25 Kwietnia 2024 01:03:30
Nawigacja
· Strona Główna
· Forum

· Tomato by Shibby
· FreshTomato


Wątki na forum
Najnowsze dyskusje
· Asus TUF-AX3000_V2 p...
· nju swiatło pytania
· Jaki router kupić? ...
· konfiguracja router ...
· Szukam zaproszenia n...
· [Howto] Xpenology na...
· dodatkowe złącza s...
· RT-N18U - nie można...
· [MOD] Tomato64 (x86-64)
· Firewall nie zawsze ...
· [MOD] FreshTomato-AR...
· Optware na CIFS
· RT-AX56U - Status kl...
· [MOD] FreshTomato-MI...
· Multiroom N z wykorz...
· [S] Asus RT-AC68U E1
· [S] ASUS RT-AC68U
· Rozłączanie klient...
· serwer VPN za wan'em
· Przejscie z dyndns f...
Najpopularniejsze obecnie wątki
· Jaki router kupi... [552]
· Asus TUF-AX3000_V... [19]
· Szukam zaproszeni... [16]
· konfiguracja rout... [8]
· nju swiatło pytania [0]
Ankieta
Jaki procesor posiada twój router?

Broadcom MIPSEL
Broadcom MIPSEL
36% [151 głosów]

Broadcom ARM
Broadcom ARM
52% [216 głosów]

Atheros
Atheros
5% [22 głosów]

Marvell
Marvell
1% [4 głosów]

Ralink
Ralink
1% [3 głosów]

Intel/AMD/VIA
Intel/AMD/VIA
1% [5 głosów]

Żaden z powyższych
Żaden z powyższych
4% [15 głosów]

Ogółem głosów: 416
Musisz zalogować się, aby móc zagłosować.
Rozpoczęto: 02/02/2015 09:38
Twoje IP
3.145.52.86
Zobacz wątek
OpenLinksys » :: OPROGRAMOWANIE :: » DD-WRT - firmware
 Drukuj wątek
VPN przez NORDA dla LINKSYS problem
forest75
Cześć używam DDWRT (bez znaczenia wersja dzieje się na każdej to samo) na routerze LINKSYS WRT AC3200

Mam takie ustawienia klienta w routerze
carfor.pl/vpn1.jpg


+ w additional config
client
dev tun
proto tcp
remote 5.253.206.171 443
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no
remote-cert-tls server
;auth-user-pass
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
auth-nocache

Średnio do godzinę dwie rozłącza mi neta bo rozpina VPNa i wszystko co podłączone i lecące przez VPNa Sad

Czy wszystko mam ustawione poprawnie ? Może jakieś sugestie?

Dzięki za pomoc (instrukcja dla NORDVPNa jest dosyć stara a tu jest dużo nowych opcji) może coś mam źle ustawione.


