Good Morning,
I recently purchased the Beryl AX and am trying to make the repeater work with vpn. I am able to connect to the public network internet but when I try to start the vpn then it just keeps saying connecting. I have tried several fixes from other topics but still unable to get it to work. I tried changing from global to auto and on/off ip masquerading. Can someone help/ provide suggestions please. Thank you in advance. Here is the log from this Morning:
“Wed Oct 4 08:58:18 2023 daemon.notice ovpnclient[15270]: Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication\nWed Oct 4 08:58:18 2023 daemon.notice ovpnclient[15270]: TCP/UDP: Preserving recently used remote address: [AF_INET]2.56.190.20:1194\nWed Oct 4 08:58:18 2023 daemon.notice ovpnclient[15270]: Socket Buffers: R=[212992->212992] S=[212992->212992]\nWed Oct 4 08:58:18 2023 daemon.notice ovpnclient[15270]: UDP link local: (not bound)\nWed Oct 4 08:58:18 2023 daemon.notice ovpnclient[15270]: UDP link remote: [AF_INET]2.56.190.20:1194\nWed Oct 4 08:59:19 2023 daemon.err ovpnclient[15270]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)\nWed Oct 4 08:59:19 2023 daemon.err ovpnclient[15270]: TLS Error: TLS handshake failed\nWed Oct 4 08:59:19 2023 daemon.notice ovpnclient[15270]: SIGHUP[soft,tls-error] received, process restarting\nWed Oct 4 08:59:19 2023 daemon.warn ovpnclient[15270]: DEPRECATED OPTION: --cipher set to ‘AES-256-CBC’ but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add ‘AES-256-CBC’ to --data-ciphers or change --cipher ‘AES-256-CBC’ to --data-ciphers-fallback ‘AES-256-CBC’ to silence this warning.\nWed Oct 4 08:59:19 2023 daemon.notice ovpnclient[15270]: OpenVPN 2.5.3 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]\nWed Oct 4 08:59:19 2023 daemon.notice ovpnclient[15270]: library versions: OpenSSL 1.1.1q 5 Jul 2022, LZO 2.10\nWed Oct 4 08:59:19 2023 daemon.notice ovpnclient[15270]: Restart pause, 5 second(s)\nWed Oct 4 08:59:24 2023 daemon.warn ovpnclient[15270]: WARNING: --ping should normally be used with --ping-restart or --ping-exit\nWed Oct 4 08:59:24 2023 daemon.warn ovpnclient[15270]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts\nWed Oct 4 08:59:24 2023 daemon.not
ice ovpnclient[15270]: Outgoing Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication\nWed Oct 4 08:59:24 2023 daemon.notice ovpnclient[15270]: Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication\nWed Oct 4 08:59:24 2023 daemon.notice ovpnclient[15270]: TCP/UDP: Preserving recently used remote address: [AF_INET]2.56.190.20:1194\nWed Oct 4 08:59:24 2023 daemon.notice ovpnclient[15270]: Socket Buffers: R=[212992->212992] S=[212992->212992]\nWed Oct 4 08:59:24 2023 daemon.notice ovpnclient[15270]: UDP link local: (not bound)\nWed Oct 4 08:59:24 2023 daemon.notice ovpnclient[15270]: UDP link remote: [AF_INET]2.56.190.20:1194\n”