[SOLVED]2 Modems ASUS open vpn /surfshark dd-wrt problem

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Author Message
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 5:32    Post subject: [SOLVED]2 Modems ASUS open vpn /surfshark dd-wrt problem Reply with quote
Hello I have two modems. One is the first router connected to the spectrum modem. Is an asus AC5300 and the second modem is connected to the first router. This second modem is an AC87U and is where I have the dad-wrt with the openvpn. The first modem, the AC5300, it doesn’t has dd-wrt. The problem is I configured the surfshark modem as follows:

https://support.surfshark.com/hc/en-us/articles/360003086114-How-to-set-up-Surfshark-VPN-on-DD-WRT-router-

All is ok and perfect. It says connected to the VPN in status open vpn. But when I explore a webpage does nothing. If I disable the open vpn works perfectly fine the ac87u second mode with the did-wrt, but has no VPN protection of course.

The first modem I have with the ranges of IP’s 192.168.1.xxx and the second modem with 192.168.2.xxx. If I connect to the secon modem any device it acquires perfectly the IP’s 192.168.2.xxx as should be no problem of connection turned on or off the open vpn, but I have only internet if I disable the open vpn. What could be the problem? I have several days and I can’t find the solution.

Check photos of the configuration in the ac87u did-wrt the photos are self describing because can be seen the GUI of the did-wrt. The photos that not show the GUI of the dad-wrt are the photos of the modem without dad-wrt and that is connected to the spectrum modem. In the past I had used PIA with this setup and worked fine. The version of dad-wrt I use is DD-WRT v3.0-r44715 std (11/03/20)

What could be the problem? I don’t know what else to do.

These are the photos:

https://ibb.co/mXmQzTg
https://ibb.co/pK9QrQ2
https://ibb.co/rG3wRfj
https://ibb.co/7y6htnj
https://ibb.co/X49mPQw
https://ibb.co/djjV31n
https://ibb.co/kcVfF82
https://ibb.co/GcfZkkT
https://ibb.co/HnSK7J2
https://ibb.co/cFXJx8t
https://ibb.co/C7djBmc
https://ibb.co/ykKvpdY
https://ibb.co/MsJ6qgz
https://ibb.co/wJVnZ8y
https://ibb.co/DwtZZX4
https://ibb.co/DRdwtpd
Sponsor
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12889
Location: Netherlands

PostPosted: Sun Feb 19, 2023 7:30    Post subject: Reply with quote
I did not study your photo's yet as I stopped reading when I saw you are running an old and outdated build.

See the forum guidelines with helpful pointers about how to research your router, where and what firmware to download, where and how to post and many other helpful tips:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087

Latest build is 51741.

After upgrading reset to defaults and put settings in manually never restore from a backup (to a different build)

Most providers have outdated and/or wrong instructions see the OpenVPN Client setup guide:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=327398

If Surfshark supports it I would also research WireGuard, a faster and simpler VPN connection, WireGuard documentation is also a sticky in this forum.

P.S. You do not have two modems but two routers Smile

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 15:03    Post subject: Reply with quote
Oh I see I found that version. Searching as you mention. I will try and give comments here after upload the new firmware.
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 16:07    Post subject: Reply with quote
I upgraded the firmware to the version Firmware: DD-WRT v3.0-r51741 std (02/18/23). All configuration is similar I checked. However, now with the new version I have another issue. Previously with the old firmware the did-wrt status/open vpn showed connected and gave logs to see the status of open vpn, now check photo of the status open vpn in did-wrt, the open vpn clien is enabled and there is no ‘connected’ or something. Also I attach a photo of the main settings of the router with the new firmware.

I attach 3 photos via these forum and other with the link:

https://ibb.co/H7tShY1

forum only allows me to upload 3 photos that is the reason I upload the 4th one to ibb.

What could be the problem now?
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12889
Location: Netherlands

PostPosted: Sun Feb 19, 2023 16:15    Post subject: Reply with quote
Download the OpenVPN Client setup guide.

