Started by Edelweiss, Oct 03, 2022, 04:56 AM
port 1194proto udpdev tunuser nobodygroup nogrouppersist-keypersist-tunkeepalive 10 120topology subnetserver 10.8.0.0 255.255.255.0ifconfig-pool-persist ipp.txtpush "dhcp-option DNS ********.14"push "dhcp-option DNS ********.15"push "redirect-gateway def1 bypass-dhcp"dh noneecdh-curve prime256v1tls-crypt tls-crypt.keycrl-verify crl.pemca ca.crtcert server_********.crtkey server_********.keyauth none#cipher AES-128-GCM#ncp-ciphers AES-128-GCMcipher nonetls-servertls-version-min 1.2tls-cipher TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256client-config-dir /etc/openvpn/ccdstatus /var/log/openvpn/status.logverb 3#possible bandwidth increasesndbuf 0rcvbuf 0push "sndbuf 524288"push "rcvbuf 524288"
Quote from: -DM- on Oct 03, 2022, 05:34 AMproto tcpYou need to do it on both the client and the server.
Quote from: -DM- on Oct 03, 2022, 05:34 AMis selinux used?
Quote from: Edelweiss on Oct 03, 2022, 04:56 AMWhat else can I do?
Quote from: Term on Oct 03, 2022, 09:30 AMWell, in this case: maybe you have something that creates a bunch of open sockets, which do not nail and clog the channel.The channel to the server is sufficient?
Quote from: Bronson on Oct 03, 2022, 07:23 AMWireguard then.
Quote from: -DM- on Oct 03, 2022, 12:02 PMMaybe some device also has the VPN enabled at that moment, that's why there are all sorts of frustrations?
Quote from: Edelweiss on Oct 03, 2022, 01:08 PMI'll see what I can do.
Page created in 0.448 seconds with 19 queries.