How can I make the router run the OpenVPN client without a huge loss of download speed?
My set-up: Laptop (and other devices) on 5G wireless -> Asus Wireless router connected via ethernet -> ATT Uverse router connected by twisted pair DSL -> internet.
ATT Uverse is sonic.net resold FFTN DSL, about 20 MBS down, about 2 MBS up.
System works fine normally, and installing OpenVPN client on my laptop shows negligible speed change over the routers. However, I'd like everything in the house to use the OpenVPN setup, so trying to run the built-in client on the Asus router.
Router has a built-in menu item for this under VPN section, where one simply uploads the .ovpn file to create the profile. Did that successfully, restarted the router, updated the firmware, all that good stuff. But if I turn on the built-in OpenVPN client, it connects correctly, but the speedtest.net numbers drops down to about 8 MBS down, and about 1.4 up. Turn the client off, and everything is back to full speed.
This isn't an issue of the exit node being different, as I can run the OpenVPN client on my laptop with the same profile, and the bytes fly through at the same speed as normal. I found a youtube video here:
https://www.youtube.com/watch?v=7ap57xp2WyM
Which showed a fix for exactly this same problem (on a different model Asus router) but their fix didn't work for me. However, it does seem similar enough that it makes me wonder if it might not be related to my problem.
In the video, it appears to be a bug in the QoS controls [8 mins in]. I tried his work-around, as well as turning QoS on and off, with no noticeable effect on the problem.
Aside from replacing the router, or flashing something like dd-wrt on the router, does anyone have any other suggestions to get back the speed I know the router is capable of while running the built-in OpenVPN client?
I believe the hardware should be sufficient to run the client without problem.
[Edit 1] - comment requesting more info
Asus firmware version - 3.0.0.4.380_7743
cipher (from the openvpn file) appears to be AES-128-CBC
Bits of the openvpn file, with certs and keys removed
# OVPN_ACCESS_SERVER_WEB_CA_BUNDLE_STOP
# OVPN_ACCESS_SERVER_IS_OPENVPN_WEB_CA=0
# OVPN_ACCESS_SERVER_ORGANIZATION=Sonic
setenv FORWARD_COMPATIBLE 1
client
server-poll-timeout 4
nobind
remote ovpn.sonic.net 1194 udp
remote ovpn.sonic.net 1194 udp
remote ovpn.sonic.net 443 tcp
remote ovpn.sonic.net 1194 udp
remote ovpn.sonic.net 1194 udp
remote ovpn.sonic.net 1194 udp
remote ovpn.sonic.net 1194 udp
remote ovpn.sonic.net 1194 udp
dev tun
dev-type tun
ns-cert-type server
reneg-sec 604800
sndbuf 100000
rcvbuf 100000
auth-user-pass
# NOTE: LZO commands are pushed by the Access Server at connect time.
# NOTE: The below line doesn't disable LZO.
comp-lzo no
verb 3
setenv PUSH_PEER_INFO
[...]
<tls-auth>
#
# 2048 bit OpenVPN static key (Server Agent)
[...]
cipher AES-128-CBC
Thanks.