Tak wygląda LOG
XXXXXXXXXXXXXX to adres WANU

Clientlog:
20210227 17:34:01 SENT CONTROL [pl147.nordvpn.com]: 'PUSH_REQUEST' (status=1)
20210227 17:34:01 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 103.86.96.100 dhcp-option DNS 103.86.99.100 sndbuf 524288 rcvbuf 524288 explicit-exit-notify comp-lzo no route-gateway 10.7.3.1 topology subnet ping 60 ping-restart 180 ifconfig 10.7.3.3 255.255.255.0 peer-id 0'
20210227 17:34:01 OPTIONS IMPORT: timers and/or timeouts modified
20210227 17:34:01 NOTE: --mute triggered...
20210227 17:34:01 3 variation(s) on previous 3 message(s) suppressed by --mute
20210227 17:34:01 Socket Buffers: R=[354560->1048576] S=[46080->1048576]
20210227 17:34:01 OPTIONS IMPORT: --ifconfig/up options modified
20210227 17:34:01 OPTIONS IMPORT: route options modified
20210227 17:34:01 OPTIONS IMPORT: route-related options modified
20210227 17:34:01 NOTE: --mute triggered...
20210227 17:34:01 3 variation(s) on previous 3 message(s) suppressed by --mute
20210227 17:34:01 Using peer cipher 'AES-256-CBC'
20210227 17:34:01 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
20210227 17:34:01 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
20210227 17:34:01 NOTE: --mute triggered...
20210227 17:34:01 2 variation(s) on previous 3 message(s) suppressed by --mute
20210227 17:34:01 net_route_v4_best_gw query: dst 0.0.0.0
20210227 17:34:01 net_route_v4_best_gw result: via XXXXXXXXXXXXXXXXXXXXXX dev eth0
20210227 17:34:01 I TUN/TAP device tun0 opened
20210227 17:34:01 I net_iface_mtu_set: mtu 1500 for tun0
20210227 17:34:01 I net_iface_up: set tun0 up
20210227 17:34:01 I net_addr_v4_add: 10.7.3.3/24 dev tun0
20210227 17:34:01 net_route_v4_add: 5.253.206.171/32 via XXXXXXXXXXXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210227 17:34:01 net_route_v4_add: 0.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210227 17:34:01 net_route_v4_add: 128.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210227 17:34:01 I Initialization Sequence Completed
20210227 18:34:00 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210227 18:34:00 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210227 18:34:00 VERIFY KU OK
20210227 18:34:00 NOTE: --mute triggered...
20210228 22:47:51 354 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:47:51 N read TCP_CLIENT: Operation timed out (code=110)
20210228 22:47:51 N Connection reset restarting [0]
20210228 22:47:51 I SIGUSR1[soft connection-reset] received process restarting
20210228 22:47:51 Restart pause 5 second(s)
20210228 22:47:56 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20210228 22:47:56 I NOTE: --fast-io is disabled since we are not using UDP
20210228 22:47:56 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210228 22:47:56 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210228 22:47:56 I TCP/UDP: Preserving recently used remote address: [AF_INET]5.253.206.171:443
20210228 22:47:56 Socket Buffers: R=[87380->1048576] S=[16384->1048576]
20210228 22:47:56 I Attempting to establish TCP connection with [AF_INET]5.253.206.171:443 [nonblock]
20210228 22:47:59 I TCP connection established with [AF_INET]5.253.206.171:443
20210228 22:47:59 W --mtu-disc is not supported on this OS
20210228 22:47:59 I TCP_CLIENT link local: (not bound)
20210228 22:47:59 I TCP_CLIENT link remote: [AF_INET]5.253.206.171:443
20210228 22:47:59 TLS: Initial packet from [AF_INET]5.253.206.171:443 sid=6cc8a111 5d3540c4
20210228 22:47:59 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210228 22:47:59 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210228 22:47:59 NOTE: --mute triggered...
20210228 22:47:59 6 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:47:59 I [pl147.nordvpn.com] Peer Connection Initiated with [AF_INET]5.253.206.171:443
20210228 22:48:00 SENT CONTROL [pl147.nordvpn.com]: 'PUSH_REQUEST' (status=1)
20210228 22:48:00 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 103.86.96.100 dhcp-option DNS 103.86.99.100 sndbuf 524288 rcvbuf 524288 explicit-exit-notify comp-lzo no route-gateway 10.7.1.1 topology subnet ping 60 ping-restart 180 ifconfig 10.7.1.2 255.255.255.0 peer-id 0'
20210228 22:48:00 OPTIONS IMPORT: timers and/or timeouts modified
20210228 22:48:00 NOTE: --mute triggered...
20210228 22:48:00 3 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:48:00 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
20210228 22:48:00 OPTIONS IMPORT: --ifconfig/up options modified
20210228 22:48:00 OPTIONS IMPORT: route options modified
20210228 22:48:00 OPTIONS IMPORT: route-related options modified
20210228 22:48:00 NOTE: --mute triggered...
20210228 22:48:00 3 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:48:00 Using peer cipher 'AES-256-CBC'
20210228 22:48:00 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
20210228 22:48:00 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
20210228 22:48:00 NOTE: --mute triggered...
20210228 22:48:00 2 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:48:00 I Preserving previous TUN/TAP instance: tun0
20210228 22:48:00 I NOTE: Pulled options changed on restart will need to close and reopen TUN/TAP device.
20210228 22:48:00 I /tmp/openvpncl/route-down.sh tun0 1500 1659 10.7.3.3 255.255.255.0 init
20210228 22:48:00 net_route_v4_del: 5.253.206.171/32 via XXXXXXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210228 22:48:00 net_route_v4_del: 0.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210228 22:48:00 net_route_v4_del: 128.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210228 22:48:00 Closing TUN/TAP interface
20210228 22:48:00 I net_addr_v4_del: 10.7.3.3 dev tun0
20210228 22:48:01 net_route_v4_best_gw query: dst 0.0.0.0
20210228 22:48:01 net_route_v4_best_gw result: via XXXXXXXXXXXXXXXXXX dev eth0
20210228 22:48:01 I TUN/TAP device tun0 opened
20210228 22:48:01 I net_iface_mtu_set: mtu 1500 for tun0
20210228 22:48:01 I net_iface_up: set tun0 up
20210228 22:48:01 I net_addr_v4_add: 10.7.1.2/24 dev tun0
20210228 22:48:01 net_route_v4_add: 5.253.206.171/32 via XXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210228 22:48:01 net_route_v4_add: 0.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210228 22:48:01 net_route_v4_add: 128.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210228 22:48:01 I Initialization Sequence Completed
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'state'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'state'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'state'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'status 2'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'log 500'
19700101 01:00:00
 
