21 Lutego 2024 12:25:22
Nawigacja
· Strona Główna
· Forum

· Tomato by Shibby
· FreshTomato


Wątki na forum
Najnowsze dyskusje
· [MOD] FreshTomato-AR...
· Netgear WNR3500L
· Nextcloud konfigurac...
· [MOD] FreshTomato-MI...
· [MOD] Tomato64 (x86-64)
· Netflix dzielenie ko...
· [S] ASUS RT-AC68U
· Banana PI (BRI-R3)
· [S]Banana PI (BRI-R3...
· [S] Płyta, Procek, ...
· Czy to atak hakerski ?
· Asus RT-N10U - znany...
· asus rt-n10u problem...
· Konfiguracja adresó...
· Wi-Fi 160MHz
· USB LAN do TV
· RT-N16
· ASUS AX92U bootloop
· Tomato resetuje się...
· swieta
Najpopularniejsze obecnie wątki
· [MOD] FreshTomato... [862]
· Netgear WNR3500L [737]
· Nextcloud konfigu... [12]
Ankieta
Jaki procesor posiada twój router?

Broadcom MIPSEL
Broadcom MIPSEL
36% [151 głosów]

Broadcom ARM
Broadcom ARM
52% [215 głosów]

Atheros
Atheros
5% [22 głosów]

Marvell
Marvell
1% [4 głosów]

Ralink
Ralink
1% [3 głosów]

Intel/AMD/VIA
Intel/AMD/VIA
1% [5 głosów]

Żaden z powyższych
Żaden z powyższych
4% [15 głosów]

Ogółem głosów: 415
Musisz zalogować się, aby móc zagłosować.
Rozpoczęto: 02/02/2015 09:38
Twoje IP
3.239.9.151
Zobacz wątek
OpenLinksys » :: OPROGRAMOWANIE :: » DD-WRT - firmware
 Drukuj wątek
VPN przez NORDA dla LINKSYS problem
forest75
Cześć używam DDWRT (bez znaczenia wersja dzieje się na każdej to samo) na routerze LINKSYS WRT AC3200

Mam takie ustawienia klienta w routerze
carfor.pl/vpn1.jpg


+ w additional config
client
dev tun
proto tcp
remote 5.253.206.171 443
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no
remote-cert-tls server
;auth-user-pass
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
auth-nocache

Średnio do godzinę dwie rozłącza mi neta bo rozpina VPNa i wszystko co podłączone i lecące przez VPNa Sad

Czy wszystko mam ustawione poprawnie ? Może jakieś sugestie?

Dzięki za pomoc (instrukcja dla NORDVPNa jest dosyć stara a tu jest dużo nowych opcji) może coś mam źle ustawione.


