![]() We will also discuss some of the benefits and drawbacks of each method. In this blog post, we will show you three different ways to find your gateway IP address. :54161 Peer Connection Initiated with :54161Ĭlient1/:54161 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)Ĭlient1/:54161 MULTI: Learn: 10.8.0.6 -> client1/:54161Ĭlient1/:54161 MULTI: primary virtual IP for client1/:54161: 10.8.0.6Ĭlient1/:54161 PUSH: Received control message: 'PUSH_REQUEST'Ĭlient1/:54161 send_push_reply(): safe_cap=940Ĭlient1/:54161 SENT CONTROL : 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.Finding your gateway IP address in Linux can be a little tricky if you don’t know where to look. :54161 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA :54161 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication :54161 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key :54161 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication :54161 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key MULTI: primary virtual IP for client1/:54604: 10.8.0.6Ĭlient1/:54604 PUSH: Received control message: 'PUSH_REQUEST'Ĭlient1/:54604 send_push_reply(): safe_cap=940Ĭlient1/:54604 SENT CONTROL : 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)Ĭlient1/:54604 Inactivity timeout (-ping-restart), restartingĬlient1/:54604 SIGUSR1 received, client-instance restarting MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled) Remember to use the -duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. :54604 Peer Connection Initiated with :54604 :54604 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA :54604 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication :54604 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key :54604 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication :54604 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key :36786 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA ![]() :36786 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication :36786 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key :36786 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication :36786 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key :36786 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo' :36786 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1541' This is my openvpn.log: OpenVPN 2.3.2 x86_64-suse-linux-gnu built on May 31 2013ĭiffie-Hellman initialized with 2048 bit key The connection is working via OpenVPN, but I cannot use the Internetconnection or even "ping". I installed OpenVPN on my openSuse 13.1 Server with this manual: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |