Not signed in (Sign In)

Welcome, Guest

Want to take part in these discussions? Sign in if you have an account, or apply for one below

Vanilla 1.1.10 is a product of Lussumo. More Information: Documentation, Community Support.

    • CommentAuthorfaroora
    • CommentTimeJul 9th 2016
     
    i tried so hard to connect throught always vpn and its not work for me
    here is the log pls help me
    or switch me to pptp/l2pp
    compatiable usa west logs

    Sat Jul 09 19:41:04 2016 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Mar 19 2015
    Sat Jul 09 19:41:04 2016 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
    Enter Management Password:
    Sat Jul 09 19:41:04 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
    Sat Jul 09 19:41:04 2016 Need hold release from management interface, waiting...
    Sat Jul 09 19:41:05 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
    Sat Jul 09 19:41:05 2016 MANAGEMENT: CMD 'state on'
    Sat Jul 09 19:41:05 2016 MANAGEMENT: CMD 'log all on'
    Sat Jul 09 19:41:05 2016 MANAGEMENT: CMD 'hold off'
    Sat Jul 09 19:41:05 2016 MANAGEMENT: CMD 'hold release'
    Sat Jul 09 19:41:13 2016 MANAGEMENT: CMD 'username "Auth" "faroora"'
    Sat Jul 09 19:41:13 2016 MANAGEMENT: CMD 'password [...]'
    Sat Jul 09 19:41:13 2016 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Sat Jul 09 19:41:14 2016 Control Channel Authentication: tls-auth using INLINE static key file
    Sat Jul 09 19:41:14 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:41:14 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:41:14 2016 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Sat Jul 09 19:41:14 2016 MANAGEMENT: >STATE:1468111274,RESOLVE,,,
    Sat Jul 09 19:41:14 2016 Attempting to establish TCP connection with [AF_INET](AlwaysVPN IP):443 [nonblock]
    Sat Jul 09 19:41:14 2016 MANAGEMENT: >STATE:1468111274,TCP_CONNECT,,,
    Sat Jul 09 19:41:18 2016 TCP connection established with [AF_INET](AlwaysVPN IP):443
    Sat Jul 09 19:41:18 2016 TCPv4_CLIENT link local: [undef]
    Sat Jul 09 19:41:18 2016 TCPv4_CLIENT link remote: [AF_INET](AlwaysVPN IP):443
    Sat Jul 09 19:41:18 2016 MANAGEMENT: >STATE:1468111278,WAIT,,,
    Sat Jul 09 19:41:18 2016 MANAGEMENT: >STATE:1468111278,AUTH,,,
    Sat Jul 09 19:41:18 2016 TLS: Initial packet from [AF_INET](AlwaysVPN IP):443, sid=e2e3227a 0ba65e2e
    Sat Jul 09 19:41:18 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Sat Jul 09 19:41:20 2016 VERIFY OK: depth=1, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=AlwaysVPN CA, emailAddress=support@alwaysvpn.com
    Sat Jul 09 19:41:20 2016 VERIFY OK: nsCertType=SERVER
    Sat Jul 09 19:41:20 2016 VERIFY X509NAME OK: C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server7, emailAddress=support@alwaysvpn.com
    Sat Jul 09 19:41:20 2016 VERIFY OK: depth=0, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server7, emailAddress=support@alwaysvpn.com
    Sat Jul 09 19:41:22 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Jul 09 19:41:22 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:41:22 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Jul 09 19:41:22 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:41:22 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Sat Jul 09 19:41:22 2016 [alwaysvpn_server7] Peer Connection Initiated with [AF_INET](AlwaysVPN IP):443