As said most VPN providers have outdated and sometimes wrong instructions.

The guide also has some instructions for your provider.

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 17:06    Post subject: Reply with quote
I followed carefully the setup guide you mention. And now I made the open status says connected. To connect it requires the ciphers as shown in the guide, if you don’t have them it doesn’t connects. However, the problem is the same of the original post, if I try to navigate to any page nothing is dead, if I disable open vpn I can surf perfectly.

What could be the issue?

Here are the photos with the new configuration that at least it says connected, although not surfing.

https://ibb.co/XjHmhcB
https://ibb.co/cJzq0mY
https://ibb.co/vJ5mptZ
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 17:33    Post subject: Reply with quote
Code:
Also I attach here the logs of the open vpn:




Logs:

Client Log:
20230219 10:53:59 W WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
20230219 10:53:59 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
20230219 10:53:59 I OpenVPN 2.6.0 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD]
20230219 10:53:59 I library versions: OpenSSL 1.1.1s 1 Nov 2022 LZO 2.10
20230219 10:53:59 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
20230219 10:53:59 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20230219 10:53:59 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20230219 10:53:59 NOTE: --mute triggered...
20230219 10:53:59 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:53:59 I TCP/UDP: Preserving recently used remote address: [AF_INET]37.19.200.100:1194
20230219 10:53:59 Socket Buffers: R=[262144->262144] S=[262144->262144]
20230219 10:53:59 I UDPv4 link local: (not bound)
20230219 10:53:59 I UDPv4 link remote: [AF_INET]37.19.200.100:1194
20230219 10:53:59 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:60674
20230219 10:53:59 D MANAGEMENT: CMD 'state'
20230219 10:53:59 MANAGEMENT: Client disconnected
20230219 10:53:59 NOTE: --mute triggered...
20230219 10:53:59 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:53:59 D MANAGEMENT: CMD 'state'
20230219 10:53:59 MANAGEMENT: Client disconnected
20230219 10:53:59 TLS: Initial packet from [AF_INET]37.19.200.100:1194 sid=678dff60 8964cf70
20230219 10:53:59 W WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
20230219 10:53:59 VERIFY OK: depth=2 C=VG O=Surfshark CN=Surfshark Root CA
20230219 10:53:59 NOTE: --mute triggered...
20230219 10:53:59 6 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:53:59 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:60692
20230219 10:53:59 D MANAGEMENT: CMD 'status 2'
20230219 10:53:59 MANAGEMENT: Client disconnected
20230219 10:53:59 Control Channel: TLSv1.2 cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 peer certificate: 2048 bit RSA signature: RSA-SHA256
20230219 10:53:59 I [us-dal-v064.prod.surfshark.com] Peer Connection Initiated with [AF_INET]37.19.200.100:1194
20230219 10:53:59 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
20230219 10:53:59 NOTE: --mute triggered...
20230219 10:53:59 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:53:59 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:60706
20230219 10:53:59 D MANAGEMENT: CMD 'log 500'
20230219 10:53:59 MANAGEMENT: Client disconnected
20230219 10:54:00 SENT CONTROL [us-dal-v064.prod.surfshark.com]: 'PUSH_REQUEST' (status=1)
