NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

KngDa's avatar
KngDa
Aspirant
Nov 10, 2025
Solved

OpenVPN connects to router when clients on Ethernet but not on Wifi

I am having difficulty getting OpenVPN to work to connect to my RS300 router with my Windows 11 computers. I have a Dell XPS 16 9640 and a Microsoft Surface Pro 2103 both running Windows 11 Pro. Both computers have the same issue. The router is a Netgear Nighthawk RS300 v 1.0.5.18. The client computers are running OpenVPN 2.6.14 and GUI 11.55.0.0

I want to connect to the RS300 "remote" LAN via the VPN tunnel and the internet through the local LAN at the client location. This works perfectly as long as the client computers are connected to their local LAN via a hardwired Ethernet connection. If the client computers are connected with a WI-fi connection (which works perfectly without the VPN) on the same local network, there are issues. The VPN still connects properly. The router status shows the active VPN connection is successful. File explorer shows the remote LAN devices properly. However, none of the 3 browsers I have tried can access devices on the remote LAN or access the internet. Although not a complete test, the same thing happens when trying to us a public WI-fi connection at a different location. I have tried the usual things. I run the Open VPN as administrator. I have tried changing the adapter metric, placing the various Wi-fi, Ethernet and VPN adapters in various priorities. I have disabled the firewall. There is no subnet overlap. At this point, I am out of ideas.

  • Without making any changes, the VPN connection now works over wi-fi on the Dell laptop. The only change was a firmware update from Dell including for the wi-fi adapter. I tried updating the firmware on the tablet, but the problem still persists on that computer. I will continue to look at the difference between the tunnels and see what the difference is and if I can override it.

20 Replies

  • 2025-11-10 13:35:15 us=453000   pkcs11_id = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   pkcs11_id_management = DISABLED

    2025-11-10 13:35:15 us=453000   server_network = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_network_ipv6 = ::

    2025-11-10 13:35:15 us=453000   server_netbits_ipv6 = 0

    2025-11-10 13:35:15 us=453000   server_bridge_ip = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_bridge_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_bridge_pool_start = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_bridge_pool_end = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_defined = DISABLED

    2025-11-10 13:35:15 us=453000   ifconfig_pool_start = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_end = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_persist_filename = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   ifconfig_pool_persist_refresh_freq = 600

    2025-11-10 13:35:15 us=453000   ifconfig_ipv6_pool_defined = DISABLED

    2025-11-10 13:35:15 us=453000   ifconfig_ipv6_pool_base = ::

    2025-11-10 13:35:15 us=453000   ifconfig_ipv6_pool_netbits = 0

    2025-11-10 13:35:15 us=453000   n_bcast_buf = 256

    2025-11-10 13:35:15 us=453000   tcp_queue_limit = 64

    2025-11-10 13:35:15 us=453000   real_hash_size = 256

    2025-11-10 13:35:15 us=453000   virtual_hash_size = 256

    2025-11-10 13:35:15 us=453000   client_connect_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   learn_address_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   client_disconnect_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   client_crresponse_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   client_config_dir = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   ccd_exclusive = DISABLED

    2025-11-10 13:35:15 us=453000   tmp_dir = 'C:\Users\theki\AppData\Local\Temp\'

    2025-11-10 13:35:15 us=453000   push_ifconfig_defined = DISABLED

    2025-11-10 13:35:15 us=453000   push_ifconfig_local = 0.0.0.0

    2025-11-10 13:35:15 us=453000   push_ifconfig_remote_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   push_ifconfig_ipv6_defined = DISABLED

    2025-11-10 13:35:15 us=453000   push_ifconfig_ipv6_local = ::/0

    2025-11-10 13:35:15 us=453000   push_ifconfig_ipv6_remote = ::

    2025-11-10 13:35:15 us=453000   enable_c2c = DISABLED

    2025-11-10 13:35:15 us=453000   duplicate_cn = DISABLED

    2025-11-10 13:35:15 us=453000   cf_max = 0

    2025-11-10 13:35:15 us=453000   cf_per = 0

    2025-11-10 13:35:15 us=453000   cf_initial_max = 100

    2025-11-10 13:35:15 us=453000   cf_initial_per = 10

    2025-11-10 13:35:15 us=453000   max_clients = 1024

    2025-11-10 13:35:15 us=453000   max_routes_per_client = 256

    2025-11-10 13:35:15 us=453000   auth_user_pass_verify_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   auth_user_pass_verify_script_via_file = DISABLED

    2025-11-10 13:35:15 us=453000   auth_token_generate = DISABLED

    2025-11-10 13:35:15 us=453000   force_key_material_export = DISABLED

    2025-11-10 13:35:15 us=453000   auth_token_lifetime = 0

    2025-11-10 13:35:15 us=453000   auth_token_secret_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   vlan_tagging = DISABLED

    2025-11-10 13:35:15 us=453000   vlan_accept = all

    2025-11-10 13:35:15 us=453000   vlan_pvid = 1

    2025-11-10 13:35:15 us=453000   client = ENABLED

    2025-11-10 13:35:15 us=453000   pull = ENABLED

    2025-11-10 13:35:15 us=453000   auth_user_pass_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   show_net_up = DISABLED