    Sat Jul 09 19:41:24 2016 MANAGEMENT: >STATE:1468111284,GET_CONFIG,,,
    Sat Jul 09 19:41:25 2016 SENT CONTROL [alwaysvpn_server7]: 'PUSH_REQUEST' (status=1)
    Sat Jul 09 19:41:25 2016 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.19.96.1,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,rcvbuf 100000,sndbuf 100000,ping 10,ping-restart 30,socket-flags TCP_NODELAY,ifconfig 10.19.96.228 255.255.252.0'
    Sat Jul 09 19:41:25 2016 OPTIONS IMPORT: timers and/or timeouts modified
    Sat Jul 09 19:41:25 2016 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
    Sat Jul 09 19:41:25 2016 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Sat Jul 09 19:41:25 2016 OPTIONS IMPORT: --socket-flags option modified
    Sat Jul 09 19:41:25 2016 OPTIONS IMPORT: --ifconfig/up options modified
    Sat Jul 09 19:41:25 2016 OPTIONS IMPORT: route-related options modified
    Sat Jul 09 19:41:25 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sat Jul 09 19:41:25 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sat Jul 09 19:41:25 2016 MANAGEMENT: >STATE:1468111285,ASSIGN_IP,,10.19.96.228,
    Sat Jul 09 19:41:25 2016 open_tun, tt->ipv6=0
    Sat Jul 09 19:41:25 2016 TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{4B2B1C94-44F1-4149-8A41-BEE44747E90B}.tap
    Sat Jul 09 19:41:25 2016 TAP-Windows Driver Version 9.21
    Sat Jul 09 19:41:25 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.96.228/255.255.252.0 on interface {4B2B1C94-44F1-4149-8A41-BEE44747E90B} [DHCP-serv: 10.19.96.0, lease-time: 31536000]
    Sat Jul 09 19:41:25 2016 Successful ARP Flush on interface [29] {4B2B1C94-44F1-4149-8A41-BEE44747E90B}
    Sat Jul 09 19:41:30 2016 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
    Sat Jul 09 19:41:30 2016 C:\Windows\system32\route.exe ADD (AlwaysVPN IP) MASK 255.255.255.255 192.168.1.1
    Sat Jul 09 19:41:30 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    Sat Jul 09 19:41:30 2016 Route addition via IPAPI succeeded [adaptive]
    Sat Jul 09 19:41:30 2016 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.96.1
    Sat Jul 09 19:41:30 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    Sat Jul 09 19:41:30 2016 Route addition via IPAPI succeeded [adaptive]
    Sat Jul 09 19:41:30 2016 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.96.1
    Sat Jul 09 19:41:30 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    Sat Jul 09 19:41:30 2016 Route addition via IPAPI succeeded [adaptive]
    Sat Jul 09 19:41:30 2016 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
    SYSTEM ROUTING TABLE
    0.0.0.0 0.0.0.0 192.168.1.1 p=0 i=13 t=4 pr=3 a=6955 h=0 m=25/0/0/0/0
    0.0.0.0 128.0.0.0 10.19.96.1 p=0 i=29 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
    10.19.96.0 255.255.252.0 10.19.96.228 p=0 i=29 t=3 pr=3 a=5 h=0 m=276/0/0/0/0
    10.19.96.228 255.255.255.255 10.19.96.228 p=0 i=29 t=3 pr=3 a=5 h=0 m=276/0/0/0/0
    10.19.99.255 255.255.255.255 10.19.96.228 p=0 i=29 t=3 pr=3 a=5 h=0 m=276/0/0/0/0
    (AlwaysVPN IP) 255.255.255.255 192.168.1.1 p=0 i=13 t=4 pr=3 a=0 h=0 m=25/0/0/0/0