Tak wygląda LOG
XXXXXXXXXXXXXX to adres WANU

Clientlog:
20210227 17:34:01 SENT CONTROL [pl147.nordvpn.com]: 'PUSH_REQUEST' (status=1)
20210227 17:34:01 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 103.86.96.100 dhcp-option DNS 103.86.99.100 sndbuf 524288 rcvbuf 524288 explicit-exit-notify comp-lzo no route-gateway 10.7.3.1 topology subnet ping 60 ping-restart 180 ifconfig 10.7.3.3 255.255.255.0 peer-id 0'
20210227 17:34:01 OPTIONS IMPORT: timers and/or timeouts modified
20210227 17:34:01 NOTE: --mute triggered...
20210227 17:34:01 3 variation(s) on previous 3 message(s) suppressed by --mute
20210227 17:34:01 Socket Buffers: R=[354560->1048576] S=[46080->1048576]
20210227 17:34:01 OPTIONS IMPORT: --ifconfig/up options modified
20210227 17:34:01 OPTIONS IMPORT: route options modified
20210227 17:34:01 OPTIONS IMPORT: route-related options modified
20210227 17:34:01 NOTE: --mute triggered...
20210227 17:34:01 3 variation(s) on previous 3 message(s) suppressed by --mute
20210227 17:34:01 Using peer cipher 'AES-256-CBC'
20210227 17:34:01 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
20210227 17:34:01 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
20210227 17:34:01 NOTE: --mute triggered...
20210227 17:34:01 2 variation(s) on previous 3 message(s) suppressed by --mute
20210227 17:34:01 net_route_v4_best_gw query: dst 0.0.0.0
20210227 17:34:01 net_route_v4_best_gw result: via XXXXXXXXXXXXXXXXXXXXXX dev eth0
20210227 17:34:01 I TUN/TAP device tun0 opened
20210227 17:34:01 I net_iface_mtu_set: mtu 1500 for tun0
20210227 17:34:01 I net_iface_up: set tun0 up
20210227 17:34:01 I net_addr_v4_add: 10.7.3.3/24 dev tun0
20210227 17:34:01 net_route_v4_add: 5.253.206.171/32 via XXXXXXXXXXXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210227 17:34:01 net_route_v4_add: 0.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210227 17:34:01 net_route_v4_add: 128.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210227 17:34:01 I Initialization Sequence Completed
20210227 18:34:00 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210227 18:34:00 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210227 18:34:00 VERIFY KU OK
20210227 18:34:00 NOTE: --mute triggered...
20210228 22:47:51 354 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:47:51 N read TCP_CLIENT: Operation timed out (code=110)
20210228 22:47:51 N Connection reset restarting [0]
20210228 22:47:51 I SIGUSR1[soft connection-reset] received process restarting
20210228 22:47:51 Restart pause 5 second(s)
20210228 22:47:56 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20210228 22:47:56 I NOTE: --fast-io is disabled since we are not using UDP
20210228 22:47:56 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210228 22:47:56 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210228 22:47:56 I TCP/UDP: Preserving recently used remote address: [AF_INET]5.253.206.171:443
20210228 22:47:56 Socket Buffers: R=[87380->1048576] S=[16384->1048576]
20210228 22:47:56 I Attempting to establish TCP connection with [AF_INET]5.253.206.171:443 [nonblock]
20210228 22:47:59 I TCP connection established with [AF_INET]5.253.206.171:443
20210228 22:47:59 W --mtu-disc is not supported on this OS
20210228 22:47:59 I TCP_CLIENT link local: (not bound)
20210228 22:47:59 I TCP_CLIENT link remote: [AF_INET]5.253.206.171:443
20210228 22:47:59 TLS: Initial packet from [AF_INET]5.253.206.171:443 sid=6cc8a111 5d3540c4
20210228 22:47:59 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210228 22:47:59 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210228 22:47:59 NOTE: --mute triggered...
20210228 22:47:59 6 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:47:59 I [pl147.nordvpn.com] Peer Connection Initiated with [AF_INET]5.253.206.171:443
20210228 22:48:00 SENT CONTROL [pl147.nordvpn.com]: 'PUSH_REQUEST' (status=1)
20210228 22:48:00 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 103.86.96.100 dhcp-option DNS 103.86.99.100 sndbuf 524288 rcvbuf 524288 explicit-exit-notify comp-lzo no route-gateway 10.7.1.1 topology subnet ping 60 ping-restart 180 ifconfig 10.7.1.2 255.255.255.0 peer-id 0'
20210228 22:48:00 OPTIONS IMPORT: timers and/or timeouts modified
20210228 22:48:00 NOTE: --mute triggered...
20210228 22:48:00 3 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:48:00 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
20210228 22:48:00 OPTIONS IMPORT: --ifconfig/up options modified
20210228 22:48:00 OPTIONS IMPORT: route options modified
20210228 22:48:00 OPTIONS IMPORT: route-related options modified
20210228 22:48:00 NOTE: --mute triggered...
20210228 22:48:00 3 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:48:00 Using peer cipher 'AES-256-CBC'
20210228 22:48:00 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
20210228 22:48:00 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
20210228 22:48:00 NOTE: --mute triggered...
20210228 22:48:00 2 variation(s) on previous 3 message(s) suppressed by --mute
20210228 22:48:00 I Preserving previous TUN/TAP instance: tun0
20210228 22:48:00 I NOTE: Pulled options changed on restart will need to close and reopen TUN/TAP device.
20210228 22:48:00 I /tmp/openvpncl/route-down.sh tun0 1500 1659 10.7.3.3 255.255.255.0 init
20210228 22:48:00 net_route_v4_del: 5.253.206.171/32 via XXXXXXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210228 22:48:00 net_route_v4_del: 0.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210228 22:48:00 net_route_v4_del: 128.0.0.0/1 via 10.7.3.1 dev [NULL] table 0 metric -1
20210228 22:48:00 Closing TUN/TAP interface
20210228 22:48:00 I net_addr_v4_del: 10.7.3.3 dev tun0
20210228 22:48:01 net_route_v4_best_gw query: dst 0.0.0.0
20210228 22:48:01 net_route_v4_best_gw result: via XXXXXXXXXXXXXXXXXX dev eth0
20210228 22:48:01 I TUN/TAP device tun0 opened
20210228 22:48:01 I net_iface_mtu_set: mtu 1500 for tun0
20210228 22:48:01 I net_iface_up: set tun0 up
20210228 22:48:01 I net_addr_v4_add: 10.7.1.2/24 dev tun0
20210228 22:48:01 net_route_v4_add: 5.253.206.171/32 via XXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210228 22:48:01 net_route_v4_add: 0.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210228 22:48:01 net_route_v4_add: 128.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210228 22:48:01 I Initialization Sequence Completed
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'state'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'state'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'state'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'status 2'
20210228 23:31:15 MANAGEMENT: Client disconnected
20210228 23:31:15 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210228 23:31:15 D MANAGEMENT: CMD 'log 500'
19700101 01:00:00
 
