I have an er-poe5 with ipsec site to site vpn to another edgerouter lite. It seems like the hw-offload dosent work because when I transfer files over the link I get max 5MB/sec and the cpu is running at 100%
Could anyone have a look at my config to see if I am using features that disables hw-offload?
show configuration | no-more firewall { all-ping enable broadcast-ping disable group { network-group BOGONS { network 10.0.0.0/8 network 100.64.0.0/10 network 127.0.0.0/8 network 169.254.0.0/16 network 172.16.0.0/12 network 192.0.0.0/24 network 192.0.2.0/24 network 192.168.0.0/16 network 198.18.0.0/15 network 198.51.100.0/24 network 203.0.113.0/24 network 224.0.0.0/4 network 240.0.0.0/4 } } ipv6-name Internet-To-LAN { default-action drop description "Internet to LAN" rule 1 { action accept description "Drop Incoming IPv6 unless related" state { established enable related enable } } rule 2 { action drop state { invalid enable } } } ipv6-name LAN-To-Internet { default-action accept description "LAN to Internet" rule 1 { action accept state { established enable related enable } } rule 2 { action drop state { invalid enable } } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 21 { action drop description "SRC Bogons" log disable protocol all source { group { network-group BOGONS } } } rule 22 { action drop description "DST Bogons" destination { group { network-group BOGONS } } log disable protocol all } } name WAN_LOCAL { default-action drop description "WAN to router" rule 1 { action accept description "Allow established/related" state { established enable related enable } } rule 3 { action accept description ESP log disable protocol esp } rule 4 { action accept description "udp port 500" destination { port 500 } log disable protocol udp } rule 5 { action accept description "udp port 4500" destination { port 4500 } log disable protocol udp } rule 6 { action accept description "udp port 1701" destination { port 1701 } ipsec { match-ipsec } log disable protocol udp } rule 8 { action accept description "GRE over IPsec" ipsec { match-ipsec } protocol gre } rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action accept description ESP log disable protocol esp } rule 30 { action accept description "UDP port 500" destination { port 500 } log disable protocol udp } rule 40 { action accept description "UDP port 4500" destination { port 4500 } log disable protocol udp } rule 50 { action accept description GRE log disable protocol gre } rule 60 { action accept description "UDP 1701" destination { port 1701 } log disable protocol udp } rule 70 { action accept description "Backdoor Sandbox" log disable protocol all source { address x.x.x.x } } rule 80 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address dhcp description "Altibox Internet" dhcp-options { default-route update default-route-distance 210 name-server no-update } duplex auto firewall { in { ipv6-name Internet-To-LAN name WAN_IN } local { name WAN_LOCAL } } poe { output off } speed auto } ethernet eth1 { address 2a01:79d:7375:4215::1/64 address 192.168.253.1/27 description TV duplex auto ipv6 { dup-addr-detect-transmits 1 router-advert { cur-hop-limit 64 link-mtu 1280 managed-flag false max-interval 300 other-config-flag false prefix 2a01:79d:7375:4215::/64 { autonomous-flag true on-link-flag true valid-lifetime 2592000 } reachable-time 0 retrans-timer 0 send-advert true } } poe { output off } speed auto } ethernet eth2 { description "Main switch port 2" duplex auto poe { output off } speed auto } ethernet eth3 { description "Unify Cloud key" duplex auto poe { output 48v } speed auto } ethernet eth4 { description "Accesspunkt stuen" duplex auto poe { output 48v } speed auto } loopback lo { address 172.25.5.1/32 } switch switch0 { address 10.11.12.1/24 address 2a01:79d:7375:4214:feed:dead:beef:1/64 description Switch ipv6 { dup-addr-detect-transmits 1 router-advert { cur-hop-limit 64 link-mtu 1280 managed-flag false max-interval 300 other-config-flag false prefix 2a01:79d:7375:4214::/64 { autonomous-flag true on-link-flag true valid-lifetime 