Wireguard failed? openvpn Failed either?

in A1300, i never can use the client side , show error, anyone can help?

“Sun May 21 11:39:09 2023 daemon.notice netifd: Interface ‘wgclient’ is setting up now\nSun May 21 11:39:15 2023 kern.info kernel: [ 214.253288] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:21 2023 kern.info kernel: [ 220.013597] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:27 2023 kern.info kernel: [ 225.769343] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:33 2023 kern.info kernel: [ 231.530838] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:38 2023 kern.info kernel: [ 237.290581] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:44 2023 kern.info kernel: [ 243.044777] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:50 2023 kern.info kernel: [ 248.804030] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:39:55 2023 kern.info kernel: [ 253.844080] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:40:00 2023 kern.info kernel: [ 259.044075] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:40:06 2023 daemon.notice netifd: Interface ‘wgclient’ is now down\nSun May 21 11:40:07 2023 user.notice mwan3[19498]: Execute ifdown event on interface wgclient (unknown)\nSun May 21 11:40:08 2023 user.notice firewall: Reloading firewall due to ifdown of wgclient ()\nSun May 21 11:40:52 2023 daemon.notice netifd: Interface ‘wgclient’ is setting up now\nSun May 21 11:40:58 2023 kern.info kernel: [ 316.666763] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:41:03 2023 kern.info kernel: [ 322.400334] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\nSun May 21 11:41:09 2023 kern.info kernel: [ 328.159896] wireguard: wireguard-hotplug IFNAME=wgclient ACTION=REKEY-TIMEOUT\n”

for Openvpn client side also shows error:

“Sun May 21 16:38:29 2023 daemon.notice ovpnclient[28216]: TCP/UDP: Preserving recently used remote address: [AF_INET]34.96.XX.XX:1212\nSun May 21 16:38:29 2023 daemon.notice ovpnclient[28216]: Socket Buffers: R=[180224->180224] S=[180224->180224]\nSun May 21 16:38:29 2023 daemon.notice ovpnclient[28216]: UDP link local: (not bound)\nSun May 21 16:38:29 2023 daemon.notice ovpnclient[28216]: UDP link remote: [AF_INET]34.96.XX.XX:1212\nSun May 21 16:39:29 2023 daemon.err ovpnclient[28216]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)\nSun May 21 16:39:29 2023 daemon.err ovpnclient[28216]: TLS Error: TLS handshake failed\nSun May 21 16:39:29 2023 daemon.notice ovpnclient[28216]: SIGHUP[soft,tls-error] received, process restarting\nSun May 21 16:39:29 2023 daemon.warn ovpnclient[28216]: DEPRECATED OPTION: --cipher set to ‘AES-256-CBC’ but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add ‘AES-256-CBC’ to --data-ciphers or change --cipher ‘AES-256-CBC’ to --data-ciphers-fallback ‘AES-256-CBC’ to silence this warning.\nSun May 21 16:39:29 2023 daemon.notice ovpnclient[28216]: OpenVPN 2.5.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]\nSun May 21 16:39:29 2023 daemon.notice ovpnclient[28216]: library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10\nSun May 21 16:39:29 2023 daemon.notice ovpnclient[28216]: Restart pause, 5 second(s)\nSun May 21 16:39:34 2023 daemon.warn ovpnclient[28216]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: Outgoing Control Channel Encryption: Cipher ‘AES-256-CTR’ initialized with 256 bit key\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: Outgoing Control Channel Encryption: Using 256 bit message hash ‘SHA256’ for HMAC authentication\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: Incoming Control Channel Encryption: Cipher ‘AES-256-CTR’ initialized with 256 bit key\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: Incoming Control Channel Encryption: Using 256 bit message hash ‘SHA256’ for HMAC authentication\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: TCP/UDP: Preserving recently used remote address: [AF_INET]34.96.XX.XX:1212\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: Socket Buffers: R=[180224->180224] S=[180224->180224]\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: UDP link local: (not bound)\nSun May 21 16:39:34 2023 daemon.notice ovpnclient[28216]: UDP link remote: [AF_INET]34.96.xx.xx:1212\n”

Which firmware version are you using?You can try to use the latest version to check, I don’t have a1300 now, I can’t verify this, if the latest firmware version also has problems, please send the corresponding log and configuration information