solldat
Proponuję na początek ustawić kill swicha w firewallu....
Druga sprawa- czy jest to oryginalna konfiguracja serwera Nordvpn?
konfiguracja kill swixh:

WAN_IF=`nvram get wan_iface`
iptables -I FORWARD -i br0 -o $WAN_IF -j REJECT --reject-with icmp-host-prohibited
iptables -I FORWARD -i br0 -p tcp -o $WAN_IF -j REJECT --reject-with tcp-reset
iptables -I FORWARD -i br0 -p udp -o $WAN_IF -j REJECT --reject-with udp-reset

Połączony z 01 marca 2021 12:49:09:
...wyrzuć z końca additional "auth-nocache"
Edytowany przez solldat dnia 01-03-2021 12:49
Zaprawdę wódka jest potężna, lecz bimber większą mocą włada.
 
forest75
Kill switcha nie mam w ustawieniach firewalla
Czy on coś zmieni?

Pomimo że go nie mam w commandline jak się wysypuje NORD rozłącza to i tak mi rozłącza wszystkie urządzenia podpięte po net, trwa to od 30sek do 5min i potem działa.

Konfigurowałem go za pomocą https://support.nordvpn.com/Connectivity/Router/1047410342/DD-WRT-setup-with-NordVPN.htm

Tylko nie wszystkie pola tam są vs nowe ddwrt (manual robiony na niższej wersji FW), na początku mi się darł o te CIPHER oraz metody kompresji, tak samo jak nie dałem auth-nocache pisał mi że creditiensiale do Norda mogą zostać wykradzione dodaj do konfiguracji auth-nocache. Plików autoryzacyjnych w pliktu txt nie używam bo wpisuje się je w kliencie VPN

Jednak nie ma w tym manualu opisanych paru funkcji. Mam też trasu routingu poustalane na urządzeniach przewodowych żeby omijały VPN a (głównie dla połączeń WIFI)

