OpenVPN Status for the Linksys DD-WRT v3Router Sceenshot

Back to the Linksys DD-WRT v3



Screenshots from PortForward.com


DD-WRT (build 33986) - OpenVPN Status DD-WRT Control Panel Client: CONNECTED SUCCESS Local Address: \ Remote Address: \ VPN Client Stats TUN/TAP read bytes 25540779 TUN/TAP write bytes 2841157 TCP/UDP read bytes 3617819 TCP/UDP write bytes 26375574 Auth read bytes 2841173 pre-compress bytes 4129781 post-compress bytes 3670891 pre-decompress bytes 45118 post-decompress bytes 74164 Clientlog: 20180126 17:48:34 W WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6 20180126 17:48:34 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible 20180126 17:48:34 I OpenVPN 2.4.4 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 4 2017 20180126 17:48:34 I library versions: OpenSSL 1.1.0g 2 Nov 2017 LZO 2.09 20180126 17:48:34 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16 20180126 17:48:34 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20180126 17:48:36 I TCP/UDP: Preserving recently used remote address: [AF_INET]\:1194 20180126 17:48:36 Socket Buffers: R=[180224->180224] S=[180224->180224] 20180126 17:48:36 I UDPv4 link local: (not bound) 20180126 17:48:36 I UDPv4 link remote: [AF_INET]\:1194 20180126 17:48:36 TLS: Initial packet from [AF_INET]\:1194 sid=\ 20180126 17:48:36 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 20180126 17:48:36 VERIFY OK: depth=1 C=US ST=FL L=Winter Park O=IPVanish OU=IPVanish VPN CN=IPVanish CA emailAddress=support@ipvanish.com 20180126 17:48:36 VERIFY KU OK 20180126 17:48:36 Validating certificate extended key usage 20180126 17:48:36 NOTE: --mute triggered... 20180126 17:48:37 4 variation(s) on previous 3 message(s) suppressed by --mute 20180126 17:48:37 I [\] Peer Connection Initiated with [AF_INET]\:1194 20180126 17:48:38 Key [AF_INET]\:1194 [0] not initialized (yet) dropping packet. 20180126 17:48:38 SENT CONTROL [\]: 'PUSH_REQUEST' (status=1) 20180126 17:48:38 PUSH: Received control message: 'PUSH_REPLY redirect-gateway def1 bypass-dhcp dhcp-option DNS \ dhcp-option DNS 198.18.0.2 rcvbuf 262144 explicit-exit-notify 5 route-gateway \ topology subnet ping 20 ping-restart 40 ifconfig \ 255.255.254.0' 20180126 17:48:38 W Option 'explicit-exit-notify' in [PUSH-OPTIONS]:5 is ignored by previous blocks 20180126 17:48:38 OPTIONS IMPORT: timers and/or timeouts modified 20180126 17:48:38 OPTIONS IMPORT: explicit notify parm(s) modified 20180126 17:48:38 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified 20180126 17:48:38 Socket Buffers: R=[180224->360448] S=[180224->180224] 20180126 17:48:38 OPTIONS IMPORT: --ifconfig/up options modified 20180126 17:48:38 OPTIONS IMPORT: route options modified 20180126 17:48:38 OPTIONS IMPORT: route-related options modified 20180126 17:48:38 NOTE: --mute triggered... 20180126 17:48:38 1 variation(s) on previous 3 message(s) suppressed by --mute 20180126 17:48:38 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key 20180126 17:48:38 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication 20180126 17:48:38 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key 20180126 17:48:38 NOTE: --mute triggered... 20180126 17:48:38 1 variation(s) on previous 3 message(s) suppressed by --mute 20180126 17:48:38 I TUN/TAP device tun1 opened 20180126 17:48:38 TUN/TAP TX queue length set to 100 20180126 17:48:38 D do_ifconfig tt->did_ifconfig_ipv6_setup=0 20180126 17:48:38 I /sbin/ifconfig tun1 \ netmask 255.255.254.0 mtu 1500 broadcast \ 20180126 17:48:38 /sbin/route add -net \ netmask 255.255.255.255 gw 192.168.0.1 20180126 17:48:38 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw \ 20180126 17:48:38 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw \ 20180126 17:48:38 I Initialization Sequence Completed 20180126 18:03:26 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180126 18:03:26 D MANAGEMENT: CMD 'state' 20180126 18:03:26 MANAGEMENT: Client disconnected 20180126 18:03:26 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180126 18:03:26 D MANAGEMENT: CMD 'state' 20180126 18:03:26 MANAGEMENT: Client disconnected 20180126 18:03:26 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180126 18:03:26 D MANAGEMENT: CMD 'state' 20180126 18:03:26 MANAGEMENT: Client disconnected 20180126 18:03:26 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180126 18:03:26 D MANAGEMENT: CMD 'status 2' 20180126 18:03:26 MANAGEMENT: Client disconnected 20180126 18:03:26 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180126 18:03:26 D MANAGEMENT: CMD 'log 500' 19691231 19:00:00 : : 18:03:26 up 22:59, load average: 0.00, 0.00, 0.00 WAN  IP: 192.168.0.3
Home > Screenshots > Linksys > DD-WRT v3 > OpenVPN Status