Travel Router - openvpn

I have a GL-SFT1200 travel router and am currently traveling. Its my first time trying to have it setup to use my home (US) openvpn. I have been having some issues as it will not connect. I appreciate help from anyone. Thanks

I would recommend to switch to WireGuard as the performance is better. See Build your own WireGuard Home Server with two GL.iNet Routers - GL.iNet Router Docs 4

If you want to stay with OVPN, read How to set up an OpenVPN server on a GL.iNet router - GL.iNet Router Docs 4 instead.

Please keep in mind that there are countries where both methods will be blocked.

Tried the openvpn and still no luck. any tech person i can contact to help me out?

Please provide your logs, your setup and the error messages.

Fri Jan 17 11:30:38 2025 daemon.notice ovpnclient[6573]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 17 11:30:38 2025 daemon.notice ovpnclient[6573]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 17 11:30:38 2025 daemon.notice ovpnclient[6573]: TCP/UDP: Preserving recently used remote address: [AF_INET]69.213.247.85:1194
Fri Jan 17 11:30:38 2025 daemon.notice ovpnclient[6573]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Fri Jan 17 11:30:38 2025 daemon.notice ovpnclient[6573]: Attempting to establish TCP connection with [AF_INET]69.213.247.85:1194 [nonblock]
Fri Jan 17 11:30:39 2025 daemon.notice ovpnclient[6573]: TCP connection established with [AF_INET]69.213.247.85:1194
Fri Jan 17 11:30:39 2025 daemon.notice ovpnclient[6573]: TCP_CLIENT link local: (not bound)
Fri Jan 17 11:30:39 2025 daemon.notice ovpnclient[6573]: TCP_CLIENT link remote: [AF_INET]69.213.247.85:1194
Fri Jan 17 11:30:39 2025 daemon.notice ovpnclient[6573]: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Fri Jan 17 11:30:39 2025 daemon.notice ovpnclient[6573]: TLS: Initial packet from [AF_INET]69.213.247.85:1194, sid=92db9188 8770964d
Fri Jan 17 11:30:40 2025 daemon.notice ovpnclient[6573]: VERIFY OK: depth=1, C=US, ST=New York, L=New York, O=Ubiquiti Inc., OU=UniFi_OpenVPN_CA, CN=UniFi_OpenVPN_CA
Fri Jan 17 11:30:40 2025 daemon.notice ovpnclient[6573]: VERIFY KU OK
Fri Jan 17 11:30:40 2025 daemon.notice ovpnclient[6573]: Validating certificate extended key usage
Fri Jan 17 11:30:40 2025 daemon.notice ovpnclient[6573]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jan 17 11:30:40 2025 daemon.notice ovpnclient[6573]: VERIFY EKU OK
Fri Jan 17 11:30:40 2025 daemon.notice ovpnclient[6573]: VERIFY OK: depth=0, C=US, ST=New York, L=New York, O=Ubiquiti Inc., OU=UniFi_OpenVPN_Server, CN=UniFi_OpenVPN_Server
Fri Jan 17 11:30:42 2025 daemon.warn ovpnclient[6573]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1560', remote='link-mtu 1544'
Fri Jan 17 11:30:42 2025 daemon.warn ovpnclient[6573]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Fri Jan 17 11:30:42 2025 daemon.notice ovpnclient[6573]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Fri Jan 17 11:30:42 2025 daemon.notice ovpnclient[6573]: [UniFi_OpenVPN_Server] Peer Connection Initiated with [AF_INET]69.213.247.85:1194