MezRoGi 1 Posted ... Hi, Everything working fine for weeks until .. This is not the "Can't connect without airvpn" when network lock is on but the OPPOSITE :I can connect without airvpn (but have to reset IPv4 DNS) but cannot get a response from any connection when using airvpn and network lock. I've been using for the past months OpenVPN GUI ( on windows 10) because I don't have to reset IPv4 dns when not using airvpn as with the client. With openvpn gui : It says it's connected. But every connection times out. With airvpn client (network lock on) as soon as it finished checking route, it disconnects. I do not have a secondary firewall and have tried reseting windows firewall.I also tried getting the latest version of airvpn client, no change. LOGS : With airvpn client :I 2016.09.30 12:38:13 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.09.30 12:38:13 - Reading options from C:\Users\Mezrogi\AppData\Local\AirVPN\AirVPN.xml. 2016.09.30 12:38:13 - Data Path: C:\Users\Mezrogi\AppData\Local\AirVPN. 2016.09.30 12:38:13 - App Path: C:\Program Files\AirVPN. 2016.09.30 12:38:13 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.09.30 12:38:13 - Command line arguments (1): path="home". 2016.09.30 12:38:13 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.09.30 12:38:13 - Updating systems & servers data ...I 2016.09.30 12:38:13 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2016.09.30 12:38:13 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.09.30 12:38:13 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.09.30 12:38:13 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)W 2016.09.30 12:38:13 - Recovery. Unexpected crash?. 2016.09.30 12:38:14 - Systems & servers data update completed! 2016.09.30 12:38:14 - Activation of Network Lock - Windows Firewall! 2016.09.30 12:38:18 - ReadyI 2016.09.30 12:38:47 - Session starting.I 2016.09.30 12:38:48 - Checking authorization ...! 2016.09.30 12:38:48 - Connecting to Situla (Netherlands, Alblasserdam). 2016.09.30 12:38:48 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.09.30 12:38:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.09.30 12:38:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.09.30 12:38:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.09.30 12:38:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.30 12:38:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.30 12:38:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.09.30 12:38:48 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.14:443 [nonblock]. 2016.09.30 12:38:49 - OpenVPN > TCP connection established with [AF_INET]213.152.161.14:443. 2016.09.30 12:38:49 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.09.30 12:38:49 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.14:443. 2016.09.30 12:38:49 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=9862b542 2413c8b4. 2016.09.30 12:38:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.09.30 12:38:49 - OpenVPN > Validating certificate key usage. 2016.09.30 12:38:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.09.30 12:38:49 - OpenVPN > VERIFY KU OK. 2016.09.30 12:38:49 - OpenVPN > Validating certificate extended key usage. 2016.09.30 12:38:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.09.30 12:38:49 - OpenVPN > VERIFY EKU OK. 2016.09.30 12:38:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.09.30 12:38:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.30 12:38:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.30 12:38:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.30 12:38:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.30 12:38:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.09.30 12:38:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443. 2016.09.30 12:38:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.09.30 12:38:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.6.211 255.255.0.0'. 2016.09.30 12:38:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.09.30 12:38:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.09.30 12:38:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.09.30 12:38:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.09.30 12:38:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.09.30 12:38:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.09.30 12:38:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.09.30 12:38:52 - OpenVPN > open_tun, tt->ipv6=0. 2016.09.30 12:38:52 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B19DAF4D-A24A-4BCC-850A-7F45E01EAB78}.tap. 2016.09.30 12:38:52 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.09.30 12:38:52 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.6.211/255.255.0.0 [sUCCEEDED]. 2016.09.30 12:38:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.6.211/255.255.0.0 on interface {B19DAF4D-A24A-4BCC-850A-7F45E01EAB78} [DHCP-serv: 10.5.255.254, lease-time: 31536000]. 