sukkimabubu Posted October 21, 2020 Share Posted October 21, 2020 Hey, XR700 using hybrid VPN from nordVPN with TCP file. From time to time my connections is failing, anyone who can read the log file, and help me find a solution or atleast a reason? Once every hour its running a check starting with "TLS: tls_process......", 21 october 05:50 shit got real. Help anyone :D I removed all ip adresses and replaced with IP. Wed Oct 21 03:13:22 2020 TLS: tls_process: killed expiring key Wed Oct 21 03:13:23 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Wed Oct 21 03:13:23 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Wed Oct 21 03:13:23 2020 VERIFY KU OK Wed Oct 21 03:13:23 2020 Validating certificate extended key usage Wed Oct 21 03:13:23 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Oct 21 03:13:23 2020 VERIFY EKU OK Wed Oct 21 03:13:23 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com Wed Oct 21 03:13:23 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 03:13:23 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 03:13:23 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Wed Oct 21 04:13:22 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Wed Oct 21 04:13:22 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Wed Oct 21 04:13:22 2020 VERIFY KU OK Wed Oct 21 04:13:22 2020 Validating certificate extended key usage Wed Oct 21 04:13:22 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Oct 21 04:13:22 2020 VERIFY EKU OK Wed Oct 21 04:13:22 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com Wed Oct 21 04:13:23 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 04:13:23 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 04:13:23 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Wed Oct 21 05:13:22 2020 TLS: tls_process: killed expiring key Wed Oct 21 05:13:22 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Wed Oct 21 05:13:22 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Wed Oct 21 05:13:22 2020 VERIFY KU OK Wed Oct 21 05:13:22 2020 Validating certificate extended key usage Wed Oct 21 05:13:22 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Oct 21 05:13:22 2020 VERIFY EKU OK Wed Oct 21 05:13:22 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com Wed Oct 21 05:13:22 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 05:13:22 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 05:13:22 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Wed Oct 21 05:50:57 2020 Connection reset, restarting [-1] Wed Oct 21 05:50:57 2020 SIGUSR1[soft,connection-reset] received, process restarting Wed Oct 21 05:50:57 2020 Restart pause, 5 second(s) Wed Oct 21 05:51:02 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Wed Oct 21 05:51:02 2020 NOTE: --fast-io is disabled since we are not using UDP Wed Oct 21 05:51:02 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]IP Wed Oct 21 05:51:02 2020 Socket Buffers: R=[87380->327680] S=[16384->327680] Wed Oct 21 05:51:02 2020 Attempting to establish TCP connection with [AF_INET]IP [nonblock] Wed Oct 21 05:51:03 2020 TCP connection established with [AF_INET]IP Wed Oct 21 05:51:03 2020 TCP_CLIENT link local: (not bound) Wed Oct 21 05:51:03 2020 TCP_CLIENT link remote: [AF_INET] IP Wed Oct 21 05:51:03 2020 TLS: Initial packet from [AF_INET]IP, sid=b5361e54 ee6babbf Wed Oct 21 05:51:03 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Wed Oct 21 05:51:03 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Wed Oct 21 05:51:03 2020 VERIFY KU OK Wed Oct 21 05:51:03 2020 Validating certificate extended key usage Wed Oct 21 05:51:03 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Oct 21 05:51:03 2020 VERIFY EKU OK Wed Oct 21 05:51:03 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com Wed Oct 21 05:51:03 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Wed Oct 21 05:51:03 2020 [dk221.nordvpn.com] Peer Connection Initiated with [AF_INET]IP Wed Oct 21 05:51:04 2020 SENT CONTROL [dk221.nordvpn.com]: 'PUSH_REQUEST' (status=1) Wed Oct 21 05:51:04 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig IP,peer-id 0,cipher AES-256-GCM' Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: timers and/or timeouts modified Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: compression parms modified Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Wed Oct 21 05:51:04 2020 Socket Buffers: R=[327680->327680] S=[327680->327680] Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --ifconfig/up options modified Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: route options modified Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: route-related options modified Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: peer-id set Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: adjusting link_mtu to 1659 Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: data channel crypto options modified Wed Oct 21 05:51:04 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Wed Oct 21 05:51:04 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 05:51:04 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Oct 21 05:51:04 2020 Preserving previous TUN/TAP instance: tun0 Wed Oct 21 05:51:04 2020 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device. Wed Oct 21 05:51:04 2020 Closing TUN/TAP interface Wed Oct 21 05:51:04 2020 /sbin/ifconfig tun0 0.0.0.0 Wed Oct 21 05:51:04 2020 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpndown 4 tun0 1500 1587 IP init openvpn-event.lua: bad argument #3 to 'format' (string expected, got nil) -> stack traceback: ?: in function <?:73> [C]: in function 'format' ?: in function 'safe_execute' ?: in function '?' ?: in function 'on_vpn_down' ?: in function '?' ?: in function '?' ?: in function '?' ?: in function <?:48> [C]: in function 'xpcall' ?: in function 'try' ?: in function <?:46> [C]: in function 'run' ?: in function <?:356> [C]: in function 'xpcall' ?: in function 'try' ?: in function <?:261> (tail call): ? /dumaos/api/cli.lua:48: in function </dumaos/api/cli.lua:30> [C]: in function 'xpcall' /dumaos/api/cli.lua:59: in main chunk [C]: ? Wed Oct 21 05:51:04 2020 WARNING: Failed running command (--up/--down): external program exited with error status: 3 Wed Oct 21 05:51:04 2020 Exiting due to fatal error Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted October 21, 2020 Administrators Share Posted October 21, 2020 Hey, welcome to the forum! Add --keepalive 10 30 to your config and see if that helps it to sustain a connection. Link to comment Share on other sites More sharing options...
sukkimabubu Posted October 21, 2020 Author Share Posted October 21, 2020 Like this??? keepalive with BOLD client dev tun proto tcp remote 185.245.84.83 443 resolv-retry infinite remote-random nobind tun-mtu 1500 tun-mtu-extra 32 mssfix 1450 persist-key persist-tun ping 15 ping-restart 0 ping-timer-rem reneg-sec 0 comp-lzo no keepalive 10 30 remote-cert-tls server auth-user-pass verb 3 pull fast-io cipher AES-256-CBC auth SHA512 <ca> -----BEGIN CERTIFICATE----- MIIFCjCCAvKgAwIBAgIBATANBgkqhkiG9w0BAQ0FADA5MQswCQYDVQQGEwJQQTEQ MA4GA1UEChMHTm9yZFZQTjEYMBYGA1UEAxMPTm9yZFZQTiBSb290IENBMB4XDTE2 MDEwMTAwMDAwMFoXDTM1MTIzMTIzNTk1OVowOTELMAkGA1UEBhMCUEExEDAOBgNV BAoTB05vcmRWUE4xGDAWBgNVBAMTD05vcmRWUE4gUm9vdCBDQTCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAMkr/BYhyo0F2upsIMXwC6QvkZps3NN2/eQF kfQIS1gql0aejsKsEnmY0Kaon8uZCTXPsRH1gQNgg5D2gixdd1mJUvV3dE3y9FJr XMoDkXdCGBodvKJyU6lcfEVF6/UxHcbBguZK9UtRHS9eJYm3rpL/5huQMCppX7kU eQ8dpCwd3iKITqwd1ZudDqsWaU0vqzC2H55IyaZ/5/TnCk31Q1UP6BksbbuRcwOV skEDsm6YoWDnn/IIzGOYnFJRzQH5jTz3j1QBvRIuQuBuvUkfhx1FEwhwZigrcxXu MP+QgM54kezgziJUaZcOM2zF3lvrwMvXDMfNeIoJABv9ljw969xQ8czQCU5lMVmA 37ltv5Ec9U5hZuwk/9QO1Z+d/r6Jx0mlurS8gnCAKJgwa3kyZw6e4FZ8mYL4vpRR hPdvRTWCMJkeB4yBHyhxUmTRgJHm6YR3D6hcFAc9cQcTEl/I60tMdz33G6m0O42s Qt/+AR3YCY/RusWVBJB/qNS94EtNtj8iaebCQW1jHAhvGmFILVR9lzD0EzWKHkvy WEjmUVRgCDd6Ne3eFRNS73gdv/C3l5boYySeu4exkEYVxVRn8DhCxs0MnkMHWFK6 MyzXCCn+JnWFDYPfDKHvpff/kLDobtPBf+Lbch5wQy9quY27xaj0XwLyjOltpiST LWae/Q4vAgMBAAGjHTAbMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqG SIb3DQEBDQUAA4ICAQC9fUL2sZPxIN2mD32VeNySTgZlCEdVmlq471o/bDMP4B8g nQesFRtXY2ZCjs50Jm73B2LViL9qlREmI6vE5IC8IsRBJSV4ce1WYxyXro5rmVg/ k6a10rlsbK/eg//GHoJxDdXDOokLUSnxt7gk3QKpX6eCdh67p0PuWm/7WUJQxH2S DxsT9vB/iZriTIEe/ILoOQF0Aqp7AgNCcLcLAmbxXQkXYCCSB35Vp06u+eTWjG0/ pyS5V14stGtw+fA0DJp5ZJV4eqJ5LqxMlYvEZ/qKTEdoCeaXv2QEmN6dVqjDoTAo k0t5u4YRXzEVCfXAC3ocplNdtCA72wjFJcSbfif4BSC8bDACTXtnPC7nD0VndZLp +RiNLeiENhk0oTC+UVdSc+n2nJOzkCK0vYu0Ads4JGIB7g8IB3z2t9ICmsWrgnhd NdcOe15BincrGA8avQ1cWXsfIKEjbrnEuEk9b5jel6NfHtPKoHc9mDpRdNPISeVa wDBM1mJChneHt59Nh8Gah74+TM1jBsw4fhJPvoc7Atcg740JErb904mZfkIEmojC VPhBHVQ9LHBAdM8qFI2kRK0IynOmAZhexlP/aT/kpEsEPyaZQlnBn3An1CRz8h0S PApL8PytggYKeQmRhl499+6jLxcZ2IegLfqq41dzIjwHwTMplg+1pKIOVojpWA== -----END CERTIFICATE----- </ca> key-direction 1 <tls-auth> # # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key V1----- e685bdaf659a25a200e2b9e39e51ff03 0fc72cf1ce07232bd8b2be5e6c670143 f51e937e670eee09d4f2ea5a6e4e6996 5db852c275351b86fc4ca892d78ae002 d6f70d029bd79c4d1c26cf14e9588033 cf639f8a74809f29f72b9d58f9b8f5fe fc7938eade40e9fed6cb92184abb2cc1 0eb1a296df243b251df0643d53724cdb 5a92a1d6cb817804c4a9319b57d53be5 80815bcfcb2df55018cc83fc43bc7ff8 2d51f9b88364776ee9d12fc85cc7ea5b 9741c4f598c485316db066d52db4540e 212e1518a9bd4828219e24b20d88f598 a196c9de96012090e333519ae18d3509 9427e7b372d348d352dc4c85e18cd4b9 3f8a56ddb2e64eb67adfc9b337157ff4 -----END OpenVPN Static key V1----- </tls-auth> Link to comment Share on other sites More sharing options...
sukkimabubu Posted October 21, 2020 Author Share Posted October 21, 2020 32 minutes ago, Netduma Fraser said: Hey, welcome to the forum! Add --keepalive 10 30 to your config and see if that helps it to sustain a connection. thanks! This is the output after i put in --keepalive 10 30 Options error: --keepalive conflicts with --ping, --ping-exit, or --ping-restart. If you use --keepalive, you don't need any of the other --ping directives. Use --help for more information. Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted October 21, 2020 Administrators Share Posted October 21, 2020 Yes but put the two dashes before it as well, then remove these 3 entries: ping 15 ping-restart 0 ping-timer-rem Link to comment Share on other sites More sharing options...