2592000 } reachable-time 0 retrans-timer 0 send-advert true } } mtu 1500 switch-port { interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } vif 512 { address 192.168.255.1/24 description Barnenett mtu 1500 } vif 513 { address 192.168.254.1/24 description Ungdomsnett mtu 1500 } } tunnel tun0 { address 2a01:79c::/30 description "Altibox 6RD" encapsulation sit local-ip x.x.x.x multicast disable remote-ip 213.167.115.92 ttl 255 } vti vti0 { address 172.25.25.1/30 description "Vpn to Sandbox-Rack" mtu 1436 } vti vti1 { address 172.25.25.5/30 description "Vpn to Anders sin VPS" } } policy { prefix-list RFC1918PREFIXES { rule 1 { action permit le 32 prefix 10.0.0.0/8 } rule 2 { action permit le 32 prefix 172.16.0.0/12 } rule 3 { action permit le 32 prefix 192.168.0.0/16 } } route-map ONLYRFC1918PREFIXES { rule 10 { action permit match { ip { address { prefix-list RFC1918PREFIXES } } } } rule 666 { action deny } } } port-forward { auto-firewall enable hairpin-nat enable lan-interface switch0 lan-interface eth1 wan-interface eth0 } protocols { ospf { area 0 { network 172.25.25.0/30 network 172.25.25.4/30 } parameters { abr-type cisco router-id 172.25.5.1 } redistribute { connected { metric-type 2 route-map ONLYRFC1918PREFIXES } } } static { interface-route6 ::/0 { next-hop-interface tun0 { } } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN2 { authoritative enable subnet 10.11.12.0/24 { default-router 10.11.12.1 dns-server 10.11.12.1 dns-server 8.8.4.4 lease 86400 start 10.11.12.38 { stop 10.11.12.243 } static-mapping UniFi-CloudKey { ip-address 10.11.12.39 mac-address 80:2a:a8:4d:0f:32 } static-mapping printer8FD5C1DD { ip-address 10.11.12.46 mac-address c4:8e:8f:d5:c1:dd } } } shared-network-name eth1 { subnet 192.168.253.0/27 { default-router 192.168.253.1 dns-server 192.168.253.1 lease 86400 start 192.168.253.2 { stop 192.168.253.30 } } } use-dnsmasq disable } dns { forwarding { cache-size 150 listen-on eth1 listen-on switch0 listen-on switch0.512 listen-on switch0.513 } } gui { http-port 80 https-port 443 older-ciphers enable } lldp { interface switch0 { } } nat { rule 5010 { description "masquerade for WAN" outbound-interface eth0 type masquerade } } snmp { community snmpread { authorization ro network 192.168.0.0/16 network 172.16.0.0/12 network 10.0.0.0/8 } contact trrunde } ssh { port 22 protocol-version v2 } upnp2 { listen-on switch0 nat-pmp disable secure-mode disable wan eth0 } } system { domain-name runde.wtf host-name erpoe5 login { user ubnt { authentication { encrypted-password **************** } level admin } } name-server 8.8.8.8 name-server 208.67.222.222 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipsec enable ipv4 { forwarding enable gre enable vlan enable } ipv6 { forwarding enable vlan enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Europe/Oslo traffic-analysis { dpi enable export enable } } vpn { ipsec { auto-firewall-nat-exclude enable esp-group FOO0 { compression disable lifetime 3600 mode tunnel pfs enable proposal 1 { encryption aes256 hash sha1 } } ike-group FOO0 { ikev2-reauth no key-exchange ikev1 lifetime 28800 proposal 1 { dh-group 14 encryption aes256 hash sha1 } } ipsec-interfaces { interface eth0 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable site-to-site { peer x.x.x.x { authentication { pre-shared-secret **************** } connection-type initiate ike-group FOO0 ikev2-reauth inherit local-address x.x.x.x vti { bind vti1 esp-group FOO0 } } peer x.x.x.x { authentication { mode rsa pre-shared-secret **************** rsa-key-name erl-altibox } connection-type initiate description Sandbox ike-group FOO0 ikev2-reauth inherit local-address x.x.x.x vti { bind vti0 esp-group FOO0 } } } } rsa-keys { rsa-key-name erl-altibox { rsa-key **************** } } } ubnt@erpoe5:~$
ubnt@erpoe5:~$ show ubnt offload
IP offload module : loaded
IPv4
forwarding: enabled
vlan : enabled
pppoe : disabled
gre : enabled
IPv6
forwarding: enabled
vlan : enabled
pppoe : disabled
IPSec offload module: loaded
Traffic Analysis :
export : enabled
dpi : enabled
ubnt@erpoe5:~$