solldat
Proponuję na początek ustawić kill swicha w firewallu....
Druga sprawa- czy jest to oryginalna konfiguracja serwera Nordvpn?
konfiguracja kill swixh:

WAN_IF=`nvram get wan_iface`
iptables -I FORWARD -i br0 -o $WAN_IF -j REJECT --reject-with icmp-host-prohibited
iptables -I FORWARD -i br0 -p tcp -o $WAN_IF -j REJECT --reject-with tcp-reset
iptables -I FORWARD -i br0 -p udp -o $WAN_IF -j REJECT --reject-with udp-reset

Połączony z 01 marca 2021 12:49:09:
...wyrzuć z końca additional "auth-nocache"
Edytowany przez solldat dnia 01-03-2021 12:49
Zaprawdę wódka jest potężna, lecz bimber większą mocą włada.
 
forest75
Kill switcha nie mam w ustawieniach firewalla
Czy on coś zmieni?

Pomimo że go nie mam w commandline jak się wysypuje NORD rozłącza to i tak mi rozłącza wszystkie urządzenia podpięte po net, trwa to od 30sek do 5min i potem działa.

Konfigurowałem go za pomocą https://support.nordvpn.com/Connectivity/Router/1047410342/DD-WRT-setup-with-NordVPN.htm

Tylko nie wszystkie pola tam są vs nowe ddwrt (manual robiony na niższej wersji FW), na początku mi się darł o te CIPHER oraz metody kompresji, tak samo jak nie dałem auth-nocache pisał mi że creditiensiale do Norda mogą zostać wykradzione dodaj do konfiguracji auth-nocache. Plików autoryzacyjnych w pliktu txt nie używam bo wpisuje się je w kliencie VPN

Jednak nie ma w tym manualu opisanych paru funkcji. Mam też trasu routingu poustalane na urządzeniach przewodowych żeby omijały VPN a (głównie dla połączeń WIFI)