20230219 10:54:00 NOTE: --mute triggered...
20230219 10:54:00 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:00 N Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:7: block-outside-dns (2.6.0)
20230219 10:54:00 OPTIONS IMPORT: timers and/or timeouts modified
20230219 10:54:00 NOTE: --mute triggered...
20230219 10:54:00 2 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:00 Socket Buffers: R=[262144->524288] S=[262144->524288]
20230219 10:54:00 OPTIONS IMPORT: --ifconfig/up options modified
20230219 10:54:00 NOTE: --mute triggered...
20230219 10:54:00 5 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:00 net_route_v4_best_gw query: dst 0.0.0.0
20230219 10:54:00 net_route_v4_best_gw result: via 192.168.1.1 dev vlan2
20230219 10:54:00 I TUN/TAP device tun1 opened
20230219 10:54:00 I net_iface_mtu_set: mtu 1500 for tun1
20230219 10:54:00 I net_iface_up: set tun1 up
20230219 10:54:00 I net_addr_v4_add: 10.8.8.2/24 dev tun1
20230219 10:54:00 net_route_v4_add: 37.19.200.100/32 via 192.168.1.1 dev [NULL] table 0 metric -1
20230219 10:54:00 net_route_v4_add: 0.0.0.0/1 via 10.8.8.1 dev [NULL] table 0 metric -1
20230219 10:54:00 net_route_v4_add: 128.0.0.0/1 via 10.8.8.1 dev [NULL] table 0 metric -1
20230219 10:54:00 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
20230219 10:54:00 NOTE: --mute triggered...
20230219 10:54:00 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:00 I Initialization Sequence Completed
20230219 10:54:02 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:60712
20230219 10:54:02 D MANAGEMENT: CMD 'state'
20230219 10:54:02 MANAGEMENT: Client disconnected
20230219 10:54:02 NOTE: --mute triggered...
20230219 10:54:02 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:02 D MANAGEMENT: CMD 'state'
20230219 10:54:02 MANAGEMENT: Client disconnected
20230219 10:54:02 NOTE: --mute triggered...
20230219 10:54:02 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:02 D MANAGEMENT: CMD 'state'
20230219 10:54:02 MANAGEMENT: Client disconnected
20230219 10:54:02 NOTE: --mute triggered...
20230219 10:54:02 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:02 D MANAGEMENT: CMD 'status 2'
20230219 10:54:02 MANAGEMENT: Client disconnected
20230219 10:54:02 NOTE: --mute triggered...
20230219 10:54:02 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:54:02 D MANAGEMENT: CMD 'log 500'
20230219 10:54:02 MANAGEMENT: Client disconnected
20230219 10:56:33 NOTE: --mute triggered...
20230219 10:56:33 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:56:33 D MANAGEMENT: CMD 'state'
20230219 10:56:33 MANAGEMENT: Client disconnected
20230219 10:56:33 NOTE: --mute triggered...
20230219 10:56:33 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:56:33 D MANAGEMENT: CMD 'state'
20230219 10:56:33 MANAGEMENT: Client disconnected
20230219 10:56:33 NOTE: --mute triggered...
20230219 10:56:33 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:56:33 D MANAGEMENT: CMD 'state'
20230219 10:56:33 MANAGEMENT: Client disconnected
20230219 10:56:34 NOTE: --mute triggered...
20230219 10:56:34 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:56:34 D MANAGEMENT: CMD 'status 2'
20230219 10:56:34 MANAGEMENT: Client disconnected
20230219 10:56:34 NOTE: --mute triggered...
20230219 10:56:34 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 10:56:34 D MANAGEMENT: CMD 'log 500'
19691231 18:00:00
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12889
Location: Netherlands