    127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=7014 h=0 m=306/0/0/0/0
    127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=7014 h=0 m=306/0/0/0/0
    127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=7014 h=0 m=306/0/0/0/0
    128.0.0.0 128.0.0.0 10.19.96.1 p=0 i=29 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
    192.168.1.0 255.255.255.0 192.168.1.5 p=0 i=13 t=3 pr=3 a=6955 h=0 m=281/0/0/0/0
    192.168.1.5 255.255.255.255 192.168.1.5 p=0 i=13 t=3 pr=3 a=6955 h=0 m=281/0/0/0/0
    192.168.1.255 255.255.255.255 192.168.1.5 p=0 i=13 t=3 pr=3 a=6955 h=0 m=281/0/0/0/0
    224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=7014 h=0 m=306/0/0/0/0
    224.0.0.0 240.0.0.0 10.19.96.228 p=0 i=29 t=3 pr=3 a=6990 h=0 m=276/0/0/0/0
    224.0.0.0 240.0.0.0 192.168.1.5 p=0 i=13 t=3 pr=3 a=6963 h=0 m=281/0/0/0/0
    255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=7014 h=0 m=306/0/0/0/0
    255.255.255.255 255.255.255.255 10.19.96.228 p=0 i=29 t=3 pr=3 a=6990 h=0 m=276/0/0/0/0
    255.255.255.255 255.255.255.255 192.168.1.5 p=0 i=13 t=3 pr=3 a=6963 h=0 m=281/0/0/0/0
    SYSTEM ADAPTER LIST
    TAP-Windows Adapter V9
    Index = 29
    GUID = {4B2B1C94-44F1-4149-8A41-BEE44747E90B}
    IP = 10.19.96.228/255.255.252.0
    MAC = 00:ff:4b:2b:1c:94
    GATEWAY = 0.0.0.0/255.255.255.255
    DHCP SERV = 10.19.96.0/255.255.255.255
    DHCP LEASE OBTAINED = Sat Jul 09 19:41:25 2016
    DHCP LEASE EXPIRES = Sun Jul 09 19:41:25 2017
    DNS SERV = 208.67.222.222/255.255.255.255 208.67.220.220/255.255.255.255
    Bluetooth Personal Area Network
    Index = 16
    GUID = {D4D2E537-FFAB-43C0-A14C-5D56DB3B8BC2}
    IP = 0.0.0.0/0.0.0.0
    MAC = 7c:e9:d3:d1:ae:e4
    GATEWAY = 0.0.0.0/255.255.255.255
    DHCP SERV =
    DHCP LEASE OBTAINED = Sat Jul 09 19:41:30 2016
    DHCP LEASE EXPIRES = Sat Jul 09 19:41:30 2016
    DNS SERV =
    Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi Adapter
    Index = 13
    GUID = {F42A5291-81C8-436A-886D-4CE4E1620987}
    IP = 192.168.1.5/255.255.255.0
    MAC = 2a:1b:4c:3d:6e:5f
    GATEWAY = 192.168.1.1/255.255.255.255
    DHCP SERV = 192.168.1.1/255.255.255.255
    DHCP LEASE OBTAINED = Sat Jul 09 17:45:35 2016
    DHCP LEASE EXPIRES = Sun Jul 10 17:45:35 2016
    DNS SERV = 192.168.1.1/255.255.255.255
    Realtek PCIe FE Family Controller
    Index = 11
    GUID = {7A1CF975-AC64-45D4-84C5-9590690A9BE8}
    IP = 0.0.0.0/0.0.0.0
    MAC = 80:c1:6e:5c:f5:a8
    GATEWAY = 0.0.0.0/255.255.255.255
    DHCP SERV =
    DHCP LEASE OBTAINED = Sat Jul 09 19:41:30 2016
    DHCP LEASE EXPIRES = Sat Jul 09 19:41:30 2016
    DNS SERV =
    Sat Jul 09 19:41:30 2016 Initialization Sequence Completed
    Sat Jul 09 19:41:30 2016 MANAGEMENT: >STATE:1468111290,CONNECTED,SUCCESS,10.19.96.228,(AlwaysVPN IP)
    Sat Jul 09 19:41:31 2016 Start net commands...
    Sat Jul 09 19:41:31 2016 C:\Windows\system32\net.exe stop dnscache
    Sat Jul 09 19:41:33 2016 C:\Windows\system32\net.exe start dnscache
    Sat Jul 09 19:41:33 2016 ERROR: Windows ipconfig command failed: returned error code 2
    Sat Jul 09 19:41:33 2016 C:\Windows\system32\ipconfig.exe /flushdns
    Sat Jul 09 19:41:33 2016 C:\Windows\system32\ipconfig.exe /registerdns
    Sat Jul 09 19:41:40 2016 End net commands...

