FOR TIPS, gUIDES & TUTORIALS

subscribe to our Youtube

GO TO YOUTUBE

14455 questions

17168 answers

28195 comments

0 members

We are migrating to our new platform at https://community.teltonika.lt. Moving forward, you can continue discussions on this new platform. This current platform will be temporarily maintained for reference purposes.
0 votes
615 views 1 comments
by anonymous

Hola a todos, configure RUT950 como un servidor de modo TAP openvpn, pero cuando el cliente intenta establecer la conexión, aparece el mensaje en la consola: MULTI: no hay control remoto dinámico o estático: la dirección ifconfig está disponible para User01/Public_IP

Gracias

1 Answer

0 votes
by anonymous
Hello,

Does the server have a Public IP address?

Also, could you make sure that the Server and the Clients use the same parameters (same authentication, same port, same protocol, etc.).

Since the OpenVPN interface that comes up is bridged with the LAN interface, make sure the routers are in the same subnet (for example 192.168.1.0). While making sure of that, don't forget that the routers can't have the same IP address, just the same subnet (for example, if both routers have the LAN IP 192.168.1.1, the connection won't work; if one has, for example, 192.168.1.1 and the other 192.168.1.100, then the connection will work).

Otherwise, a troubleshoot file is needed to review your configuration and log entries for further investigation and a network topology picture would be helpful too.

Best regards,
by anonymous
Hi, my config is: RUT950: IP WAN: IP PUBLIC - IP LAN: 10.0.155.10

CONFIG OPENVPN

config webui 'webui'

        option _auth 'tls'

config openvpn 'RPT'

        option keepalive '10 120'

        option _name 'RPT'

        option _tls_cipher 'all'

        list data_ciphers 'BF-CBC'

        option persist_key '1'

        option port '1194'

        option mode 'server'

        option persist_tun '1'

        option verb '5'

        option type 'server'

        option proto 'udp'

        option enable '1'

        option dev 'tap'

        option enable_custom '0'

        option client_to_client '1'

        option duplicate_cn '0'

        option _device_files '0'

        option comp_lzo 'yes'

        option _auth 'tls'

        option auth 'sha1'

        option _tls_auth 'none'

        option ca '/etc/vuci-uploads/cbid.openvpn.RPT.caca.crt'

        option cert '/etc/vuci-uploads/cbid.openvpn.RPT.certserver.crt'

        option key '/etc/vuci-uploads/cbid.openvpn.RPT.keyserver.key'

        option dh '/etc/vuci-uploads/cbid.openvpn.RPT.dhdh.pem'

        option cipher 'AES-256-CBC'

        option tls_server '1'

        option server_bridge 'nogw'

        list push 'route 10.0.155.1 255.255.255.0'

        option upload_files '0'

-------------------------------------

Mon Sep 12 11:37:25 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1590,tun-mtu 1532,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'

Mon Sep 12 11:37:25 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 TLS: Initial packet from [AF_INET]190.28.69.114:60341, sid=33791165 fdaf529b

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 VERIFY OK: depth=1, CN=Easy-RSA CA

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 VERIFY OK: depth=0, CN=Client01

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_VER=2.4.7

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_PLAT=linux

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_PROTO=2

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_NCP=2

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_LZ4=1

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_LZ4v2=1

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_LZO=1

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_COMP_STUB=1

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_COMP_STUBv2=1

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 peer info: IV_TCPNL=1

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: 190.28.69.114:60341 [Client0101] Peer Connection Initiated with [AF_INET]190.28.69.114:60341

Mon Sep 12 11:37:26 2022 daemon.err openvpn(RPT)[8266]: Client01/190.28.69.114:60341 MULTI: no dynamic or static remote--ifconfig address is available for Client0101/190.28.69.114:60341

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

Mon Sep 12 11:37:26 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

Mon Sep 12 11:37:27 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 PUSH: Received control message: 'PUSH_REQUEST'

Mon Sep 12 11:37:27 2022 daemon.notice openvpn(RPT)[8266]: Client01/190.28.69.114:60341 SENT CONTROL [Client01]: 'PUSH_REPLY,route 10.0.155.1 255.255.255.0,ping 10,ping-restart 120,peer-id 42,cipher AES-256-CBC' (status=1)