PostPosted: Sun Feb 19, 2023 18:30    Post subject: Reply with quote
Remove everything from the Additional configuration except:
verb 5
pull-filter ignore ifconfig-ipv6
pull-filter ignore route-ipv6
block-ipv6

Furthermore set Compression to Disabled

then please post the log again

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 18:47    Post subject: Reply with quote
Same issue it doesn’t surf. I just left the values in additional config as:

verb 5
pull-filter ignore ifconfig-ipv6
pull-filter ignore route-ipv6
block-ipv6

About compression is set to “No”. Check photo how is set to No unless other compression is what you mean.

The new log files:

Code:
Client Log:
19691231 18:00:25 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
19691231 18:00:25 NOTE: --mute triggered...
19691231 18:00:25 1 variation(s) on previous 3 message(s) suppressed by --mute
19691231 18:00:25 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
19691231 18:00:25 NOTE: --mute triggered...
19691231 18:00:25 1 variation(s) on previous 3 message(s) suppressed by --mute
19691231 18:00:25 I TCP/UDP: Preserving recently used remote address: [AF_INET]169.150.254.76:1194
19691231 18:00:25 Socket Buffers: R=[262144->262144] S=[262144->262144]
19691231 18:00:25 I UDPv4 link local: (not bound)
19691231 18:00:25 I UDPv4 link remote: [AF_INET]169.150.254.76:1194
19691231 18:00:25 TLS: Initial packet from [AF_INET]169.150.254.76:1194 sid=f35e0888 ce3cc8b2
19691231 18:00:25 N VERIFY ERROR: depth=2 error=certificate is not yet valid: C=VG O=Surfshark CN=Surfshark Root CA serial=14644944541690560422
19691231 18:00:25 NOTE: --mute triggered...
19691231 18:00:25 4 variation(s) on previous 3 message(s) suppressed by --mute
19691231 18:00:25 TCP/UDP: Closing socket
19691231 18:00:25 I SIGUSR1[soft tls-error] received process restarting
19691231 18:00:25 Restart pause 1 second(s)
19691231 18:00:26 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
19691231 18:00:26 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
19691231 18:00:26 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
19691231 18:00:26 NOTE: --mute triggered...
19691231 18:00:26 1 variation(s) on previous 3 message(s) suppressed by --mute
19691231 18:00:26 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
19691231 18:00:26 NOTE: --mute triggered...
19691231 18:00:26 1 variation(s) on previous 3 message(s) suppressed by --mute
19691231 18:00:26 I TCP/UDP: Preserving recently used remote address: [AF_INET]169.150.254.76:1194
19691231 18:00:26 Socket Buffers: R=[262144->262144] S=[262144->262144]
19691231 18:00:26 I UDPv4 link local: (not bound)
19691231 18:00:26 I UDPv4 link remote: [AF_INET]169.150.254.76:1194
19691231 18:00:26 TLS: Initial packet from [AF_INET]169.150.254.76:1194 sid=d9a1e532 6a7e9c28
19691231 18:00:26 N VERIFY ERROR: depth=2 error=certificate is not yet valid: C=VG O=Surfshark CN=Surfshark Root CA serial=14644944541690560422
19691231 18:00:26 NOTE: --mute triggered...
19691231 18:00:26 4 variation(s) on previous 3 message(s) suppressed by --mute
19691231 18:00:26 TCP/UDP: Closing socket
19691231 18:00:26 I SIGUSR1[soft tls-error] received process restarting
19691231 18:00:26 Restart pause 1 second(s)
20230219 12:37:44 W WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
20230219 12:37:44 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20230219 12:37:44 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
20230219 12:37:44 NOTE: --mute triggered...
20230219 12:37:44 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:44 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
20230219 12:37:44 NOTE: --mute triggered...
20230219 12:37:44 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:44 I TCP/UDP: Preserving recently used remote address: [AF_INET]169.150.254.78:1194
20230219 12:37:44 Socket Buffers: R=[262144->262144] S=[262144->262144]
20230219 12:37:44 I UDPv4 link local: (not bound)
20230219 12:37:44 I UDPv4 link remote: [AF_INET]169.150.254.78:1194
20230219 12:37:44 TLS: Initial packet from [AF_INET]169.150.254.78:1194 sid=617ec04a 14e1cd91
20230219 12:37:44 NOTE: --mute triggered...