sukkimabubu Posted October 21, 2020 Author Share Posted October 21, 2020 1 minute ago, Netduma Fraser said: Yes but put the two dashes before it as well, then remove these 3 entries: ping 15 ping-restart 0 ping-timer-rem Perfect, connected for now atleast! ill come back if it fails again 🙂 Thank you! Link to comment Share on other sites More sharing options...
sukkimabubu Posted October 22, 2020 Author Share Posted October 22, 2020 Failed again Thu Oct 22 15:10:30 2020 TLS: tls_process: killed expiring key Thu Oct 22 15:10:31 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Thu Oct 22 15:10:31 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Thu Oct 22 15:10:31 2020 VERIFY KU OK Thu Oct 22 15:10:31 2020 Validating certificate extended key usage Thu Oct 22 15:10:31 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Oct 22 15:10:31 2020 VERIFY EKU OK Thu Oct 22 15:10:31 2020 VERIFY OK: depth=0, CN=dk218.nordvpn.com Thu Oct 22 15:10:31 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Oct 22 15:10:31 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Oct 22 15:10:31 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Thu Oct 22 16:10:31 2020 TLS: tls_process: killed expiring key Thu Oct 22 16:10:32 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Thu Oct 22 16:10:32 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Thu Oct 22 16:10:32 2020 VERIFY KU OK Thu Oct 22 16:10:32 2020 Validating certificate extended key usage Thu Oct 22 16:10:32 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Oct 22 16:10:32 2020 VERIFY EKU OK Thu Oct 22 16:10:32 2020 VERIFY OK: depth=0, CN=dk218.nordvpn.com Thu Oct 22 16:10:33 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Oct 22 16:10:33 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Oct 22 16:10:33 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Thu Oct 22 16:45:51 2020 [dk218.nordvpn.com] Inactivity timeout (--ping-restart), restarting Thu Oct 22 16:45:51 2020 SIGUSR1[soft,ping-restart] received, process restarting Thu Oct 22 16:45:51 2020 Restart pause, 5 second(s) Thu Oct 22 16:45:56 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Thu Oct 22 16:45:56 2020 NOTE: --fast-io is disabled since we are not using UDP Thu Oct 22 16:45:56 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]IP Thu Oct 22 16:45:56 2020 Socket Buffers: R=[87380->327680] S=[16384->327680] Thu Oct 22 16:45:56 2020 Attempting to establish TCP connection with [AF_INET]IP [nonblock] Thu Oct 22 16:45:57 2020 TCP connection established with [AF_INET]IP Thu Oct 22 16:45:57 2020 TCP_CLIENT link local: (not bound) Thu Oct 22 16:45:57 2020 TCP_CLIENT link remote: [AF_INET]IP Thu Oct 22 16:45:57 2020 TLS: Initial packet from [AF_INET]IP, sid=d4f968b3 cb7ccb79 Thu Oct 22 16:45:57 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Thu Oct 22 16:45:57 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5 Thu Oct 22 16:45:57 2020 VERIFY KU OK Thu Oct 22 16:45:57 2020 Validating certificate extended key usage Thu Oct 22 16:45:57 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Oct 22 16:45:57 2020 VERIFY EKU OK Thu Oct 22 16:45:57 2020 VERIFY OK: depth=0, CN=dk218.nordvpn.com Thu Oct 22 16:45:57 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Thu Oct 22 16:45:57 2020 [dk218.nordvpn.com] Peer Connection Initiated with [AF_INET]IP Thu Oct 22 16:45:58 2020 SENT CONTROL [dk218.nordvpn.com]: 'PUSH_REQUEST' (status=1) Thu Oct 22 16:45:58 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS IP,dhcp-option DNS IP,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway IP,topology subnet,ping 60,ping-restart 180,ifconfig IP,peer-id 0,cipher