Jump to content
Not connected, Your IP: 18.220.240.140
Paradox123

Can't connect to any server

Recommended Posts

Today i got premium plan(for 90day), installed airvpn.exe and it cant connect me with any server it just starting to connecting, few seconds trying to connect and then disconnecting and restart connecting and that can repeating few hours without result( Can anyone help me?;c

i use win10 x64

Share this post


Link to post

You need to post logs here for us to help you.

I 2017.11.08 23:07:33 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.15063.0, Mono/.Net Framework: v4.0.30319
. 2017.11.08 23:07:33 - Reading options from C:\Users\ParadoX\Downloads\eddie-ui_2.13.6_windows-10_x64_portable\eddie-ui_2.13.6_windows-10_x64_portable\AirVPN.xml
. 2017.11.08 23:07:33 - Command line arguments (0):
I 2017.11.08 23:07:34 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2017.11.08 23:07:34 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Users\ParadoX\Downloads\eddie-ui_2.13.6_windows-10_x64_portable\eddie-ui_2.13.6_windows-10_x64_portable\openvpn.exe)
I 2017.11.08 23:07:34 - SSH - Version: plink 0.67 (C:\Users\ParadoX\Downloads\eddie-ui_2.13.6_windows-10_x64_portable\eddie-ui_2.13.6_windows-10_x64_portable\plink.exe)
I 2017.11.08 23:07:34 - SSL - Version: stunnel 5.40 (C:\Users\ParadoX\Downloads\eddie-ui_2.13.6_windows-10_x64_portable\eddie-ui_2.13.6_windows-10_x64_portable\stunnel.exe)
I 2017.11.08 23:07:34 - curl - Version: 7.54.1 (C:\Users\ParadoX\Downloads\eddie-ui_2.13.6_windows-10_x64_portable\eddie-ui_2.13.6_windows-10_x64_portable\curl.exe)
I 2017.11.08 23:07:34 - Certification Authorities: C:\Users\ParadoX\Downloads\eddie-ui_2.13.6_windows-10_x64_portable\eddie-ui_2.13.6_windows-10_x64_portable\cacert.pem
. 2017.11.08 23:07:35 - Updating systems & servers data ...
! 2017.11.08 23:07:35 - Ready
. 2017.11.08 23:07:36 - Systems & servers data update completed
I 2017.11.08 23:07:37 - Session starting.
. 2017.11.08 23:07:38 - IPv6 disabled with packet filtering.
I 2017.11.08 23:07:42 - Checking authorization ...
! 2017.11.08 23:07:42 - Connecting to Carinae (United Kingdom, Maidenhead)
. 2017.11.08 23:07:43 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2017.11.08 23:07:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.11.08 23:07:43 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.08 23:07:43 - Connection to OpenVPN Management Interface
. 2017.11.08 23:07:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.08 23:07:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.08 23:07:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.08 23:07:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]94.229.74.90:443
. 2017.11.08 23:07:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.11.08 23:07:43 - OpenVPN > UDP link local: (not bound)
. 2017.11.08 23:07:43 - OpenVPN > UDP link remote: [AF_INET]94.229.74.90:443
. 2017.11.08 23:07:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.08 23:08:16 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2017.11.08 23:08:16 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2017.11.08 23:08:21 - Disconnecting
. 2017.11.08 23:08:21 - Connection terminated.
I 2017.11.08 23:08:24 - Checking authorization ...
! 2017.11.08 23:08:25 - Connecting to Betelgeuse (United Kingdom, Maidenhead)
. 2017.11.08 23:08:25 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2017.11.08 23:08:25 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2017.11.08 23:08:25 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.08 23:08:25 - Connection to OpenVPN Management Interface
. 2017.11.08 23:08:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.08 23:08:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.08 23:08:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.08 23:08:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.134:443
. 2017.11.08 23:08:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2017.11.08 23:08:25 - OpenVPN > UDP link local: (not bound)
. 2017.11.08 23:08:25 - OpenVPN > UDP link remote: [AF_INET]185.103.96.134:443
. 2017.11.08 23:08:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2017.11.08 23:08:26 - Disconnecting
. 2017.11.08 23:08:26 - Sending management termination signal
. 2017.11.08 23:08:26 - Management - Send 'signal SIGTERM'
. 2017.11.08 23:08:31 - Connection terminated.
I 2017.11.08 23:08:31 - Cancel requested.
. 2017.11.08 23:08:31 - IPv6 restored with packet filtering.
! 2017.11.08 23:08:31 - Session terminated.
you talking about this?xd

Share this post


Link to post

This is my log...

Please, advice...!