    _____________________________________________________________
    • CommentAuthorfaroora
    • CommentTimeJul 9th 2016
     
    faster usa east log '

    Sat Jul 09 19:42:42 2016 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Mar 19 2015
    Sat Jul 09 19:42:42 2016 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
    Enter Management Password:
    Sat Jul 09 19:42:42 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342
    Sat Jul 09 19:42:42 2016 Need hold release from management interface, waiting...
    Sat Jul 09 19:42:43 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25342
    Sat Jul 09 19:42:43 2016 MANAGEMENT: CMD 'state on'
    Sat Jul 09 19:42:43 2016 MANAGEMENT: CMD 'log all on'
    Sat Jul 09 19:42:43 2016 MANAGEMENT: CMD 'hold off'
    Sat Jul 09 19:42:43 2016 MANAGEMENT: CMD 'hold release'
    Sat Jul 09 19:42:52 2016 MANAGEMENT: CMD 'username "Auth" "faroora"'
    Sat Jul 09 19:42:52 2016 MANAGEMENT: CMD 'password [...]'
    Sat Jul 09 19:42:52 2016 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Sat Jul 09 19:42:53 2016 Control Channel Authentication: tls-auth using INLINE static key file
    Sat Jul 09 19:42:53 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:42:53 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:42:53 2016 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Sat Jul 09 19:42:53 2016 MANAGEMENT: >STATE:1468111373,RESOLVE,,,
    Sat Jul 09 19:42:53 2016 UDPv4 link local: [undef]
    Sat Jul 09 19:42:53 2016 UDPv4 link remote: [AF_INET]45.55.221.171:1194
    Sat Jul 09 19:42:53 2016 MANAGEMENT: >STATE:1468111373,WAIT,,,
    Sat Jul 09 19:42:53 2016 MANAGEMENT: >STATE:1468111373,AUTH,,,
    Sat Jul 09 19:42:53 2016 TLS: Initial packet from [AF_INET]45.55.221.171:1194, sid=e7453e09 3c4c6380
    Sat Jul 09 19:42:53 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Sat Jul 09 19:42:54 2016 VERIFY OK: depth=1, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=AlwaysVPN CA, emailAddress=support@alwaysvpn.com
    Sat Jul 09 19:42:54 2016 VERIFY OK: nsCertType=SERVER
    Sat Jul 09 19:42:54 2016 VERIFY X509NAME OK: C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server7, emailAddress=support@alwaysvpn.com
    Sat Jul 09 19:42:54 2016 VERIFY OK: depth=0, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server7, emailAddress=support@alwaysvpn.com
    Sat Jul 09 19:42:55 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Jul 09 19:42:55 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:42:55 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Jul 09 19:42:55 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Jul 09 19:42:55 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Sat Jul 09 19:42:55 2016 [alwaysvpn_server7] Peer Connection Initiated with [AF_INET]45.55.221.171:1194
    Sat Jul 09 19:42:56 2016 MANAGEMENT: >STATE:1468111376,GET_CONFIG,,,
    Sat Jul 09 19:42:58 2016 SENT CONTROL [alwaysvpn_server7]: 'PUSH_REQUEST' (status=1)
    Sat Jul 09 19:42:58 2016 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.19.96.1,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,rcvbuf 100000,sndbuf 100000,ping 10,ping-restart 30,socket-flags TCP_NODELAY,ifconfig 10.19.98.108 255.255.252.0'
    Sat Jul 09 19:42:58 2016 OPTIONS IMPORT: timers and/or timeouts modified
    Sat Jul 09 19:42:58 2016 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