AES-256-GCM' Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: timers and/or timeouts modified Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: compression parms modified Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Thu Oct 22 16:45:58 2020 Socket Buffers: R=[327680->327680] S=[327680->327680] Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --ifconfig/up options modified Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: route options modified Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: route-related options modified Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: peer-id set Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: adjusting link_mtu to 1659 Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: data channel crypto options modified Thu Oct 22 16:45:58 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Oct 22 16:45:58 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Oct 22 16:45:58 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Oct 22 16:45:58 2020 Preserving previous TUN/TAP instance: tun0 Thu Oct 22 16:45:58 2020 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device. Thu Oct 22 16:45:58 2020 Closing TUN/TAP interface Thu Oct 22 16:45:58 2020 /sbin/ifconfig tun0 0.0.0.0 Thu Oct 22 16:45:58 2020 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpndown 7 tun0 1500 1587 IP init openvpn-event.lua: bad argument #3 to 'format' (string expected, got nil) -> stack traceback: ?: in function <?:73> [C]: in function 'format' ?: in function 'safe_execute' ?: in function '?' ?: in function 'on_vpn_down' ?: in function '?' ?: in function '?' ?: in function '?' ?: in function <?:48> [C]: in function 'xpcall' ?: in function 'try' ?: in function <?:46> [C]: in function 'run' ?: in function <?:356> [C]: in function 'xpcall' ?: in function 'try' ?: in function <?:261> (tail call): ? /dumaos/api/cli.lua:48: in function </dumaos/api/cli.lua:30> [C]: in function 'xpcall' /dumaos/api/cli.lua:59: in main chunk [C]: ? Thu Oct 22 16:45:58 2020 WARNING: Failed running command (--up/--down): external program exited with error status: 3 Thu Oct 22 16:45:58 2020 Exiting due to fatal error Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted October 22, 2020 Administrators Share Posted October 22, 2020 I think it is probably an error with the VPN causing it to fail, I think the config is fine. What firmware version are you using currently? Link to comment Share on other sites More sharing options...
sukkimabubu Posted October 22, 2020 Author Share Posted October 22, 2020 41 minutes ago, Netduma Fraser said: I think it is probably an error with the VPN causing it to fail, I think the config is fine. What firmware version are you using currently? Hmm, ok, might check that one. V1.0.1.20 Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted October 22, 2020 Administrators Share Posted October 22, 2020 Try this one which is the latest please: http://kb.netgear.com/000062409 Link to comment Share on other sites More sharing options...
sukkimabubu Posted November 19, 2020 Author Share Posted November 19, 2020 Annnd im back Still having issues. I talked with my VPN provider which handed me some service credentials. The result was a more stable connection(for some reason), but still failing, but now with 1 week in between. Anything else i can try ? Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted November 19, 2020 Administrators Share Posted November 19, 2020 When it is dropping out after a week that is more likely the router having it's IP address changed/renewed so would kick you off for a brief second. I don't think it will be the config. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.