Tak dziś wygląda log

0210301 00:48:28 D MANAGEMENT: CMD 'status 2'
20210301 00:48:28 MANAGEMENT: Client disconnected
20210301 00:48:28 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 00:48:28 D MANAGEMENT: CMD 'log 500'
20210301 00:48:28 MANAGEMENT: Client disconnected
20210301 01:46:32 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210301 01:46:32 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210301 01:46:32 VERIFY KU OK
20210301 01:46:32 NOTE: --mute triggered...
20210301 13:45:30 150 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:45:30 N read TCP_CLIENT: Operation timed out (code=110)
20210301 13:45:30 N Connection reset restarting [0]
20210301 13:45:30 I SIGUSR1[soft connection-reset] received process restarting
20210301 13:45:30 Restart pause 5 second(s)
20210301 13:45:35 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20210301 13:45:35 I NOTE: --fast-io is disabled since we are not using UDP
20210301 13:45:35 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:45:35 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:45:35 I TCP/UDP: Preserving recently used remote address: [AF_INET]5.253.206.171:443
20210301 13:45:35 Socket Buffers: R=[87380->1048576] S=[16384->1048576]
20210301 13:45:35 I Attempting to establish TCP connection with [AF_INET]5.253.206.171:443 [nonblock]
20210301 13:45:38 I TCP connection established with [AF_INET]5.253.206.171:443
20210301 13:45:38 W --mtu-disc is not supported on this OS
20210301 13:45:38 I TCP_CLIENT link local: (not bound)
20210301 13:45:38 I TCP_CLIENT link remote: [AF_INET]5.253.206.171:443
20210301 13:45:39 TLS: Initial packet from [AF_INET]5.253.206.171:443 sid=e40eff7c d2cafe2c
20210301 13:46:00 N read TCP_CLIENT: Operation timed out (code=110)
20210301 13:46:00 N Connection reset restarting [0]
20210301 13:46:00 I SIGUSR1[soft connection-reset] received process restarting
20210301 13:46:00 Restart pause 5 second(s)
20210301 13:46:05 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20210301 13:46:05 I NOTE: --fast-io is disabled since we are not using UDP
20210301 13:46:05 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:46:05 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:46:05 I TCP/UDP: Preserving recently used remote address: [AF_INET]5.253.206.171:443
20210301 13:46:05 Socket Buffers: R=[87380->1048576] S=[16384->1048576]
20210301 13:46:05 I Attempting to establish TCP connection with [AF_INET]5.253.206.171:443 [nonblock]
20210301 13:46:05 I TCP connection established with [AF_INET]5.253.206.171:443
20210301 13:46:05 W --mtu-disc is not supported on this OS
20210301 13:46:05 I TCP_CLIENT link local: (not bound)
20210301 13:46:05 I TCP_CLIENT link remote: [AF_INET]5.253.206.171:443
20210301 13:46:05 TLS: Initial packet from [AF_INET]5.253.206.171:443 sid=8753c879 9e29c69e
20210301 13:46:05 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210301 13:46:05 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210301 13:46:05 NOTE: --mute triggered...
20210301 13:46:05 6 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:05 I [pl147.nordvpn.com] Peer Connection Initiated with [AF_INET]5.253.206.171:443
20210301 13:46:06 SENT CONTROL [pl147.nordvpn.com]: 'PUSH_REQUEST' (status=1)
20210301 13:46:06 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 dhcp-option DNS 103.86.96.100 dhcp-option DNS 103.86.99.100 sndbuf 524288 rcvbuf 524288 explicit-exit-notify comp-lzo no route-gateway 10.7.1.1 topology subnet ping 60 ping-restart 180 ifconfig 10.7.1.5 255.255.255.0 peer-id 0'
20210301 13:46:06 OPTIONS IMPORT: timers and/or timeouts modified
20210301 13:46:06 NOTE: --mute triggered...
20210301 13:46:06 3 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:06 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
20210301 13:46:06 OPTIONS IMPORT: --ifconfig/up options modified
20210301 13:46:06 OPTIONS IMPORT: route options modified
20210301 13:46:06 OPTIONS IMPORT: route-related options modified
20210301 13:46:06 NOTE: --mute triggered...
20210301 13:46:06 3 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:06 Using peer cipher 'AES-256-CBC'
20210301 13:46:06 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
20210301 13:46:06 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
20210301 13:46:06 NOTE: --mute triggered...
20210301 13:46:06 2 variation(s) on previous 3 message(s) suppressed by --mute
20210301 13:46:06 I Preserving previous TUN/TAP instance: tun0
20210301 13:46:06 I NOTE: Pulled options changed on restart will need to close and reopen TUN/TAP device.
20210301 13:46:06 I /tmp/openvpncl/route-down.sh tun0 1500 1659 10.7.2.2 255.255.255.0 init
20210301 13:46:06 net_route_v4_del: 5.253.206.171/32 via XXXXXXXXXXXXXXXXXXXX dev [NULL] table 0 metric -1
20210301 13:46:06 net_route_v4_del: 0.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
20210301 13:46:06 net_route_v4_del: 128.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
20210301 13:46:06 Closing TUN/TAP interface
20210301 13:46:06 I net_addr_v4_del: 10.7.2.2 dev tun0
20210301 13:46:07 net_route_v4_best_gw query: dst 0.0.0.0
20210301 13:46:07 net_route_v4_best_gw result: via XXXXXXXXXX dev eth0
20210301 13:46:07 I TUN/TAP device tun0 opened
20210301 13:46:07 I net_iface_mtu_set: mtu 1500 for tun0
20210301 13:46:07 I net_iface_up: set tun0 up
20210301 13:46:07 I net_addr_v4_add: 10.7.1.5/24 dev tun0
20210301 13:46:07 net_route_v4_add: 5.253.206.171/32 via XXXXXXXXXXdev [NULL] table 0 metric -1
20210301 13:46:07 net_route_v4_add: 0.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210301 13:46:07 net_route_v4_add: 128.0.0.0/1 via 10.7.1.1 dev [NULL] table 0 metric -1
20210301 13:46:08 I Initialization Sequence Completed
20210301 14:46:06 VERIFY OK: depth=2 C=PA O=NordVPN CN=NordVPN Root CA
20210301 14:46:06 VERIFY OK: depth=1 C=PA O=NordVPN CN=NordVPN CA5
20210301 14:46:06 VERIFY KU OK
20210301 14:46:06 NOTE: --mute triggered...
20210301 15:43:52 9 variation(s) on previous 3 message(s) suppressed by --mute
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'state'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'state'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'state'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'status 2'
20210301 15:43:52 MANAGEMENT: Client disconnected
20210301 15:43:52 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20210301 15:43:52 D MANAGEMENT: CMD 'log 500'
19700101 01:00:00