Tak dziś wygląda log

0210301 00:48:28 D MANAGEMENT: CMD 'status 2'
20210301 00:48:28 MANAGEMENT: Client disconnected
20210301 00:48:28 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 00:48:28 D MANAGEMENT: CMD 'log 500'
20210301 00:48:28 MANAGEMENT: Client disconnected
20210301 01:46:32 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210301 01:46:32 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210301 01:46:32 VERIFY KU OK
20210301 01:46:32 NOTE: --mute triggered...
20210301 13:45:30 150 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:45:30 N read TCP_CLIENT: Operation timed out (code=110)
20210301 13:45:30 N Connection reset restarting [0]
20210301 13:45:30 I SIGUSR1[soft connection-reset] received process restarting
20210301 13:45:30 Restart pause 5 second(s)
20210301 13:45:35 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20210301 13:45:35 I NOTE: --fast-io is disabled since we are not using UDP
20210301 13:45:35 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:45:35 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:45:35 I TCP/UDP: Preserving recently used remote address: [AF_INET]5.253.206.171:443
20210301 13:45:35 Socket Buffers: R=[87380->1048576] S=[16384->1048576]
20210301 13:45:35 I Attempting to establish TCP connection with [AF_INET]5.253.206.171:443 [nonblock]
20210301 13:45:38 I TCP connection established with [AF_INET]5.253.206.171:443
20210301 13:45:38 W --mtu-disc is not supported on this OS
20210301 13:45:38 I TCP_CLIENT link local: (not bound)
20210301 13:45:38 I TCP_CLIENT link remote: [AF_INET]5.253.206.171:443
20210301 13:45:39 TLS: Initial packet from [AF_INET]5.253.206.171:443 sid=e40eff7c d2cafe2c
20210301 13:46:00 N read TCP_CLIENT: Operation timed out (code=110)
20210301 13:46:00 N Connection reset restarting [0]
20210301 13:46:00 I SIGUSR1[soft connection-reset] received process restarting
20210301 13:46:00 Restart pause 5 second(s)
20210301 13:46:05 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20210301 13:46:05 I NOTE: --fast-io is disabled since we are not using UDP
20210301 13:46:05 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:46:05 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:46:05 I TCP/UDP: Preserving recently used remote address: [AF_INET]5.253.206.171:443
20210301 13:46:05 Socket Buffers: R=[87380->1048576] S=[16384->1048576]
20210301 13:46:05 I Attempting to establish TCP connection with [AF_INET]5.253.206.171:443 [nonblock]
20210301 13:46:05 I TCP connection established with [AF_INET]5.253.206.171:443
20210301 13:46:05 W --mtu-disc is not supported on this OS
20210301 13:46:05 I TCP_CLIENT link local: (not bound)
20210301 13:46:05 I TCP_CLIENT link remote: [AF_INET]5.253.206.171:443
20210301 13:46:05 TLS: Initial packet from [AF_INET]5.253.206.171:443 sid=8753c879 9e29c69e
20210301 13:46:05 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210301 13:46:05 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210301 13:46:05 NOTE: --mute triggered...
20210301 13:46:05 6 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:05 I [pl147.nordvpn.com] Peer Connection Initiated with [AF_INET]5.253.206.171:443
20210301 13:46:06 SENT CONTROL [pl147.nordvpn.com]: 'PUSH_REQUEST' (status=1)
20210301 13:46:06 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 103.86.96.100 dhcp-option DNS 103.86.99.100 sndbuf 524288 rcvbuf 524288 explicit-exit-notify comp-lzo no route-gateway 10.7.1.1 topology subnet ping 60 ping-restart 180 ifconfig 10.7.1.5 255.255.255.0 peer-id 0'
20210301 13:46:06 OPTIONS IMPORT: timers and/or timeouts modified
20210301 13:46:06 NOTE: --mute triggered...
20210301 13:46:06 3 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:06 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
20210301 13:46:06 OPTIONS IMPORT: --ifconfig/up options modified
20210301 13:46:06 OPTIONS IMPORT: route options modified
20210301 13:46:06 OPTIONS IMPORT: route-related options modified
20210301 13:46:06 NOTE: --mute triggered...
20210301 13:46:06 3 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:06 Using peer cipher 'AES-256-CBC'
20210301 13:46:06 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
20210301 13:46:06 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:46:06 NOTE: --mute triggered...
20210301 13:46:06 2 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:06 I Preserving previous TUN/TAP instance: tun0
20210301 13:46:06 I NOTE: Pulled options changed on restart will need to close and reopen TUN/TAP device.
20210301 13:46:06 I /tmp/openvpncl/route-down.sh tun0 1500 1659 10.7.2.2 255.255.255.0 init
20210301 13:46:06 net_route_v4_del: 5.253.206.171/32 via XXXXXXXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210301 13:46:06 net_route_v4_del: 0.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
20210301 13:46:06 net_route_v4_del: 128.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
20210301 13:46:06 Closing TUN/TAP interface
20210301 13:46:06 I net_addr_v4_del: 10.7.2.2 dev tun0
20210301 13:46:07 net_route_v4_best_gw query: dst 0.0.0.0
20210301 13:46:07 net_route_v4_best_gw result: via XXXXXXXXXX dev eth0
20210301 13:46:07 I TUN/TAP device tun0 opened
20210301 13:46:07 I net_iface_mtu_set: mtu 1500 for tun0
20210301 13:46:07 I net_iface_up: set tun0 up
20210301 13:46:07 I net_addr_v4_add: 10.7.1.5/24 dev tun0
20210301 13:46:07 net_route_v4_add: 5.253.206.171/32 via XXXXXXXXXXdev [NULL] table 0 metric -1
20210301 13:46:07 net_route_v4_add: 0.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210301 13:46:07 net_route_v4_add: 128.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210301 13:46:08 I Initialization Sequence Completed
20210301 14:46:06 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210301 14:46:06 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210301 14:46:06 VERIFY KU OK
20210301 14:46:06 NOTE: --mute triggered...
20210301 15:43:52 9 variation(s) on previous 3 message(s) suppressed by --mute
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'state'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'state'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'state'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'status 2'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'log 500'
19700101 01:00:00

