Skip to main content

Tutorial: Turn on OpenVPN DCO in Access Server

Abstract

Install and turn on OpenVPN DCO to enhance Access Server's performance. This module offloads the data channel to the Linux kernel.

Overview

Enabling OpenVPN DCO for your VPN server and clients can improve performance. This document describes how to enable it in Access Server and OpenVPN Connect for Windows.

Prerequisites

To deploy and use OpenVPN DCO on Access Server, you must meet the following requirements.

Supported Access Server version:

  • 2.12.0 and newer

Supported platforms:

  • Debian 11

  • Debian 12

  • Red Hat Enterprise Linux 8

  • Red Hat Enterprise Linux 9

  • Ubuntu 20.04 LTS (x86_64 and ARM64 architectures)

  • Ubuntu 22.04 LTS (x86_64 and ARM64 architectures)

  • Ubuntu 24.04 LTS (x86_64 and ARM64 architectures)

Compatible clients:

  • OpenVPN3-based clients such as OpenVPN Connect v3 and OpenVPN3 Linux client

  • OpenVPN2-based clients that use OpenVPN 2.4 or newer (OpenVPN 2.3 and older are not supported)

Tip

The client does not need to use DCO to connect to a server that uses DCO. With only one side doing DCO, there is already a performance benefit. However, it is best if both sides use it. The following clients can utilize DCO on the client side, although it must be enabled separately within the client.

Clients with DCO capability:

Follow these steps to install DCO on your Access Server server based on your Linux OS. Ensure your server has an officially supported kernel. We don't test or support DCO on custom-compiled kernels and can't guarantee it will work in your situation.

The steps below are for systems where your OS installs the latest kernel when available.

If your system requires staying on a specific kernel version, refer to the DCO troubleshooting page.

Tip

After installing the DCO module, you can verify its status on your server from the Admin Web UI Status page under Server Details.

  1. Connect to your server's console and obtain root privileges.

  2. Update and upgrade the operating system (recommended):

    apt update
    apt upgrade
  3. Reboot the OS:

    reboot
  4. Install the DCO module:

    apt install openvpn-dco-dkms

Due to the various envrionments in which our customers deploy DCO, if you encounter installation issues with these steps, refer to our troubleshooting tips. We provide information about possible dependencies you may need to address.

  1. Install the Extra Packages for Enterprise Linux (EPEL) repository.

  2. Update and upgrade the OS (choose the command  appropriate for your RHEL version):

    yum upgrade

    or

    yum update
  3. Reboot the OS.

  4. Install the DCO module:

    yum install kmod-ovpn-dco

After installing the DCO kernel module, you can enable DCO in Access Server's Admin Web UI.

  1. Sign in to the Admin Web UI.

  2. Click VPN Server.

    • The Network Settings tab displays.

  3. Click the Data Channel Offload tab.

  4. Click to turn DCO On.

  5. Click Save and Restart.

Instead of turning on OpenVPN DCO from the Admin Web UI, you can manage it from the command-line interface (CLI).

  1. Connect to your console and get root privileges.

  2. Run these commands:

    sacli -k "vpn.server.daemon.ovpndco" -v "true" ConfigPut
    sacli start

From the Admin Web UI:

  1. Click Status.

  2. On the Overview tab, under Server Details, the DCO status is displayed.

From the CLI:

  1. Connect to your server's console and obtain root privileges.

  2. Run this command to verify ovpn-dco is in use:

    ip -details link show
    • Note the interfaces that start with as0; you'll see these include ovpn-dco in the output.

Suppose you've enabled secure boot on the system running your Access Server. In that case, it will fail to boot correctly if you install the DCO loadable kernel module without adding its signature to the secure boot system.

Ensure you do one of two things:

  1. Either add the module's signature to verify it and boot securely.

  2. Or disable secure boot.

This situation will improve in the future as DCO is under review for inclusion in the Linux kernel itself. Once it is part of the Linux kernel, a separate loadable kernel module won't be required.