Połączony z 01 marca 2021 16:09:34:
Jak wyłącze auth no cache


mam takie info

20210301 16:07:22 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this


Dlatego też to dodałem Smile
Edytowany przez forest75 dnia 01-03-2021 16:09
 
solldat
Narazie nie mam pomysłu o co kaman... a tak z ciekawości, dlaczego masz ustawiony port 443? i to jeszcze na TCP?
Edytowany przez solldat dnia 01-03-2021 17:09
Zaprawdę wódka jest potężna, lecz bimber większą mocą włada.
 
forest75
Tcp żeby mieć potwierdzenia zwrotne, przy udp po transmisji nie masz potwierdzenia odbioru, jeżeli NORD to obsługuje to chyba tylko lepiej dla mnie Smile
 
khain
Dostajesz sygnał SIGUSR1: "This signal may also be internally generated by a timeout condition, governed by the -ping-restart option." https://openvpn.net/community-resourc...envpn-2-4/
W konfigu klienta masz ustawione

 ping-restart 0
choć w logu klienta masz ping-restart 180, które przychodzi z serwera, więc można spróbować zmienić tą wartość na serwerze.
Poczytaj też o parametrze keepalive i o tym dlaczego należy stosować auth-nocache.
Edytowany przez khain dnia 03-03-2021 22:22
 
Przejdź do forum
Zaloguj
Wprowadź adres e-mail lub nazwę użytkownika

Hasło



Nie masz jeszcze konta? Zarejestruj się.

Zapomniałeś/aś hasła?
Aktualnie online
· Gości online: 4

· Użytkowników online: 0

· Łącznie użytkowników: 24,116
· Najnowszy użytkownik: Ja
Czat
Musisz się zalogować, aby opublikować wiadomość.

shibby
12-02-2024 11:03
MTU zależy od typu połączenia. Inne jest dla połączenia kablowego inne dla wdzwanianego (pppoe)

PanRatio
11-02-2024 10:02
Jak podłączę Funboxa6 do światłowodu, to ma MTU 1540, a we FreshTomato max to MTU 1500 i samo zmienia na 1492. Tak ma być?

tamtosiamto
04-02-2024 10:36
jakby cos, to mam w dobrej cenie dir868l juz przerobiony na AC66U_B1 Grin i ac56u przerobiony na ac68u(dziala aimesh) tyle ze z wlacznikiem na zapalke Smile

Adooni
03-02-2024 10:36
widze ze oba sa na aledrogo i u nas mozesz sprawdzac w dziale sprzedam

Adooni
03-02-2024 10:34
zakladam że mowisz o używkach masz np Asus RT-AC56U, D-Link DIR-868L (jak go nie przerobisz na Asus RT-AC66U_B1) to FT ma specialny build nvram 32k)

vechio
01-02-2024 09:29
Cześć, czy istnieje jakiś 'odpowiednik'
; WNR3500Lv2 z 5GHz i z TYLKO wewnętrznymi antenami + ze wsparciem dla FreshTomato?

tamtosiamto
29-01-2024 21:59
to linux, raczej nie masz tak duzego, ktorego nie obsluzy

RaTaJ
28-01-2024 23:08
Dzień Dobry jaki max dysk USB można podłączyć pod NetGear WNRL3500Lv2?

Adooni
01-01-2024 09:44
Wszystkiego najlepszego w nowym roku. Jaka macie sprawdzoną antenkę do E3372S?

Adooni
25-12-2023 08:34
ja kupilem ale ostatecznie oddalem i wzialem Cudy WR3000. Bardzo dobrze dziala z OpenWRT zabawy jest z wi-fi aby znalesc kanal ktory dziala na 160. Nowyszy HW w porownaniu do x6 i 2 razy mniejszy

69,306,695 unikalnych wizyt