    Sat Jul 09 19:42:58 2016 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Sat Jul 09 19:42:58 2016 OPTIONS IMPORT: --socket-flags option modified
    Sat Jul 09 19:42:58 2016 NOTE: setsockopt TCP_NODELAY=1 failed
    Sat Jul 09 19:42:58 2016 OPTIONS IMPORT: --ifconfig/up options modified
    Sat Jul 09 19:42:58 2016 OPTIONS IMPORT: route-related options modified
    Sat Jul 09 19:42:58 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sat Jul 09 19:42:58 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sat Jul 09 19:42:58 2016 MANAGEMENT: >STATE:1468111378,ASSIGN_IP,,10.19.98.108,
    Sat Jul 09 19:42:58 2016 open_tun, tt->ipv6=0
    Sat Jul 09 19:42:58 2016 TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{4B2B1C94-44F1-4149-8A41-BEE44747E90B}.tap
    Sat Jul 09 19:42:58 2016 TAP-Windows Driver Version 9.21
    Sat Jul 09 19:42:58 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.98.108/255.255.252.0 on interface {4B2B1C94-44F1-4149-8A41-BEE44747E90B} [DHCP-serv: 10.19.96.0, lease-time: 31536000]
    Sat Jul 09 19:42:58 2016 Successful ARP Flush on interface [29] {4B2B1C94-44F1-4149-8A41-BEE44747E90B}
    Sat Jul 09 19:43:03 2016 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
    Sat Jul 09 19:43:03 2016 C:\Windows\system32\route.exe ADD 45.55.221.171 MASK 255.255.255.255 192.168.1.1
    Sat Jul 09 19:43:03 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    Sat Jul 09 19:43:03 2016 Route addition via IPAPI succeeded [adaptive]
    Sat Jul 09 19:43:03 2016 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.96.1
    Sat Jul 09 19:43:03 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    Sat Jul 09 19:43:03 2016 Route addition via IPAPI succeeded [adaptive]
    Sat Jul 09 19:43:03 2016 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.96.1
    Sat Jul 09 19:43:03 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    Sat Jul 09 19:43:03 2016 Route addition via IPAPI succeeded [adaptive]
    Sat Jul 09 19:43:03 2016 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
    SYSTEM ROUTING TABLE
    0.0.0.0 0.0.0.0 192.168.1.1 p=0 i=13 t=4 pr=3 a=7048 h=0 m=25/0/0/0/0
    0.0.0.0 128.0.0.0 10.19.96.1 p=0 i=29 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
    10.19.96.0 255.255.252.0 10.19.98.108 p=0 i=29 t=3 pr=3 a=5 h=0 m=276/0/0/0/0
    10.19.98.108 255.255.255.255 10.19.98.108 p=0 i=29 t=3 pr=3 a=5 h=0 m=276/0/0/0/0
    10.19.99.255 255.255.255.255 10.19.98.108 p=0 i=29 t=3 pr=3 a=5 h=0 m=276/0/0/0/0
    45.55.221.171 255.255.255.255 192.168.1.1 p=0 i=13 t=4 pr=3 a=0 h=0 m=25/0/0/0/0
    127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=7107 h=0 m=306/0/0/0/0
    127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=7107 h=0 m=306/0/0/0/0
    127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=7107 h=0 m=306/0/0/0/0
    128.0.0.0 128.0.0.0 10.19.96.1 p=0 i=29 t=4 pr=3 a=0 h=0 m=20/0/0/0/0
    192.168.1.0 255.255.255.0 192.168.1.5 p=0 i=13 t=3 pr=3 a=7048 h=0 m=281/0/0/0/0
    192.168.1.5 255.255.255.255 192.168.1.5 p=0 i=13 t=3 pr=3 a=7048 h=0 m=281/0/0/0/0
    192.168.1.255 255.255.255.255 192.168.1.5 p=0 i=13 t=3 pr=3 a=7048 h=0 m=281/0/0/0/0
    224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=3 a=7107 h=0 m=306/0/0/0/0
    224.0.0.0 240.0.0.0 10.19.98.108 p=0 i=29 t=3 pr=3 a=7083 h=0 m=276/0/0/0/0
    224.0.0.0 240.0.0.0 192.168.1.5 p=0 i=13 t=3 pr=3 a=7056 h=0 m=281/0/0/0/0