 

Eddie System/Environment Report - 11/9/2017 6:24 PM UTC

Eddie version: 2.13.6
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Arch Linux \r (\l)
OS version: Linux deadend 4.9.60-1-lts #1 SMP Thu Nov 2 16:48:25 CET 2017 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: Found, /dev/net/tun
OpenVPN: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.10 (/usr/bin/openvpn)
SSH: OpenSSH_7.6p1, OpenSSL 1.1.0g  2 Nov 2017 (/usr/bin/ssh)
SSL: stunnel 5.42 (/usr/bin/stunnel)
curl: 7.56.1 (/usr/bin/curl)
Profile path: /home/rooter/.airvpn/AirVPN.xml
Data path: /home/rooter/.airvpn
Application path: /usr/lib/AirVPN
Executable path: /usr/lib/AirVPN/AirVPN.exe
Command line arguments: (2 args) path="/home/rooter/.airvpn" console.mode="none"
Network Lock Active: No
Connected to VPN: No
Detected DNS: 193.183.98.66, 87.98.175.85
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test HTTP: Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Thu, 09 Nov 2017 18:24:04 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (8 bytes): Success.
Test HTTPS: Status: HTTP/2 200 
 - Headers: server:nginx;date:Thu, 09 Nov 2017 18:24:05 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (8 bytes): Success.
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
ipv6.mode: none

----------------------------
Logs:

I 2017.11.09 20:22:12 - Eddie version: 2.13.6 / linux_x64, System: Linux, Name: Arch Linux \r (\l), Version: Linux deadend 4.9.60-1-lts #1 SMP Thu Nov 2 16:48:25 CET 2017 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319
. 2017.11.09 20:22:12 - Reading options from /home/rooter/.airvpn/AirVPN.xml
. 2017.11.09 20:22:13 - Command line arguments (2): path="/home/rooter/.airvpn" console.mode="none"
I 2017.11.09 20:22:14 - OpenVPN Driver - Found, /dev/net/tun
I 2017.11.09 20:22:14 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.10 (/usr/bin/openvpn)
I 2017.11.09 20:22:14 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0g  2 Nov 2017 (/usr/bin/ssh)
I 2017.11.09 20:22:14 - SSL - Version: stunnel 5.42 (/usr/bin/stunnel)
I 2017.11.09 20:22:14 - curl - Version: 7.56.1 (/usr/bin/curl)
I 2017.11.09 20:22:14 - Certification Authorities: /usr/share/AirVPN/cacert.pem
. 2017.11.09 20:22:14 - Updating systems & servers data ...
! 2017.11.09 20:22:14 - Ready
. 2017.11.09 20:22:15 - Systems & servers data update completed
I 2017.11.09 20:23:08 - Checking login ...
! 2017.11.09 20:23:08 - Logged in.
I 2017.11.09 20:23:29 - Session starting.
I 2017.11.09 20:23:29 - Checking authorization ...
! 2017.11.09 20:23:30 - Connecting to Diadema (Belgium, Brussels)
. 2017.11.09 20:23:30 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.11.09 20:23:30 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.10
. 2017.11.09 20:23:30 - Connection to OpenVPN Management Interface
. 2017.11.09 20:23:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.09 20:23:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.09 20:23:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.09 20:23:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.162:443
. 2017.11.09 20:23:30 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.11.09 20:23:30 - OpenVPN > UDP link local: (not bound)
. 2017.11.09 20:23:30 - OpenVPN > UDP link remote: [AF_INET]194.187.251.162:443
. 2017.11.09 20:23:30 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.162:443, sid=2cf787a9 9d535cfe
. 2017.11.09 20:23:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.09 20:23:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.09 20:23:30 - OpenVPN > VERIFY KU OK
. 2017.11.09 20:23:30 - OpenVPN > Validating certificate extended key usage
. 2017.11.09 20:23:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.09 20:23:30 - OpenVPN > VERIFY EKU OK
. 2017.11.09 20:23:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.11.09 20:23:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.09 20:23:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]194.187.251.162:443
. 2017.11.09 20:23:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2017.11.09 20:23:34 - Disconnecting
. 2017.11.09 20:23:34 - Connection terminated.
I 2017.11.09 20:23:37 - Checking authorization ...
! 2017.11.09 20:23:37 - Connecting to Canis (Netherlands, Alblasserdam)
. 2017.11.09 20:23:37 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.11.09 20:23:37 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.10
. 2017.11.09 20:23:37 - Connection to OpenVPN Management Interface
. 2017.11.09 20:23:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.09 20:23:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.09 20:23:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.09 20:23:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.218:443
. 2017.11.09 20:23:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.11.09 20:23:37 - OpenVPN > UDP link local: (not bound)
. 2017.11.09 20:23:37 - OpenVPN > UDP link remote: [AF_INET]213.152.161.218:443
. 2017.11.09 20:23:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.09 20:23:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.218:443, sid=8d887a3f cca3622a
. 2017.11.09 20:23:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.09 20:23:38 - OpenVPN > VERIFY KU OK
. 2017.11.09 20:23:38 - OpenVPN > Validating certificate extended key usage
. 2017.11.09 20:23:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.09 20:23:38 - OpenVPN > VERIFY EKU OK
. 2017.11.09 20:23:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Canis, emailAddress=info@airvpn.org
. 2017.11.09 20:23:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.09 20:23:38 - OpenVPN > [Canis] Peer Connection Initiated with [AF_INET]213.152.161.218:443
. 2017.11.09 20:23:39 - OpenVPN > SENT CONTROL [Canis]: 'PUSH_REQUEST' (status=1)
! 2017.11.09 20:23:39 - Disconnecting
. 2017.11.09 20:23:39 - Connection terminated.
I 2017.11.09 20:23:42 - Checking authorization ...
! 2017.11.09 20:23:43 - Connecting to Hyadum (Netherlands, Alblasserdam)
. 2017.11.09 20:23:43 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.11.09 20:23:43 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.10
. 2017.11.09 20:23:43 - Connection to OpenVPN Management Interface
. 2017.11.09 20:23:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.09 20:23:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.09 20:23:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.09 20:23:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.34:443
. 2017.11.09 20:23:43 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.11.09 20:23:43 - OpenVPN > UDP link local: (not bound)
. 2017.11.09 20:23:43 - OpenVPN > UDP link remote: [AF_INET]213.152.161.34:443
. 2017.11.09 20:23:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.09 20:23:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.34:443, sid=2b235d09 5d0b48f0
. 2017.11.09 20:23:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.09 20:23:43 - OpenVPN > VERIFY KU OK
. 2017.11.09 20:23:43 - OpenVPN > Validating certificate extended key usage
. 2017.11.09 20:23:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.09 20:23:43 - OpenVPN > VERIFY EKU OK
. 2017.11.09 20:23:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.11.09 20:23:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.09 20:23:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.34:443
. 2017.11.09 20:23:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2017.11.09 20:23:45 - Disconnecting
. 2017.11.09 20:23:45 - Connection terminated.
I 2017.11.09 20:23:48 - Checking authorization ...