2016.09.30 12:38:52 - OpenVPN > Successful ARP Flush on interface [9] {B19DAF4D-A24A-4BCC-850A-7F45E01EAB78}. 2016.09.30 12:38:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.09.30 12:38:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.14 MASK 255.255.255.255 192.168.0.1. 2016.09.30 12:38:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.09.30 12:38:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.30 12:38:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2. 2016.09.30 12:38:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.09.30 12:38:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.30 12:38:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.09.30 12:38:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.09.30 12:38:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.30 12:38:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.09.30 12:38:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.09.30 12:38:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.09.30 12:38:57 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 2. 2016.09.30 12:38:57 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: L’objet existe déjà. [status=5010 if_index=2]. 2016.09.30 12:38:57 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.09.30 12:38:57 - OpenVPN > Route addition fallback to route.exe. 2016.09.30 12:38:57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2016.09.30 12:38:58 - Starting Management Interface. 2016.09.30 12:38:58 - OpenVPN > Initialization Sequence CompletedI 2016.09.30 12:38:58 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.09.30 12:38:58 - DNS of a network adapter forced (The Broadcom 802.11 Network Adapter provides wireless local area networking.)I 2016.09.30 12:38:58 - Flushing DNSI 2016.09.30 12:38:58 - Checking routeI 2016.09.30 12:39:07 - Checking DNS! 2016.09.30 12:39:07 - Connected.. 2016.09.30 12:39:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.09.30 12:39:07 - OpenVPN > Connection reset, restarting [-1]. 2016.09.30 12:39:07 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.09.30 12:39:07 - OpenVPN > Restart pause, 5 second(s). 2016.09.30 12:39:07 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.09.30 12:39:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.14:443 [nonblock]. 2016.09.30 12:39:07 - OpenVPN > TCP connection established with [AF_INET]213.152.161.14:443. 2016.09.30 12:39:07 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.09.30 12:39:07 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.14:443. 2016.09.30 12:39:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=75c26ec8 24bf5cb4. 2016.09.30 12:39:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.09.30 12:39:07 - OpenVPN > Validating certificate key usage. 2016.09.30 12:39:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.09.30 12:39:07 - OpenVPN > VERIFY KU OK. 2016.09.30 12:39:07 - OpenVPN > Validating certificate extended key usage. 2016.09.30 12:39:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.09.30 12:39:07 - OpenVPN > VERIFY EKU OK. 2016.09.30 12:39:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.09.30 12:39:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.30 12:39:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.30 12:39:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.09.30 12:39:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.09.30 12:39:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.09.30 12:39:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443. 2016.09.30 12:39:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.09.30 12:39:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.6.211 255.255.0.0'. 2016.09.30 12:39:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.09.30 12:39:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.09.30 12:39:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.09.30 12:39:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.09.30 12:39:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.09.30 12:39:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.09.30 12:39:07 - OpenVPN > Preserving previous TUN/TAP instance: Ethernet 2. 2016.09.30 12:39:07 - Starting Management Interface. 2016.09.30 12:39:07 - OpenVPN > Initialization Sequence Completed! 2016.09.30 12:39:07 - Disconnecting. 