    2025-11-10 13:35:15 us=453000   route_method = 3

    2025-11-10 13:35:15 us=453000   block_outside_dns = DISABLED

    2025-11-10 13:35:15 us=453000   ip_win32_defined = DISABLED

    2025-11-10 13:35:15 us=453000   ip_win32_type = 3

    2025-11-10 13:35:15 us=453000   dhcp_masq_offset = 0

    2025-11-10 13:35:15 us=453000   dhcp_lease_time = 31536000

    2025-11-10 13:35:15 us=453000   tap_sleep = 0

    2025-11-10 13:35:15 us=453000   dhcp_options = 0x00000000

    2025-11-10 13:35:15 us=453000   dhcp_renew = DISABLED

    2025-11-10 13:35:15 us=453000   dhcp_pre_release = DISABLED

    2025-11-10 13:35:15 us=453000   domain = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   netbios_scope = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   netbios_node_type = 0

    2025-11-10 13:35:15 us=453000   disable_nbt = DISABLED

    2025-11-10 13:35:15 us=453000 OpenVPN 2.6.14 [git:v2.6.14/f588592ee6c6323b] Windows [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Aug  6 2025

    2025-11-10 13:35:15 us=453000 Windows version 10.0 (Windows 10 or greater), amd64 executable

    2025-11-10 13:35:15 us=453000 library versions: OpenSSL 3.5.1 1 Jul 2025, LZO 2.10

    2025-11-10 13:35:15 us=453000 DCO version: 1.3.3

    2025-11-10 13:35:15 us=453000 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

    2025-11-10 13:35:15 us=453000 Need hold release from management interface, waiting...

    2025-11-10 13:35:15 us=906000 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:57560

    2025-11-10 13:35:16 us=15000 MANAGEMENT: CMD 'state on'

    2025-11-10 13:35:16 us=15000 MANAGEMENT: CMD 'log on all'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'echo on all'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'bytecount 5'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'state'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'hold off'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'hold release'

    2025-11-10 13:35:16 us=109000 LZO compression initializing

    2025-11-10 13:35:16 us=109000 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]

    2025-11-10 13:35:16 us=109000 MANAGEMENT: >STATE:1762806916,RESOLVE,,,,,,

    2025-11-10 13:35:16 us=171000 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]

    2025-11-10 13:35:16 us=171000 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.246.109:12974

    2025-11-10 13:35:16 us=171000 Socket Buffers: R=[65536->393216] S=[65536->393216]

    2025-11-10 13:35:16 us=171000 UDPv4 link local: (not bound)

    2025-11-10 13:35:16 us=171000 UDPv4 link remote: [AF_INET]XXX.XXX.246.109:12974

    2025-11-10 13:35:16 us=171000 MANAGEMENT: >STATE:1762806916,WAIT,,,,,,

    WR2025-11-10 13:35:16 us=234000 MANAGEMENT: >STATE:1762806916,AUTH,,,,,,

    2025-11-10 13:35:16 us=234000 TLS: Initial packet from [AF_INET]XXX.XXX.246.109:12974, sid=6a27a796 1d85406c

    WWRRWRWR2025-11-10 13:35:16 us=281000 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, name=changeme, emailAddress=mail@netgear.com

    2025-11-10 13:35:16 us=281000 VERIFY KU OK

    2025-11-10 13:35:16 us=281000 Validating certificate extended key usage

    2025-11-10 13:35:16 us=281000 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

    2025-11-10 13:35:16 us=281000 VERIFY EKU OK

    2025-11-10 13:35:16 us=281000 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, name=changeme, emailAddress=mail@netgear.com

    WWWRRWR2025-11-10 13:35:16 us=312000 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519

    2025-11-10 13:35:16 us=312000 [netgear] Peer Connection Initiated with [AF_INET]XXX.XXX.246.109:12974

    2025-11-10 13:35:16 us=312000 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

    2025-11-10 13:35:16 us=312000 TLS: tls_multi_process: initial untrusted session promoted to trusted

    W2025-11-10 13:35:17 us=328000 MANAGEMENT: >STATE:1762806917,GET_CONFIG,,,,,,

    2025-11-10 13:35:17 us=328000 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

    WRR2025-11-10 13:35:17 us=359000 PUSH: Received control message: 'PUSH_REPLY,ping 10,ping-restart 120,route-delay 10,route 192.168.1.0 255.255.255.0 192.168.1.1,route 75.2.84.193 255.255.255.255 192.168.1.1,route 99.83.191.32 255.255.255.255 192.168.1.1,peer-id 2,cipher AES-256-GCM'

    2025-11-10 13:35:17 us=359000 OPTIONS IMPORT: route options modified

    2025-11-10 13:35:17 us=359000 OPTIONS IMPORT: route-related options modified

    2025-11-10 13:35:17 us=359000 interactive service msg_channel=936

    2025-11-10 13:35:17 us=375000 ROUTE_GATEWAY 192.168.2.254/255.255.255.0 I=20 HWADDR=10:98:19:f6:54:c4

    2025-11-10 13:35:17 us=375000 open_tun

    2025-11-10 13:35:17 us=375000 tap-windows6 device [NETGEAR-VPN] opened

    2025-11-10 13:35:17 us=375000 TAP-Windows Driver Version 9.27

    2025-11-10 13:35:17 us=375000 TAP-Windows MTU=1500

    2025-11-10 13:35:17 us=375000 Successful ARP Flush on interface [8] {608A8556-FD5F-4C06-8486-CA49D0B130FD}

    2025-11-10 13:35:17 us=375000 do_ifconfig, ipv4=0, ipv6=0

    2025-11-10 13:35:17 us=375000 MANAGEMENT: >STATE:1762806917,ASSIGN_IP,,,,,,

    2025-11-10 13:35:17 us=375000 Data Channel MTU parms [ mss_fix:1367 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]

