That looks abnormal to me. have you tried different servers?
Make sure it's not any QoS implementation interfering with your tunnel.
I never ran any speed test on my development PIA account, but I suspect it's faster than that even if running from my router. I usually do my test with servers from the eastern coast of America (since they are closest to me, and I'm not actively using the tunnel, so I don't care about the region/IP of the server).
I got those figures using AES-128-CBC and SHA1 digest, and running iperf locally between two computers over a tunnel. Can't remember if I had LZO enabled or not at the time. It was with the 800 MHz version, so the more recent 1 GHz version would be even faster.
Merlin,
Thanks for the Reply.
I do not use QOS on any Router or Access Points because of problems I previously encountered with getting all clients to connect easily and the desire to minimize overhead on the router CPU.
I ran the test using the PIA provided software directly on the PC (Lenova TS-140 server) that runs with a clean Windows 7 64-bit Pro OS (I like the interface better than MS Windows Server OS). I am using a Asus RT-AC68R router running the latest John's Fork firmware 27e and a Netgear CM600 24X8 modem with 20 bonded channels Down and 4 bonded channels Up. The encryption should be all through the TS-140 server.
I re-did the test with speedtest.net with, and without, the VPN engaged. PIA encryption with AES-256-CBC (or AES-128-CBC), SHA-1, R SA-2048, TCP
Without VPN tunnel/Encryption: 297 Mbps Down, 30 Mbps UP
With AES-256 Encryption: 4.5Mbps Down, 11Mbps Up
With AES- 128 Encryption: 39Mbps Down, 15 Mbps Up
I mis-stated the original numbers given as for AES-128 encryption. Those were actually for the AES-256-CBR encryption. The numbers stated above are the best numbers I got.
When I changed the SHA encryption to SHA-256, the hit was not as bad as when I changed the AES encryption from 128 to 256.
I re-ran the test several times connecting to alternate servers to find the maximum speeds possible. Without encryption, I get pings in the range of 10 ms. With encryption enabled, I get pings in the range of 90-100 ms. I connect to PIA servers in the USA. The default connection is to the USA Midwest. I also tried USA Chicago, Canada Toronto, Canada Montreal (these all seem to connect to the same server). I tried US East Coast, US Florida, US Texas, and US Silicon Valley. The later ones give slightly lower transfer rates with longer pings.
When I switched to the UDP from TCP setting and re-ran the tests, I was not able to get a connection. The speedtest.net program gave a "connection timed out" indication and repeatedly asked for a retest. I am not sure why that change would have such an impact on transfer speeds.
From other posts I have read, the OpenVPN software only utilizes 1 core/1 thread. The encryption/decryption should be mostly dependent on the clock speed of the microprocessor and the calculation efficiency of the core up to the limits set by the VPN provider. Therefore, the Xeon processor running at 3.2GHz clock (3.5GHz turbo) should be much faster at encryption/decryption than the 800MHz processor in the RT-AC68 router unless the calculation efficiency of the processor in the router is 4X that of the Xeon processor.
I realize that there is a severe performance loss using a encrypted VPN, I just didn't think it would be that much. I want to implement whole location encryption since there are multiple clients/users on the network that are not under my control and I have received several notices of copyrite infringement (not sure which user did the downloads). Using a VPN on all traffic would let me prevent any more notices. Another option would be to implement a proxy server. That doesn't give security/encryption but should prevent further notices if I also implement an IP mask. Thoughts about this would be appreciated. I would also be interested in comments about implementing a general proxy server and IP Mask on the whole network, then having a VPN/encryption on individual client devices where more security (business confidential communication/data transfer) is necessary.