSL, the transfer rate is almost at full speed (nearly 95Mb).

 

I test on another fortigate (100D 5.2.9), same issue.

 

I just open a ticket today for this issue, i'm waiting answer from support, finger cross ^^

Jirka1
Contributor III

Hi Recha,

please let me know the result.

Thanks!

Regards

recha
New Contributor III

No problem ;)

 

There is another topic about this specific issue created 6 hours ago

https://forum.fortinet.com/tm.aspx?m=144639

Let's hope support can fix this quickly :)

 

Sebastiaan_Koopmans

We have the same problem and created already an ticket by support.

 

We have done a lot of testing with support and the latest status is "PendingBugFix"

"there is currently an issue reported to developers for sslvpn throughput degradation for uplinks greater than 100Mbps. (#0365197 - "Speed degradation with SSLVPN", still in open state and under developers investigation). " We have to wait now until an final fix will be available.

 

When there is an update available i will post it here.

FortiAnalyzer / 6.4.0

FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6

FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0

FortiWeb VM / 6.3.2

FortiManager VM / 6.4.0

FortiAnalyzer / 6.4.0 FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6 FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0 FortiWeb VM / 6.3.2 FortiManager VM / 6.4.0
recha

Thanks for the info Sebastiaan.

 

For my information, did you have this issue with fortios 5.4 ?

If yes, have you tried to enable DTLS support? (http://kb.fortinet.com/kb/documentLink.do?externalID=FD38162)

 

For the moment, i don't have any client with high speed fiber on fortios 5.4 (only on fortios 5.2 and 5.0), i will try this next time when i will upgrade a ha, i was hoping for this solution but i think it will be a disappointment...

 

For me, this issue of speed is not only for SSL, it's also for IPSEC.

Sebastiaan_Koopmans

Hi Rechna,

 

Yes we are using on the moment fortiOS 5.4.

 

No haven't tried the DTLS support yet, we will try this asap and we will post the outcome.

 

Greetings Sebastiaan

 

FortiAnalyzer / 6.4.0

FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6

FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0

FortiWeb VM / 6.3.2

FortiManager VM / 6.4.0

FortiAnalyzer / 6.4.0 FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6 FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0 FortiWeb VM / 6.3.2 FortiManager VM / 6.4.0
recha

Seb,

 

I cross the fingers and hope for a good result! :)

Sebastiaan_Koopmans

Applied the suggested setting but no difference in 5.4

 

Max 1mbit and decreasing after an while....

 

Wait for official fix...

FortiAnalyzer / 6.4.0

FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6

FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0

FortiWeb VM / 6.3.2

FortiManager VM / 6.4.0

FortiAnalyzer / 6.4.0 FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6 FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0 FortiWeb VM / 6.3.2 FortiManager VM / 6.4.0
Sebastiaan_Koopmans

For your info we are using 2 x 200D's in active-pasive config

FortiAnalyzer / 6.4.0

FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6

FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0

FortiWeb VM / 6.3.2

FortiManager VM / 6.4.0

FortiAnalyzer / 6.4.0 FortiClient / 6.2.6 FortiClient EMS VM / 6.2.6 FortiGate 300D HA 6.2.4 FortiGate 500E HA 6.2.4 FortiGate 30E / 60E / 100E / 6.0.9 FortiMail VM HA / 6.4.0 FortiSandbox VM / 3.2.0 FortiWeb VM / 6.3.2 FortiManager VM / 6.4.0
Labels
Top Kudoed Authors