Droopy 2 Posted ... 80 1.343740000 192.---.-.- 70.--.---.--- UDP 94 Source port: 57296 Destination port: 56092 Above is from wireshark, there is alot like this without the https indicated, is that an issue, thanks for your help. Quote Share this post Link to post
JamesDean 10 Posted ... Are you running Wireshark on a separate machine? Sometimes, when you run WS on the same machine as the connection, WS gets the data after it is decrypted. Quote Share this post Link to post
Staff 9972 Posted ... Hello! If you capture traffic on the tun/tap adapter you can see unencrypted packets. If you capture traffic on the physical interface you must see all encrypted packets to/from the Air server, except those to/from your internal network, otherwise there's something wrong: check your routing table after the VPN server push. Kind regards Quote Share this post Link to post
Droopy 2 Posted ... Thanks for the response, but how do you check your routing table after the VPN server push. And what am i looking for. Cheers Quote Share this post Link to post
Droopy 2 Posted ... Thanks for youre suggestion, appreciate it. Cheers Quote Share this post Link to post
galilao 2 Posted ... Hello, What exactly does VPN server push mean? Thank you Quote Share this post Link to post
vcn64ultra 3 Posted ... Hello, What exactly does VPN server push mean? Thank you The server can be setup to "push" certain settings to all of its clients. Example: http://openvpn.net/index.php/open-source/documentation/howto.html#dhcp Quote Share this post Link to post