----------------------------
Network Interfaces:

Network Interface: lo (lo, ID:lo) - Loopback - Unknown
Network Interface: enp8s0 (enp8s0, ID:enp8s0) - Ethernet - Up
Network Interface: wlp9s0 (wlp9s0, ID:wlp9s0) - Wireless80211 - Down
Network Interface: docker0 (docker0, ID:docker0) - Ethernet - Down

----------------------------
Default gateways:

192.168.1.254, enp8s0

----------------------------
UID: 0
LogName: rooter
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: enp8s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether f8:a9:63:36:40:3f brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.101/24 brd 192.168.1.255 scope global enp8s0
       valid_lft forever preferred_lft forever
    inet6 fe80::faa9:63ff:fe36:403f/64 scope link 
       valid_lft forever preferred_lft forever
3: wlp9s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000
    link/ether f2:43:dc:34:f3:36 brd ff:ff:ff:ff:ff:ff
4: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default 
    link/ether 02:42:a3:c6:dd:64 brd ff:ff:ff:ff:ff:ff
    inet 172.17.0.1/16 scope global docker0
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp8s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
    link/ether f8:a9:63:36:40:3f brd ff:ff:ff:ff:ff:ff
3: wlp9s0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000
    link/ether f2:43:dc:34:f3:36 brd ff:ff:ff:ff:ff:ff
4: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default 
    link/ether 02:42:a3:c6:dd:64 brd ff:ff:ff:ff:ff:ff
----------------------------
ip route show:

default via 192.168.1.254 dev enp8s0 proto static metric 100 
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown 
192.168.1.0/24 dev enp8s0 proto kernel scope link src 192.168.1.101 metric 100

 

Share this post


Link to post

Hi,

 

Maybe your Windows sockets are corrupted.

I got such trouble today after installed an AV, i followed this and i can connect now to Avpn.

I al under Win 8.1.

 

Try this to fix them:

 

Step 1 :

 

a)      Press Windows key + X, select Command Prompt (Admin)

      Type “netsh winsock reset” in the Command Prompt shell, and then press the Enter key.

c)      Restart the computer.

 

Try to connect with Airvpn, it could be fixed, if not, follow step 2

 

Step 2: Follow the steps given below to reset TCP/IP stack.

 

a)      Press Windows key + X, select Command Prompt (Admin)

      Type “netsh int ip reset reset.log hit” in the Command Prompt shell, and then press the Enter key.

c)      Restart the computer.

 

 

Hope this information has been in use and helped most of you.

C.

 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...