VPn will not connect

I recently bought a GL-A1300/Slate Plus to use as a travel router. My VPN is Cyberghost. It refuses to connect to the service. Here is the log data: It ends up saying it can find file or directory. Hope someone can help.
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Rule 'wan_in_conn_mark'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Rule 'lan_in_conn_mark_restore'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Rule 'out_conn_mark_restore'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Zone 'lan'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Zone 'wan'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Zone 'guest'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Zone 'ovpnclient'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Set tcp_ecn to off
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Set tcp_syncookies to on
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Set tcp_window_scaling to on
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Running script '/etc/firewall.nat6'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Running script '/var/etc/gls2s.include'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): ! Skipping due to path error: No such file or directory
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Running script '/usr/bin/gl_block.sh'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): * Running script '/etc/firewall.vpn_server_policy.sh'
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): Failed to parse json data: unexpected character
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): uci: Entry not found
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 09:17:55 2024 daemon.notice netifd: ovpnclient (23309): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

None of these log files show the issue. Could you please try to post the complete log?

Here is the complete log. It seems to do one set at start, then another at the failure. Thank you for your help. Routers are not my strong suit and this is my first attempt at using a travel router with VPN.

Here is the first set.

Sun Oct 13 13:56:35 2024 daemon.warn ovpnclient[16070]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: TCP/UDP: Preserving recently used remote address: [AF_INET]191.96.227.175:443
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: UDP link local: (not bound)
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: UDP link remote: [AF_INET]191.96.227.175:443
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: TLS: Initial packet from [AF_INET]191.96.227.175:443, sid=17c0df6f ba6fa1cb
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: VERIFY KU OK
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Validating certificate extended key usage
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: VERIFY EKU OK
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: VERIFY OK: depth=0, CN=newyork-rack421.nodes.gen4.ninja
Sun Oct 13 13:56:35 2024 daemon.warn ovpnclient[16070]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1553'
Sun Oct 13 13:56:35 2024 daemon.warn ovpnclient[16070]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
Sun Oct 13 13:56:35 2024 daemon.notice ovpnclient[16070]: [newyork-rack421.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]191.96.227.175:443

And then the failure

Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Rule 'wan_in_conn_mark'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Rule 'lan_in_conn_mark_restore'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Rule 'out_conn_mark_restore'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Zone 'lan'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Zone 'wan'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Zone 'guest'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    * Zone 'ovpnclient'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Set tcp_ecn to off
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Set tcp_syncookies to on
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Set tcp_window_scaling to on
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Running script '/etc/firewall.nat6'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Running script '/var/etc/gls2s.include'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):    ! Skipping due to path error: No such file or directory
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Running script '/usr/bin/gl_block.sh'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166):  * Running script '/etc/firewall.vpn_server_policy.sh'
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166): Failed to parse json data: unexpected character
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166): uci: Entry not found
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory
Sun Oct 13 13:57:05 2024 daemon.notice netifd: ovpnclient (17166): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

There is still not issue in this logs.

Can you please post the full log from Oct 13 13:56:35 until Oct 13 13:57:05 but without a gap?
Please don't truncate based on what you guess might be interesting or not :wink:

Does the VPN work from another device (phone, laptop) when you are in the same network like you tried with your Slate Plus?

1 Like

The problem is I don't get a continuous feed. The log window displays some data, then clears and displays some new entries. It does this about every 10 seconds. Here is a lengthly copy and paste on a retry

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Set tcp_window_scaling to on

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/etc/firewall.nat6'

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/var/etc/gls2s.include'

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): ! Skipping due to path error: No such file or directory

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/usr/bin/gl_block.sh'

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): * Running script '/etc/firewall.vpn_server_policy.sh'

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): Failed to parse json data: unexpected character

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): uci: Entry not found

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Sun Oct 13 14:41:55 2024 daemon.notice netifd: ovpnclient (30215): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Sun Oct 13 14:42:00 2024 daemon.notice netifd: Interface 'ovpnclient' is now down

Sun Oct 13 14:42:00 2024 user.notice firewall: Reloading firewall due to ifdown of ovpnclient ()

Sun Oct 13 14:42:27 2024 daemon.notice netifd: Interface 'ovpnclient' is setting up now

Sun Oct 13 14:42:27 2024 daemon.warn ovpnclient[30918]: DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6

Sun Oct 13 14:42:27 2024 daemon.warn ovpnclient[30918]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.

Sun Oct 13 14:42:27 2024 daemon.notice ovpnclient[30918]: OpenVPN 2.5.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]

Sun Oct 13 14:42:27 2024 daemon.notice ovpnclient[30918]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10

Sun Oct 13 14:42:27 2024 daemon.warn ovpnclient[30918]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Sun Oct 13 14:42:27 2024 daemon.notice ovpnclient[30918]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]

Sun Oct 13 14:42:34 2024 daemon.warn ovpnclient[31135]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: TCP/UDP: Preserving recently used remote address: [AF_INET]102.165.48.95:443

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: Socket Buffers: R=[180224->180224] S=[180224->180224]

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: UDP link local: (not bound)

Sun Oct 13 14:42:34 2024 daemon.notice ovpnclient[31135]: UDP link remote: [AF_INET]102.165.48.95:443

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: TLS: Initial packet from [AF_INET]102.165.48.95:443, sid=84ad0304 7cbcb27c

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY KU OK

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: Validating certificate extended key usage

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY EKU OK

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: VERIFY OK: depth=0, CN=washington-rack403.nodes.gen4.ninja

Sun Oct 13 14:42:36 2024 daemon.warn ovpnclient[31135]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1553'

Sun Oct 13 14:42:36 2024 daemon.warn ovpnclient[31135]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256

Sun Oct 13 14:42:36 2024 daemon.notice ovpnclient[31135]: [washington-rack403.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]102.165.48.95:443

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Rule 'wan_in_conn_mark'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Rule 'lan_in_conn_mark_restore'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Rule 'out_conn_mark_restore'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'lan'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'wan'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'guest'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Zone 'ovpnclient'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Set tcp_ecn to off

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Set tcp_syncookies to on

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Set tcp_window_scaling to on

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/etc/firewall.nat6'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/var/etc/gls2s.include'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): ! Skipping due to path error: No such file or directory

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/usr/bin/gl_block.sh'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): * Running script '/etc/firewall.vpn_server_policy.sh'

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): Failed to parse json data: unexpected character

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): uci: Entry not found

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Sun Oct 13 14:42:45 2024 daemon.notice netifd: ovpnclient (31455): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Sun Oct 13 14:42:56 2024 daemon.warn ovpnclient[31899]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: TCP/UDP: Preserving recently used remote address: [AF_INET]184.170.240.247:443

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Socket Buffers: R=[180224->180224] S=[180224->180224]

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: UDP link local: (not bound)

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: UDP link remote: [AF_INET]184.170.240.247:443

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: TLS: Initial packet from [AF_INET]184.170.240.247:443, sid=4a9c8823 614ee122

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY KU OK

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: Validating certificate extended key usage

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY EKU OK

Sun Oct 13 14:42:56 2024 daemon.notice ovpnclient[31899]: VERIFY OK: depth=0, CN=phoenix-rack456.nodes.gen4.ninja

Sun Oct 13 14:42:57 2024 daemon.warn ovpnclient[31899]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1553'

Sun Oct 13 14:42:57 2024 daemon.warn ovpnclient[31899]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'

Sun Oct 13 14:42:57 2024 daemon.notice ovpnclient[31899]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256

Sun Oct 13 14:42:57 2024 daemon.notice ovpnclient[31899]: [phoenix-rack456.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]184.170.240.247:443

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Rule 'wan_in_conn_mark'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Rule 'lan_in_conn_mark_restore'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Rule 'out_conn_mark_restore'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'lan'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'wan'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'guest'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Zone 'ovpnclient'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Set tcp_ecn to off

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Set tcp_syncookies to on

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Set tcp_window_scaling to on

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/etc/firewall.nat6'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/etc/firewall.swap_wan_in_conn_mark.sh'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/var/etc/gls2s.include'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): ! Skipping due to path error: No such file or directory

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/usr/bin/gl_block.sh'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): * Running script '/etc/firewall.vpn_server_policy.sh'

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): Failed to parse json data: unexpected character

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): uci: Entry not found

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

I don't see any "big" issues here that would explain why it does not work.
The VPN will stay yellow inside the GUI?

Yes and no internet is available while its trying to connect. Is there no concern with the lines
Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): Failed to parse json data: unexpected character

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): uci: Entry not found

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Sun Oct 13 14:43:06 2024 daemon.notice netifd: ovpnclient (32246): cat: can't open '/tmp/run/ovpn_resolved_ip': No such file or directory

Nah, they are fine. It's just usual log noise.

Thanks for looking at them.

Yes, I'm getting the same issue on my iphone and ipad

Do you try to access VPN from a country that does not like VPN?

I'm in the US trying to connect to US. It accepts the config file from CyberGhost, but it just continuously says "The client is starting please wait" I've tried several times with both the UDP and TCP options. Ive followed both the CyberGhost and GL docs to no avail. Getting ready to send this router back to Amazon and get one recommended by CyberGhost. I've spent at least 12 hrs trying to get this to work.

If your iPad and iPhone doesn't work as well, it's not an router issue.

Are there settings I need to look at in my main router? I have the GL using the repeating function for my TP link router. I did try plugging it into the LAN and got the same issure.

Nevermind, I unplugged the GL and connected directly into the cable modem. I'm at a loss now

Do you have the VPN issue even without the GL?

CyberGhost runs fine when installed on my desktop. I want to use the router while traveling.

I solved it! When manually configuring a device in CyberGhost, it comes up with it's own credentials.


When I load the config file in the GL, it asks for more credentials which I assumed it was asking for my login/password. When I used the credentials from the screen shot, all went well.
Thank you all for your help. I sure learned a lot more than I knew about routers today and yesterday.

Client applications work different to routers.
Did you upgrade the router to the newest firmware already?