Połączony z 01 marca 2021 16:09:34:
Jak wyłącze auth no cache


mam takie info

20210301 16:07:22 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this


Dlatego też to dodałem Smile
Edytowany przez forest75 dnia 01-03-2021 16:09
 
solldat
Narazie nie mam pomysłu o co kaman... a tak z ciekawości, dlaczego masz ustawiony port 443? i to jeszcze na TCP?
Edytowany przez solldat dnia 01-03-2021 17:09
Zaprawdę wódka jest potężna, lecz bimber większą mocą włada.
 
forest75
Tcp żeby mieć potwierdzenia zwrotne, przy udp po transmisji nie masz potwierdzenia odbioru, jeżeli NORD to obsługuje to chyba tylko lepiej dla mnie Smile
 
khain
Dostajesz sygnał SIGUSR1: "This signal may also be internally generated by a timeout condition, governed by the -ping-restart option." https://openvpn.net/community-resourc...envpn-2-4/
W konfigu klienta masz ustawione

 ping-restart 0
choć w logu klienta masz ping-restart 180, które przychodzi z serwera, więc można spróbować zmienić tą wartość na serwerze.
Poczytaj też o parametrze keepalive i o tym dlaczego należy stosować auth-nocache.
Edytowany przez khain dnia 03-03-2021 22:22
 
Przejdź do forum
Zaloguj
Wprowadź adres e-mail lub nazwę użytkownika

Hasło



Nie masz jeszcze konta? Zarejestruj się.

Zapomniałeś/aś hasła?
Aktualnie online
· Gości online: 36

· Użytkowników online: 0

· Łącznie użytkowników: 24,117
· Najnowszy użytkownik: Ja
Czat
Musisz się zalogować, aby opublikować wiadomość.

tamtosiamto
23-04-2024 12:35
modem bez smilocka?

man1
22-04-2024 23:27
Czy próbował ktoś uzywac karty voice (z nolimit GB) od tmobile w modemie /routerze? Da się jakoś to zrobić? Bo u mnie neta brak. E3372 Sad

tamtosiamto
31-03-2024 12:54
Wesolego jajka wszytskim forumowiczom Grin

tamtosiamto
28-03-2024 23:24
tak, tak zgadza sie, ale ja pytam o wykluczenie noda na guest network w first set, i to nie dziala

Adooni
24-03-2024 13:16
Guest network is currently designed to allow the first set of each band (2.4G, 5G, 5G-1) available to the AiMesh node

tamtosiamto
24-03-2024 03:03
ale w 1 jest opcja do wyboru - dla calej sieci albo rutera only i wlasnie o tym mowie, ze nie dziala

Adooni
23-03-2024 16:31
w dokumencie asusa jest ze wlasnie dla 1 ma dzialac na nodach tez

tamtosiamto
23-03-2024 15:39
tak, ale nie zmienia to faktu, ze w pierwszej nie dziala wylaczanie aimesh dla goscinnej( a powinno), czyli jest jakis bug. Mam start soft, bo to dsl-ac68 ktory nie jest juz updateowany

Adooni
22-03-2024 18:07
nie, 1 wsza bedzie wszedzie trzeba 2ga zrobic dla kazdego pasma te nie sa przenoszone

tamtosiamto
19-03-2024 19:57
czyli jak mam jedna siec goscinna to powinno dzialac separowanie gosci od noda -a nie dziala Smile

71,305,684 unikalnych wizyt