    255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=3 a=7107 h=0 m=306/0/0/0/0
    255.255.255.255 255.255.255.255 10.19.98.108 p=0 i=29 t=3 pr=3 a=7083 h=0 m=276/0/0/0/0
    255.255.255.255 255.255.255.255 192.168.1.5 p=0 i=13 t=3 pr=3 a=7056 h=0 m=281/0/0/0/0
    SYSTEM ADAPTER LIST
    TAP-Windows Adapter V9
    Index = 29
    GUID = {4B2B1C94-44F1-4149-8A41-BEE44747E90B}
    IP = 10.19.98.108/255.255.252.0
    MAC = 00:ff:4b:2b:1c:94
    GATEWAY = 0.0.0.0/255.255.255.255
    DHCP SERV = 10.19.96.0/255.255.255.255
    DHCP LEASE OBTAINED = Sat Jul 09 19:42:58 2016
    DHCP LEASE EXPIRES = Sun Jul 09 19:42:58 2017
    DNS SERV = 208.67.222.222/255.255.255.255 208.67.220.220/255.255.255.255
    Bluetooth Personal Area Network
    Index = 16
    GUID = {D4D2E537-FFAB-43C0-A14C-5D56DB3B8BC2}
    IP = 0.0.0.0/0.0.0.0
    MAC = 7c:e9:d3:d1:ae:e4
    GATEWAY = 0.0.0.0/255.255.255.255
    DHCP SERV =
    DHCP LEASE OBTAINED = Sat Jul 09 19:43:03 2016
    DHCP LEASE EXPIRES = Sat Jul 09 19:43:03 2016
    DNS SERV =
    Broadcom 4313GN 802.11b/g/n 1x1 Wi-Fi Adapter
    Index = 13
    GUID = {F42A5291-81C8-436A-886D-4CE4E1620987}
    IP = 192.168.1.5/255.255.255.0
    MAC = 2a:1b:4c:3d:6e:5f
    GATEWAY = 192.168.1.1/255.255.255.255
    DHCP SERV = 192.168.1.1/255.255.255.255
    DHCP LEASE OBTAINED = Sat Jul 09 17:45:35 2016
    DHCP LEASE EXPIRES = Sun Jul 10 17:45:35 2016
    DNS SERV = 192.168.1.1/255.255.255.255
    Realtek PCIe FE Family Controller
    Index = 11
    GUID = {7A1CF975-AC64-45D4-84C5-9590690A9BE8}
    IP = 0.0.0.0/0.0.0.0
    MAC = 80:c1:6e:5c:f5:a8
    GATEWAY = 0.0.0.0/255.255.255.255
    DHCP SERV =
    DHCP LEASE OBTAINED = Sat Jul 09 19:43:03 2016
    DHCP LEASE EXPIRES = Sat Jul 09 19:43:03 2016
    DNS SERV =
    Sat Jul 09 19:43:03 2016 Initialization Sequence Completed
    Sat Jul 09 19:43:03 2016 MANAGEMENT: >STATE:1468111383,CONNECTED,SUCCESS,10.19.98.108,45.55.221.171
    Sat Jul 09 19:43:04 2016 Start net commands...
    Sat Jul 09 19:43:04 2016 C:\Windows\system32\net.exe stop dnscache
    Sat Jul 09 19:43:06 2016 C:\Windows\system32\net.exe start dnscache
    Sat Jul 09 19:43:06 2016 ERROR: Windows ipconfig command failed: returned error code 2
    Sat Jul 09 19:43:06 2016 C:\Windows\system32\ipconfig.exe /flushdns
    Sat Jul 09 19:43:07 2016 C:\Windows\system32\ipconfig.exe /registerdns
    Sat Jul 09 19:43:13 2016 End net commands...
    • CommentAuthoradmin
    • CommentTimeJul 9th 2016
     
    Could you elaborate on the trouble you are having?
    Both logs shows that your VPN client was able to successfully connect to the VPN servers. The connection log can not tell me anything about the connection speed.
    • CommentAuthorfaroora
    • CommentTimeJul 9th 2016
     
    its not about the speed ,its show me that im connected but my ip is the same ,it does connect on some specific times ,but during all the day its not connections at all ,is it possible to switch me to ipsec/l2tp
    even when its connected its all time request out
    i dunno whats wrong with that service anymore
    • CommentAuthoradmin
    • CommentTimeJul 10th 2016
     
    We don't offer ipsec/l2tp we only have servers with openvpn.
    So the openvpn program is saying that you are connected but this page https://ssl.alwaysvpn.com/ip-check.php says that you are not connected?