2016.09.30 12:39:07 - Management - Send 'signal SIGTERM' OpenVPN GUI thinks it's working, but it isn't :Fri Sep 30 12:35:16 2016 OpenVPN 2.3.11 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on May 10 2016Fri Sep 30 12:35:16 2016 Windows version 6.2 (Windows 8 or greater) 64bitFri Sep 30 12:35:16 2016 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09Fri Sep 30 12:35:16 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340Fri Sep 30 12:35:16 2016 Need hold release from management interface, waiting...Fri Sep 30 12:35:16 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340Fri Sep 30 12:35:16 2016 MANAGEMENT: CMD 'state on'Fri Sep 30 12:35:16 2016 MANAGEMENT: CMD 'log all on'Fri Sep 30 12:35:16 2016 MANAGEMENT: CMD 'hold off'Fri Sep 30 12:35:16 2016 MANAGEMENT: CMD 'hold release'Fri Sep 30 12:35:17 2016 Control Channel Authentication: tls-auth using INLINE static key fileFri Sep 30 12:35:17 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Sep 30 12:35:17 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Sep 30 12:35:17 2016 Socket Buffers: R=[65536->262144] S=[65536->262144]Fri Sep 30 12:35:17 2016 MANAGEMENT: >STATE:1475231717,RESOLVE,,,Fri Sep 30 12:35:17 2016 UDPv4 link local: [undef]Fri Sep 30 12:35:17 2016 UDPv4 link remote: [AF_INET]62.102.148.147:443Fri Sep 30 12:35:17 2016 MANAGEMENT: >STATE:1475231717,WAIT,,,Fri Sep 30 12:35:17 2016 MANAGEMENT: >STATE:1475231717,AUTH,,,Fri Sep 30 12:35:17 2016 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=97468434 f612593dFri Sep 30 12:35:17 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFri Sep 30 12:35:17 2016 Validating certificate key usageFri Sep 30 12:35:17 2016 ++ Certificate has key usage 00a0, expects 00a0Fri Sep 30 12:35:17 2016 VERIFY KU OKFri Sep 30 12:35:17 2016 Validating certificate extended key usageFri Sep 30 12:35:17 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFri Sep 30 12:35:17 2016 VERIFY EKU OKFri Sep 30 12:35:17 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFri Sep 30 12:35:18 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyFri Sep 30 12:35:18 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Sep 30 12:35:18 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyFri Sep 30 12:35:18 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Sep 30 12:35:18 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSAFri Sep 30 12:35:18 2016 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443Fri Sep 30 12:35:19 2016 MANAGEMENT: >STATE:1475231719,GET_CONFIG,,,Fri Sep 30 12:35:20 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Fri Sep 30 12:35:20 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.26.208 255.255.0.0'Fri Sep 30 12:35:20 2016 OPTIONS IMPORT: timers and/or timeouts modifiedFri Sep 30 12:35:20 2016 OPTIONS IMPORT: LZO parms modifiedFri Sep 30 12:35:20 2016 OPTIONS IMPORT: --ifconfig/up options modifiedFri Sep 30 12:35:20 2016 OPTIONS IMPORT: route options modifiedFri Sep 30 12:35:20 2016 OPTIONS IMPORT: route-related options modifiedFri Sep 30 12:35:20 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedFri Sep 30 12:35:20 2016 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=2 HWADDR=24:0a:64:ec:55:dbFri Sep 30 12:35:20 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Fri Sep 30 12:35:20 2016 MANAGEMENT: >STATE:1475231720,ASSIGN_IP,,10.4.26.208,Fri Sep 30 12:35:20 2016 open_tun, tt->ipv6=0Fri Sep 30 12:35:20 2016 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B19DAF4D-A24A-4BCC-850A-7F45E01EAB78}.tapFri Sep 30 12:35:20 2016 TAP-Windows Driver Version 9.21Fri Sep 30 12:35:20 2016 Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.26.208/255.255.0.0 [sUCCEEDED]Fri Sep 30 12:35:20 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.26.208/255.255.0.0 on interface {B19DAF4D-A24A-4BCC-850A-7F45E01EAB78} [DHCP-serv: 10.4.255.254, lease-time: 31536000]Fri Sep 30 12:35:20 2016 Successful ARP Flush on interface [9] {B19DAF4D-A24A-4BCC-850A-7F45E01EAB78}Fri Sep 30 12:35:25 2016 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=upFri Sep 30 12:35:25 2016 C:\WINDOWS\system32\route.exe ADD 62.102.148.147 MASK 255.255.255.255 192.168.0.1Fri Sep 30 12:35:25 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4Fri Sep 30 12:35:25 2016 Route addition via IPAPI succeeded [adaptive]Fri Sep 30 12:35:25 2016 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1Fri Sep 30 12:35:25 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4Fri Sep 30 12:35:25 2016 Route addition via IPAPI succeeded [adaptive]Fri Sep 30 12:35:25 2016 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1Fri Sep 30 12:35:25 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4Fri Sep 30 12:35:25 2016 Route addition via IPAPI succeeded [adaptive]Fri Sep 30 12:35:25 2016 Initialization Sequence CompletedFri Sep 30 12:35:25 2016 MANAGEMENT: >STATE:1475231725,CONNECTED,SUCCESS,10.4.26.208,62.102.148.147 Any help would be greatly appreciated. Thanks Quote Share this post Link to post
LZ1 673 Posted ... Hello! Maybe you could try changing your TAP drivers to an earlier version and see if that works Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
akidburn 0 Posted ... Hi, check your IP-Settings of your TAP-Adapter. See if everything is filled in correctly. Maybe no gateway IP? Quote Share this post Link to post