    2025-11-10 13:35:17 us=375000 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

    2025-11-10 13:35:17 us=375000 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

    2025-11-10 13:35:17 us=375000 Data Channel: cipher 'AES-256-GCM', peer-id: 2, compression: 'lzo'

    2025-11-10 13:35:17 us=375000 Timers: ping 10, ping-restart 120

    WrWrWRwrWRwrWrWRwrWrWrWrWrWrWrWrWRwRwRwrWrWrWRwrWRwRwRwRwrWrWrWRwrWrWRwrWrWRwRwrWrWrWRwrWrWrWRwrWrWrWRwrWrWRwrWrWRwrWRwRwrWrWRwRwrWRwRwrWRwrWrWRwRwRwrWrWRwRwrWRwRwrWrWRwRwrWrWrWrWRwRwRwRwRwRwrWrWrWRwRwrWrWrWRwrWRwrWrWRwrWrWRwRwRwRwrWrWrWRwRwRwRwRwRwRwRwrWRwRwRwRwRwRwRwRwRwRwrWrWRwRwRwrWrWrWrWRwrWrWrWrWrWRwRwrWRwrWrWRwRwRwRwrWrWrWrWRwrWrWRwRwRwRwrWrWrWrWrWRwrWrWRwRwRwRwrWrWrWrWRwrWRwRwrWrWRwRwrWrWrWrWrWRwRwRwRwrWrWrWRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWrWrWrWrWrWrWRwRwRwRwRwrWrWrWrWRwrWRwrWrWRwRwRwrWRwRwRwRwRwRwrWrWrWrWRwrWrWrWrWRwrWrWRwrWrWRwRwRwrWrWRwRwRwrWrWRwrWRwRwrWRwrWrWRwRwRwRwrWrWrWRwrWrWRwRwRwRwRwRwRwRwRwRwrWRwrWrWRwrWRwRwrWRwrWrWrWrWrWRwRwRwRwrWRwrWrWRwRwRwRwRwRwrWrWrWRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWRwRwrWRwrWrWRwRwRwrWrWrWRwRwrWrWrWrWrWRwRwRwRwrWrWrWRwRwRwrWrWrWRwRwRwRwRwRwRwRwRwRwrWrWRwRwRwRwRwRwRwRwRwRwRwRwRwrWrWRwRwRwrWrWrWRwRwrWRwRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwRwRwRwrWRwRwrWrWRwRwRwRwRwrWrWrWRwRwRwRwRwRwRwrWRwrWRwRwRwrWRwRwRwRwR2025-11-10 13:35:27 us=62000 TEST ROUTES: 0/0 succeeded len=-1 ret=1 a=0 u/d=up

    2025-11-10 13:35:27 us=62000 WARNING: OpenVPN was configured to add an IPv4 route. However, no IPv4 has been configured for NETGEAR-VPN, therefore the route installation may fail or may not work as expected.

    2025-11-10 13:35:27 us=62000 MANAGEMENT: >STATE:1762806927,ADD_ROUTES,,,,,,

    2025-11-10 13:35:27 us=62000 C:\Windows\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 192.168.1.1

    2025-11-10 13:35:27 us=62000 Route addition via service succeeded

    2025-11-10 13:35:27 us=62000 C:\Windows\system32\route.exe ADD 75.2.84.193 MASK 255.255.255.255 192.168.1.1

    2025-11-10 13:35:27 us=62000 Route addition via service succeeded

    2025-11-10 13:35:27 us=62000 C:\Windows\system32\route.exe ADD 99.83.191.32 MASK 255.255.255.255 192.168.1.1

    2025-11-10 13:35:27 us=78000 Route addition via service succeeded

    2025-11-10 13:35:27 us=78000 Initialization Sequence Completed

    2025-11-10 13:35:27 us=78000 MANAGEMENT: >STATE:1762806927,CONNECTED,SUCCESS,,XXX.XXX.246.109,12974,,

    wRwrWRwRwRwRwrWRwRwRwrWRwRwRwRwrWRwrWRwRwRwrWRwRwrWRwRwRwRwRwrWrWRwRwRwRwRwRwRwRwRwrWRwRwrWrWRwRwRwrWrWrWrWrWRwrWRwRwRwRwRwRwrWrWrWrWRwRwRwrWrWrWRwRwrWRwRwRwrWRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWRwrWRwRwRwRwRwRwRwrWRw

  • 2025-11-10 13:35:15 us=453000   pkcs11_pin_cache_period = -1

    2025-11-10 13:35:15 us=453000   pkcs11_id = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   pkcs11_id_management = DISABLED

    2025-11-10 13:35:15 us=453000   server_network = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_network_ipv6 = ::

    2025-11-10 13:35:15 us=453000   server_netbits_ipv6 = 0

    2025-11-10 13:35:15 us=453000   server_bridge_ip = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_bridge_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_bridge_pool_start = 0.0.0.0

    2025-11-10 13:35:15 us=453000   server_bridge_pool_end = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_defined = DISABLED

    2025-11-10 13:35:15 us=453000   ifconfig_pool_start = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_end = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   ifconfig_pool_persist_filename = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   ifconfig_pool_persist_refresh_freq = 600

    2025-11-10 13:35:15 us=453000   ifconfig_ipv6_pool_defined = DISABLED

    2025-11-10 13:35:15 us=453000   ifconfig_ipv6_pool_base = ::

    2025-11-10 13:35:15 us=453000   ifconfig_ipv6_pool_netbits = 0

    2025-11-10 13:35:15 us=453000   n_bcast_buf = 256

    2025-11-10 13:35:15 us=453000   tcp_queue_limit = 64

    2025-11-10 13:35:15 us=453000   real_hash_size = 256

    2025-11-10 13:35:15 us=453000   virtual_hash_size = 256

    2025-11-10 13:35:15 us=453000   client_connect_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   learn_address_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   client_disconnect_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   client_crresponse_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   client_config_dir = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   ccd_exclusive = DISABLED

    2025-11-10 13:35:15 us=453000   tmp_dir = 'C:\Users\theki\AppData\Local\Temp\'

    2025-11-10 13:35:15 us=453000   push_ifconfig_defined = DISABLED

    2025-11-10 13:35:15 us=453000   push_ifconfig_local = 0.0.0.0

    2025-11-10 13:35:15 us=453000   push_ifconfig_remote_netmask = 0.0.0.0

    2025-11-10 13:35:15 us=453000   push_ifconfig_ipv6_defined = DISABLED

    2025-11-10 13:35:15 us=453000   push_ifconfig_ipv6_local = ::/0

    2025-11-10 13:35:15 us=453000   push_ifconfig_ipv6_remote = ::

    2025-11-10 13:35:15 us=453000   enable_c2c = DISABLED

    2025-11-10 13:35:15 us=453000   duplicate_cn = DISABLED

    2025-11-10 13:35:15 us=453000   cf_max = 0

    2025-11-10 13:35:15 us=453000   cf_per = 0

    2025-11-10 13:35:15 us=453000   cf_initial_max = 100

    2025-11-10 13:35:15 us=453000   cf_initial_per = 10

    2025-11-10 13:35:15 us=453000   max_clients = 1024

    2025-11-10 13:35:15 us=453000   max_routes_per_client = 256

    2025-11-10 13:35:15 us=453000   auth_user_pass_verify_script = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   auth_user_pass_verify_script_via_file = DISABLED

    2025-11-10 13:35:15 us=453000   auth_token_generate = DISABLED

    2025-11-10 13:35:15 us=453000   force_key_material_export = DISABLED

    2025-11-10 13:35:15 us=453000   auth_token_lifetime = 0

    2025-11-10 13:35:15 us=453000   auth_token_secret_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   vlan_tagging = DISABLED

    2025-11-10 13:35:15 us=453000   vlan_accept = all

    2025-11-10 13:35:15 us=453000   vlan_pvid = 1

    2025-11-10 13:35:15 us=453000   client = ENABLED

    2025-11-10 13:35:15 us=453000   pull = ENABLED

    2025-11-10 13:35:15 us=453000   auth_user_pass_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   show_net_up = DISABLED

    2025-11-10 13:35:15 us=453000   route_method = 3

    2025-11-10 13:35:15 us=453000   block_outside_dns = DISABLED

    2025-11-10 13:35:15 us=453000   ip_win32_defined = DISABLED

    2025-11-10 13:35:15 us=453000   ip_win32_type = 3

    2025-11-10 13:35:15 us=453000   dhcp_masq_offset = 0

    2025-11-10 13:35:15 us=453000   dhcp_lease_time = 31536000

    2025-11-10 13:35:15 us=453000   tap_sleep = 0

    2025-11-10 13:35:15 us=453000   dhcp_options = 0x00000000

    2025-11-10 13:35:15 us=453000   dhcp_renew = DISABLED

    2025-11-10 13:35:15 us=453000   dhcp_pre_release = DISABLED

    2025-11-10 13:35:15 us=453000   domain = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   netbios_scope = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   netbios_node_type = 0

    2025-11-10 13:35:15 us=453000   disable_nbt = DISABLED

    2025-11-10 13:35:15 us=453000 OpenVPN 2.6.14 [git:v2.6.14/f588592ee6c6323b] Windows [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Aug  6 2025

    2025-11-10 13:35:15 us=453000 Windows version 10.0 (Windows 10 or greater), amd64 executable

    2025-11-10 13:35:15 us=453000 library versions: OpenSSL 3.5.1 1 Jul 2025, LZO 2.10

    2025-11-10 13:35:15 us=453000 DCO version: 1.3.3

    2025-11-10 13:35:15 us=453000 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

    2025-11-10 13:35:15 us=453000 Need hold release from management interface, waiting...

    2025-11-10 13:35:15 us=906000 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:57560

    2025-11-10 13:35:16 us=15000 MANAGEMENT: CMD 'state on'

    2025-11-10 13:35:16 us=15000 MANAGEMENT: CMD 'log on all'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'echo on all'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'bytecount 5'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'state'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'hold off'

    2025-11-10 13:35:16 us=93000 MANAGEMENT: CMD 'hold release'

    2025-11-10 13:35:16 us=109000 LZO compression initializing

    2025-11-10 13:35:16 us=109000 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]

    2025-11-10 13:35:16 us=109000 MANAGEMENT: >STATE:1762806916,RESOLVE,,,,,,

    2025-11-10 13:35:16 us=171000 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]

    2025-11-10 13:35:16 us=171000 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.246.109:12974

    2025-11-10 13:35:16 us=171000 Socket Buffers: R=[65536->393216] S=[65536->393216]

    2025-11-10 13:35:16 us=171000 UDPv4 link local: (not bound)

    2025-11-10 13:35:16 us=171000 UDPv4 link remote: [AF_INET]XXX.XXX.246.109:12974

    2025-11-10 13:35:16 us=171000 MANAGEMENT: >STATE:1762806916,WAIT,,,,,,

    WR2025-11-10 13:35:16 us=234000 MANAGEMENT: >STATE:1762806916,AUTH,,,,,,

    2025-11-10 13:35:16 us=234000 TLS: Initial packet from [AF_INET]XXX.XXX.246.109:12974, sid=6a27a796 1d85406c

    WWRRWRWR2025-11-10 13:35:16 us=281000 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, name=changeme, emailAddress=mail@netgear.com

    2025-11-10 13:35:16 us=281000 VERIFY KU OK

    2025-11-10 13:35:16 us=281000 Validating certificate extended key usage

    2025-11-10 13:35:16 us=281000 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

    2025-11-10 13:35:16 us=281000 VERIFY EKU OK

    2025-11-10 13:35:16 us=281000 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, name=changeme, emailAddress=mail@netgear.com

    WWWRRWR2025-11-10 13:35:16 us=312000 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519

    2025-11-10 13:35:16 us=312000 [netgear] Peer Connection Initiated with [AF_INET]XXX.XXX.246.109:12974

    2025-11-10 13:35:16 us=312000 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

    2025-11-10 13:35:16 us=312000 TLS: tls_multi_process: initial untrusted session promoted to trusted

    W2025-11-10 13:35:17 us=328000 MANAGEMENT: >STATE:1762806917,GET_CONFIG,,,,,,

    2025-11-10 13:35:17 us=328000 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

    WRR2025-11-10 13:35:17 us=359000 PUSH: Received control message: 'PUSH_REPLY,ping 10,ping-restart 120,route-delay 10,route 192.168.1.0 255.255.255.0 192.168.1.1,route 75.2.84.193 255.255.255.255 192.168.1.1,route 99.83.191.32 255.255.255.255 192.168.1.1,peer-id 2,cipher AES-256-GCM'

    2025-11-10 13:35:17 us=359000 OPTIONS IMPORT: route options modified

    2025-11-10 13:35:17 us=359000 OPTIONS IMPORT: route-related options modified

    2025-11-10 13:35:17 us=359000 interactive service msg_channel=936

    2025-11-10 13:35:17 us=375000 ROUTE_GATEWAY 192.168.2.254/255.255.255.0 I=20 HWADDR=10:98:19:f6:54:c4

    2025-11-10 13:35:17 us=375000 open_tun

    2025-11-10 13:35:17 us=375000 tap-windows6 device [NETGEAR-VPN] opened

    2025-11-10 13:35:17 us=375000 TAP-Windows Driver Version 9.27

    2025-11-10 13:35:17 us=375000 TAP-Windows MTU=1500

    2025-11-10 13:35:17 us=375000 Successful ARP Flush on interface [8] {608A8556-FD5F-4C06-8486-CA49D0B130FD}

    2025-11-10 13:35:17 us=375000 do_ifconfig, ipv4=0, ipv6=0

    2025-11-10 13:35:17 us=375000 MANAGEMENT: >STATE:1762806917,ASSIGN_IP,,,,,,

    2025-11-10 13:35:17 us=375000 Data Channel MTU parms [ mss_fix:1367 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]

    2025-11-10 13:35:17 us=375000 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

    2025-11-10 13:35:17 us=375000 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

    2025-11-10 13:35:17 us=375000 Data Channel: cipher 'AES-256-GCM', peer-id: 2, compression: 'lzo'

    2025-11-10 13:35:17 us=375000 Timers: ping 10, ping-restart 120

    WrWrWRwrWRwrWrWRwrWrWrWrWrWrWrWrWRwRwRwrWrWrWRwrWRwRwRwRwrWrWrWRwrWrWRwrWrWRwRwrWrWrWRwrWrWrWRwrWrWrWRwrWrWRwrWrWRwrWRwRwrWrWRwRwrWRwRwrWRwrWrWRwRwRwrWrWRwRwrWRwRwrWrWRwRwrWrWrWrWRwRwRwRwRwRwrWrWrWRwRwrWrWrWRwrWRwrWrWRwrWrWRwRwRwRwrWrWrWRwRwRwRwRwRwRwRwrWRwRwRwRwRwRwRwRwRwRwrWrWRwRwRwrWrWrWrWRwrWrWrWrWrWRwRwrWRwrWrWRwRwRwRwrWrWrWrWRwrWrWRwRwRwRwrWrWrWrWrWRwrWrWRwRwRwRwrWrWrWrWRwrWRwRwrWrWRwRwrWrWrWrWrWRwRwRwRwrWrWrWRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWrWrWrWrWrWrWRwRwRwRwRwrWrWrWrWRwrWRwrWrWRwRwRwrWRwRwRwRwRwRwrWrWrWrWRwrWrWrWrWRwrWrWRwrWrWRwRwRwrWrWRwRwRwrWrWRwrWRwRwrWRwrWrWRwRwRwRwrWrWrWRwrWrWRwRwRwRwRwRwRwRwRwRwrWRwrWrWRwrWRwRwrWRwrWrWrWrWrWRwRwRwRwrWRwrWrWRwRwRwRwRwRwrWrWrWRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWRwRwrWRwrWrWRwRwRwrWrWrWRwRwrWrWrWrWrWRwRwRwRwrWrWrWRwRwRwrWrWrWRwRwRwRwRwRwRwRwRwRwrWrWRwRwRwRwRwRwRwRwRwRwRwRwRwrWrWRwRwRwrWrWrWRwRwrWRwRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwRwRwRwrWRwRwrWrWRwRwRwRwRwrWrWrWRwRwRwRwRwRwRwrWRwrWRwRwRwrWRwRwRwRwR2025-11-10 13:35:27 us=62000 TEST ROUTES: 0/0 succeeded len=-1 ret=1 a=0 u/d=up

    2025-11-10 13:35:27 us=62000 WARNING: OpenVPN was configured to add an IPv4 route. However, no IPv4 has been configured for NETGEAR-VPN, therefore the route installation may fail or may not work as expected.

    2025-11-10 13:35:27 us=62000 MANAGEMENT: >STATE:1762806927,ADD_ROUTES,,,,,,

    2025-11-10 13:35:27 us=62000 C:\Windows\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 192.168.1.1

    2025-11-10 13:35:27 us=62000 Route addition via service succeeded

    2025-11-10 13:35:27 us=62000 C:\Windows\system32\route.exe ADD 75.2.84.193 MASK 255.255.255.255 192.168.1.1

    2025-11-10 13:35:27 us=62000 Route addition via service succeeded

    2025-11-10 13:35:27 us=62000 C:\Windows\system32\route.exe ADD 99.83.191.32 MASK 255.255.255.255 192.168.1.1

    2025-11-10 13:35:27 us=78000 Route addition via service succeeded

    2025-11-10 13:35:27 us=78000 Initialization Sequence Completed

    2025-11-10 13:35:27 us=78000 MANAGEMENT: >STATE:1762806927,CONNECTED,SUCCESS,,XXX.XXX.246.109,12974,,

    wRwrWRwRwRwRwrWRwRwRwrWRwRwRwRwrWRwrWRwRwRwrWRwRwrWRwRwRwRwRwrWrWRwRwRwRwRwRwRwRwRwrWRwRwrWrWRwRwRwrWrWrWrWrWRwrWRwRwRwRwRwRwrWrWrWrWRwRwRwrWrWrWRwRwrWRwRwRwrWRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwRwrWRwrWRwrWRwRwRwRwRwRwRwrWRw

  •  

    Here are the logs. The wifi connected log shows a recursive routing problem but I am unsure why this would happen only when the client is connected vis wifi from the same network as it was when connecting via ethernet and there was no issue. I have had to break this into several parts to get it to fit in the allowed space

     

    Log when connecting with Ethernet

    2025-11-10 13:35:15 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.

    2025-11-10 13:35:15 us=437000 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.

    2025-11-10 13:35:15 us=437000 Current Parameter Settings:

    2025-11-10 13:35:15 us=437000   config = 'client.ovpn'

    2025-11-10 13:35:15 us=437000   mode = 0

    2025-11-10 13:35:15 us=437000   show_ciphers = DISABLED

    2025-11-10 13:35:15 us=437000   show_digests = DISABLED

    2025-11-10 13:35:15 us=437000   show_engines = DISABLED

    2025-11-10 13:35:15 us=437000   genkey = DISABLED

    2025-11-10 13:35:15 us=437000   genkey_filename = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   key_pass_file = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   show_tls_ciphers = DISABLED

    2025-11-10 13:35:15 us=437000   connect_retry_max = 0

    2025-11-10 13:35:15 us=437000 Connection profiles [0]:

    2025-11-10 13:35:15 us=437000   proto = udp

    2025-11-10 13:35:15 us=437000   local = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   local_port = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   remote = 'cameras.dyndns.org'

    2025-11-10 13:35:15 us=437000   remote_port = '12974'

    2025-11-10 13:35:15 us=437000   remote_float = DISABLED

    2025-11-10 13:35:15 us=437000   bind_defined = DISABLED

    2025-11-10 13:35:15 us=437000   bind_local = DISABLED

    2025-11-10 13:35:15 us=437000   bind_ipv6_only = DISABLED

    2025-11-10 13:35:15 us=437000   connect_retry_seconds = 1

    2025-11-10 13:35:15 us=437000   connect_timeout = 120

    2025-11-10 13:35:15 us=437000   socks_proxy_server = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   socks_proxy_port = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   tun_mtu = 1500

    2025-11-10 13:35:15 us=437000   tun_mtu_defined = ENABLED

    2025-11-10 13:35:15 us=437000   link_mtu = 1500

    2025-11-10 13:35:15 us=437000   link_mtu_defined = DISABLED

    2025-11-10 13:35:15 us=437000   tun_mtu_extra = 32

    2025-11-10 13:35:15 us=437000   tun_mtu_extra_defined = ENABLED

    2025-11-10 13:35:15 us=437000   tls_mtu = 1250

    2025-11-10 13:35:15 us=437000   mtu_discover_type = -1

    2025-11-10 13:35:15 us=437000   fragment = 0

    2025-11-10 13:35:15 us=437000   mssfix = 1492

    2025-11-10 13:35:15 us=437000   mssfix_encap = ENABLED

    2025-11-10 13:35:15 us=437000   mssfix_fixed = DISABLED

    2025-11-10 13:35:15 us=437000   explicit_exit_notification = 0

    2025-11-10 13:35:15 us=437000   tls_auth_file = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   key_direction = not set

    2025-11-10 13:35:15 us=437000   tls_crypt_file = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   tls_crypt_v2_file = '[UNDEF]'

    2025-11-10 13:35:15 us=437000 Connection profiles END

    2025-11-10 13:35:15 us=437000   remote_random = DISABLED

    2025-11-10 13:35:15 us=437000   ipchange = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   dev = 'tap'

    2025-11-10 13:35:15 us=437000   dev_type = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   dev_node = 'NETGEAR-VPN'

    2025-11-10 13:35:15 us=437000   tuntap_options.disable_dco = ENABLED

    2025-11-10 13:35:15 us=437000   lladdr = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   topology = 1

    2025-11-10 13:35:15 us=437000   ifconfig_local = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   ifconfig_remote_netmask = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   ifconfig_noexec = DISABLED

    2025-11-10 13:35:15 us=437000   ifconfig_nowarn = DISABLED

    2025-11-10 13:35:15 us=437000   ifconfig_ipv6_local = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   ifconfig_ipv6_netbits = 0

    2025-11-10 13:35:15 us=437000   ifconfig_ipv6_remote = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   shaper = 0

    2025-11-10 13:35:15 us=437000   mtu_test = 0

    2025-11-10 13:35:15 us=437000   mlock = DISABLED

    2025-11-10 13:35:15 us=437000   keepalive_ping = 0

    2025-11-10 13:35:15 us=437000   keepalive_timeout = 0

    2025-11-10 13:35:15 us=437000   inactivity_timeout = 0

    2025-11-10 13:35:15 us=437000   session_timeout = 0

    2025-11-10 13:35:15 us=437000   inactivity_minimum_bytes = 0

    2025-11-10 13:35:15 us=437000   ping_send_timeout = 0

    2025-11-10 13:35:15 us=437000   ping_rec_timeout = 0

    2025-11-10 13:35:15 us=437000   ping_rec_timeout_action = 0

    2025-11-10 13:35:15 us=437000   ping_timer_remote = DISABLED

    2025-11-10 13:35:15 us=437000   remap_sigusr1 = 0

    2025-11-10 13:35:15 us=437000   persist_tun = ENABLED

    2025-11-10 13:35:15 us=437000   persist_local_ip = DISABLED

    2025-11-10 13:35:15 us=437000   persist_remote_ip = DISABLED

    2025-11-10 13:35:15 us=437000   persist_key = ENABLED

    2025-11-10 13:35:15 us=437000   passtos = DISABLED

    2025-11-10 13:35:15 us=437000   resolve_retry_seconds = 1000000000

    2025-11-10 13:35:15 us=437000   resolve_in_advance = DISABLED

    2025-11-10 13:35:15 us=437000   username = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   groupname = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   chroot_dir = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   cd_dir = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   writepid = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   up_script = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   down_script = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   down_pre = DISABLED

    2025-11-10 13:35:15 us=437000   up_restart = DISABLED

    2025-11-10 13:35:15 us=437000   up_delay = DISABLED

    2025-11-10 13:35:15 us=437000   daemon = DISABLED

    2025-11-10 13:35:15 us=437000   log = ENABLED

    2025-11-10 13:35:15 us=437000   suppress_timestamps = DISABLED

    2025-11-10 13:35:15 us=437000   machine_readable_output = DISABLED

    2025-11-10 13:35:15 us=437000   nice = 0

    2025-11-10 13:35:15 us=437000   verbosity = 5

    2025-11-10 13:35:15 us=437000   mute = 0

    2025-11-10 13:35:15 us=437000   gremlin = 0

    2025-11-10 13:35:15 us=437000   status_file = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   status_file_version = 1

    2025-11-10 13:35:15 us=437000   status_file_update_freq = 60

    2025-11-10 13:35:15 us=437000   occ = ENABLED

    2025-11-10 13:35:15 us=437000   rcvbuf = 393216

    2025-11-10 13:35:15 us=437000   sndbuf = 393216

    2025-11-10 13:35:15 us=437000   sockflags = 0

    2025-11-10 13:35:15 us=437000   fast_io = DISABLED

    2025-11-10 13:35:15 us=437000   comp.alg = 2

    2025-11-10 13:35:15 us=437000   comp.flags = 1

    2025-11-10 13:35:15 us=437000   route_script = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   route_default_gateway = '[UNDEF]'

    2025-11-10 13:35:15 us=437000   route_default_metric = 0

    2025-11-10 13:35:15 us=437000   route_noexec = DISABLED

    2025-11-10 13:35:15 us=437000   route_delay = 5

    2025-11-10 13:35:15 us=437000   route_delay_window = 30

    2025-11-10 13:35:15 us=437000   route_delay_defined = ENABLED

    2025-11-10 13:35:15 us=437000   route_nopull = DISABLED

    2025-11-10 13:35:15 us=437000   route_gateway_via_dhcp = DISABLED

    2025-11-10 13:35:15 us=437000   allow_pull_fqdn = DISABLED

    2025-11-10 13:35:15 us=437000   Pull filters:

    2025-11-10 13:35:15 us=437000     ignore "route-method"

    2025-11-10 13:35:15 us=437000   management_addr = '127.0.0.1'

    2025-11-10 13:35:15 us=437000   management_port = '25340'

    2025-11-10 13:35:15 us=437000   management_user_pass = 'stdin'

    2025-11-10 13:35:15 us=437000   management_log_history_cache = 250

    2025-11-10 13:35:15 us=437000   management_echo_buffer_size = 100

    2025-11-10 13:35:15 us=453000   management_client_user = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   management_client_group = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   management_flags = 6

    2025-11-10 13:35:15 us=453000   shared_secret_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   key_direction = not set

    2025-11-10 13:35:15 us=453000   ciphername = 'AES-128-CBC'

    2025-11-10 13:35:15 us=453000   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'

    2025-11-10 13:35:15 us=453000   authname = 'SHA1'

    2025-11-10 13:35:15 us=453000   engine = DISABLED

    2025-11-10 13:35:15 us=453000   replay = ENABLED

    2025-11-10 13:35:15 us=453000   mute_replay_warnings = DISABLED

    2025-11-10 13:35:15 us=453000   replay_window = 64

    2025-11-10 13:35:15 us=453000   replay_time = 15

    2025-11-10 13:35:15 us=453000   packet_id_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   test_crypto = DISABLED

    2025-11-10 13:35:15 us=453000   tls_server = DISABLED

    2025-11-10 13:35:15 us=453000   tls_client = ENABLED

    2025-11-10 13:35:15 us=453000   ca_file = 'ca.crt'

    2025-11-10 13:35:15 us=453000   ca_path = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   dh_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   cert_file = 'client.crt'

    2025-11-10 13:35:15 us=453000   extra_certs_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   priv_key_file = 'client.key'

    2025-11-10 13:35:15 us=453000   pkcs12_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   cryptoapi_cert = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   cipher_list = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   cipher_list_tls13 = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   tls_cert_profile = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   tls_verify = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   tls_export_peer_cert_dir = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   verify_x509_type = 0

    2025-11-10 13:35:15 us=453000   verify_x509_name = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   crl_file = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   ns_cert_type = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 65535

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_ku[i] = 0

    2025-11-10 13:35:15 us=453000   remote_cert_eku = 'TLS Web Server Authentication'

    2025-11-10 13:35:15 us=453000   ssl_flags = 192

    2025-11-10 13:35:15 us=453000   tls_timeout = 2

    2025-11-10 13:35:15 us=453000   renegotiate_bytes = -1

    2025-11-10 13:35:15 us=453000   renegotiate_packets = 0

    2025-11-10 13:35:15 us=453000   renegotiate_seconds = 3600

    2025-11-10 13:35:15 us=453000   handshake_window = 60

    2025-11-10 13:35:15 us=453000   transition_window = 3600

    2025-11-10 13:35:15 us=453000   single_session = DISABLED

    2025-11-10 13:35:15 us=453000   push_peer_info = DISABLED

    2025-11-10 13:35:15 us=453000   tls_exit = DISABLED

    2025-11-10 13:35:15 us=453000   tls_crypt_v2_metadata = '[UNDEF]'

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_protected_authentication = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_private_mode = 00000000

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

    2025-11-10 13:35:15 us=453000   pkcs11_cert_private = DISABLED

     

    • The RS300 router is set up at the Remote location. (perhaps your home office)

    Yes, the RS300 is at the remote location

     

    • What is the primary IP subnet for the RS300?

    192.168.1.1

     

    • What IP subnet does the RS300 use for devices connected using OpenVPN?

    It has been connecting the laptop at 192.168.1.3 and the tablet at 192.168.1.196

     

    • The Windows 11 laptops are located at the Client location (or at a public WiFi location).

    Generally at my home (the client location) but I also tried a public WiFI location

    • When the Windows 11 laptops are connected to the Client system using Ethernet, they receive a local IP address that is different from the IP subnet at the Remote location.

    192.168.2.54 for the laptop


    Over Ethernet, the laptops can connect to OpenVPN and "everything works".  What is the IP address they receive from the RS300 when connected using Ethernet?

                192.168.1.3

    • When the Windows 11 laptops are connected to the Client system using WiFi, they receive what IP address? 192.168.1.3

     What "router status" says the connection is successful? I look at the router connections status page under “Attached Devices / VPN Client Devices”

    are these tests being conducted with the Client and Remote networks physically in the same location? The remote and client are in different locations with different ISPs.

     

     

  • CrimpOn's avatar
    CrimpOn
    Guru - Experienced User

    I struggle with "Client" and "Remote".

     

    Is this correct:

    • The RS300 router is set up at the Remote location. (perhaps your home office)
    • What is the primary IP subnet for the RS300?
    • What IP subnet does the RS300 use for devices connected using OpenVPN?
    • The Windows 11 laptops are located at the Client location (or at a public WiFi location).
    • When the Windows 11 laptops are connected to the Client system using Ethernet, they receive a local IP address that is different from the IP subnet at the Remote location.
      Over Ethernet, the laptops can connect to OpenVPN and "everything works".  What is the IP address they receive from the RS300 when connected using Ethernet?
    • When the Windows 11 laptops are connected to the Client system using WiFi, they receive what IP address?  What "router status" says the connection is successful?  (are these tests being conducted with the Client and Remote networks physically in the same location?

    I like to set the OpenVPN log file debugging option to 5.  i.e. change 

    verb 0

    to

    verb 5

     

  • No. I am trying to connect to my router from a remote location using VPN. I am only using one connection type at a time. I discovered the issue when trying the second computer that was connecting to the network via wifi. The first computer connected fine as it was connected via ethernet. That is when I tried alternately wired and wifi connections on both of the computers and found the issue was consistent.

  • StephenB's avatar
    StephenB
    Guru - Experienced User
    KngDa wrote:

    I want to connect to the RS300 "remote" LAN via the VPN tunnel and the internet through the local LAN at the client location. This works perfectly as long as the client computers are connected to their local LAN via a hardwired Ethernet connection. If the client computers are connected with a WI-fi connection (which works perfectly without the VPN) on the same local network, there are issues.

    Are you saying that the you are trying to connect a PC to your router using OpenVPN while the same PC is already connected to the same router over WiFi?