20230219 12:37:44 4 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:44 I [us-dal-v088.prod.surfshark.com] Peer Connection Initiated with [AF_INET]169.150.254.78:1194
20230219 12:37:44 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
20230219 12:37:44 NOTE: --mute triggered...
20230219 12:37:45 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:45 SENT CONTROL [us-dal-v088.prod.surfshark.com]: 'PUSH_REQUEST' (status=1)
20230219 12:37:45 NOTE: --mute triggered...
20230219 12:37:45 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:45 N Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:7: block-outside-dns (2.6.0)
20230219 12:37:45 OPTIONS IMPORT: timers and/or timeouts modified
20230219 12:37:45 NOTE: --mute triggered...
20230219 12:37:45 2 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:45 Socket Buffers: R=[262144->524288] S=[262144->524288]
20230219 12:37:45 OPTIONS IMPORT: --ifconfig/up options modified
20230219 12:37:45 NOTE: --mute triggered...
20230219 12:37:45 5 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:45 net_route_v4_best_gw query: dst 0.0.0.0
20230219 12:37:45 net_route_v4_best_gw result: via 192.168.1.1 dev vlan2
20230219 12:37:45 I TUN/TAP device tun1 opened
20230219 12:37:45 do_ifconfig ipv4=1 ipv6=0
20230219 12:37:45 I net_iface_mtu_set: mtu 1400 for tun1
20230219 12:37:45 I net_iface_up: set tun1 up
20230219 12:37:45 I net_addr_v4_add: 10.8.8.7/24 dev tun1
20230219 12:37:45 net_route_v4_add: 169.150.254.78/32 via 192.168.1.1 dev [NULL] table 0 metric -1
20230219 12:37:45 net_route_v4_add: 0.0.0.0/1 via 10.8.8.1 dev [NULL] table 0 metric -1
20230219 12:37:45 net_route_v4_add: 128.0.0.0/1 via 10.8.8.1 dev [NULL] table 0 metric -1
20230219 12:37:45 Data Channel: using negotiated cipher 'AES-256-GCM'
20230219 12:37:45 Data Channel MTU parms [ mss_fix:1360 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
20230219 12:37:45 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
20230219 12:37:45 NOTE: --mute triggered...
20230219 12:37:45 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:37:45 I Initialization Sequence Completed
20230219 12:38:50 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:47488
20230219 12:38:50 D MANAGEMENT: CMD 'state'
20230219 12:38:50 MANAGEMENT: Client disconnected
20230219 12:38:50 NOTE: --mute triggered...
20230219 12:38:50 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:38:50 D MANAGEMENT: CMD 'state'
20230219 12:38:50 MANAGEMENT: Client disconnected
20230219 12:38:50 NOTE: --mute triggered...
20230219 12:38:50 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:38:50 D MANAGEMENT: CMD 'state'
20230219 12:38:50 MANAGEMENT: Client disconnected
20230219 12:38:50 NOTE: --mute triggered...
20230219 12:38:51 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:38:51 D MANAGEMENT: CMD 'status 2'
20230219 12:38:51 MANAGEMENT: Client disconnected
20230219 12:38:51 NOTE: --mute triggered...
20230219 12:38:51 1 variation(s) on previous 3 message(s) suppressed by --mute
20230219 12:38:51 D MANAGEMENT: CMD 'log 500'
19691231 18:00:00
[/code]
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12889
Location: Netherlands

PostPosted: Sun Feb 19, 2023 18:51    Post subject: Reply with quote
The compression should be set to Disabled
_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
alexok
DD-WRT Novice


Joined: 19 Feb 2023
Posts: 8

PostPosted: Sun Feb 19, 2023 19:09    Post subject: Reply with quote
wow I don’t know if all we did took part in solve the issue or not but this last issue solved the problem: The compression should be set to Disabled. I had as NO and when I changed to disabled as you said is working like a charm!. I can navigate now with surfshark in the router.

Then is solved now the issue. Thank you for the help.
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12889
Location: Netherlands

PostPosted: Sun Feb 19, 2023 19:17    Post subject: Reply with quote
Glad you solved it.

To wrap up, our OpenVPN Client setup guide has a link for SurfShark setup, from this link:
Compression: Disabled (this is different from No)


Anyway case closed as solved Smile

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum