Best Technology Articles

IT Tips, Networking Articles, Networking Tutorials, Programming Tutorials, ASP Tutorials, PhP Tutorials, ADS Installation, Network Setup, Networking Tips and Tricks, Hacking Articles, Software Tips, Macintosh Articles, Macintosh Tips, Technology Tips, Mobile Softwares, Mobiles Rates in Pakistan

Try the following techniques to improve the performance of the VPN tunnel:

  1. On the client
    1. Increase CPU processing power.
    2. Eliminate or stop nonessential processes that use CPU time.
    3. Increase the bandwidth of the Internet connection by using direct access (cable/DSL) in place of dial-up connections, if possible.
  2. On the server
    To free memory, stop unnecessary proxy services on the firewall such as SQLNetd, NNTPd, and others.
Note: Disabling proxy daemons lessens the ability of the firewall to fully examine packets at the application layer and may lower the degree of security established on the system. Only disable proxy services if you are certain that they are not in use by the firewall either directly (for instance, DNSd) or indirectly (in rules). If you are not sure of the effect of disabling certain proxy services, consult a Technical Support representative before disabling proxy services.
  1. Tunnel Parameters
    1. VPN Policy parameters
      1. Disable Compression on the VPN Policy
      2. Set rekey limits to their defaults (Data Volume: 2100000, Lifetime: 480, Inactivity: 0)
      3. You may also try using a DES VPN Policy in lieu of a 3DES VPN Policy if CPU power is a concern.
    2. Disabling/Enabling VPN tunnel use of the Proxy Services
      1. In most cases, a VPN Policy that uses the Proxy services is only required when the administrator wishes to:
        1. Restrict access to services through the tunnel (for instance, only telnet is allowed through the tunnel)
        2. NAT'ing is necessary for packets to return to the firewall (that is, the internal hosts behind the firewall/VPN server do not use the firewall/VPN server in any way, shape or form as their default gateway).
      2. If you do not need to restrict access to specific services through the tunnel (all ports and protocols are allowed through a VPN tunnel to the defined Local Entity of the Secure Tunnel) and, NAT is not necessary because internal hosts use the firewall/VPN server as their default gateway, this setting can be disabled. However, if you wish to restrict services to the tunnel or must use the NAT feature of the firewall/VPN server, this setting must be enabled.
      3. To disable the Proxy Services feature, on the VPN Policy used by the tunnel, clear the "Pass Traffic from the Secure Tunnel to the Proxy Services (Required for NAT)" check box.
  2. Proxy Services
    There are several rule-based items you can analyze and change to improve the throughput of a VPN tunnel that uses the Proxy services:
    1. Make the VPN rules as specific as possible (including Source, Destination, Out Via, and the Services). If possible, try to avoid multiple rules identifying as a source as the firewall scans the entire rule database to determine a "best fit" application.
    2. If possible, avoid using "all*" as a service in rules, but rather specify the individual services for the VPN rule.
    3. Disable "Log Normal Activity" (on the Miscellaneous tab). This will stop the Logging daemon from logging activity that this rule applies to.
    4. Disable "Application Data Scanning." Disabling this feature invokes the FastPath mechanism (HTTP) or the Kernel Proxy (all other Proxy services) for those services that apply to the specific rule. For information on FastPath and the Kernel Proxy, review the Firewall documentation provided with your product.
  3. Address Transforms
    If you need to use Address Transforms (the firewall/VPN server NAT functionality), try the following to improve performance:
    1. Use the "Use Gateway Address" option in the Address Transform in place of a NAT pool.
    2. Make the Address Transform specific to your VPN Tunnel (the "best fit" method applies to Address Transforms as it does to rules. See item 4.1, above), and leave the default VPNTunnelExitTransform and VPNTunnelEntryTransform at their defaults.

0 comments: