Search the Community
Showing results for tags 'firewall'.
Found 73 results
-
So I have software on my machine which i wish to block connection to the internet on. I have my machine set to boot up, run air vpn, air vpn automaticly activates network lock ( this is where the issue occurs ) , then air vpn connects to a whitelisted server. Now the problem is that airvpn removes my blocked in and out traffic rules in my firewall for the software i wish to prevent from connecting to the internet at all. Is there a way to add rules that airvpn writes when it re configures the firewall settings
-
hey guys, with ufw enabled, vpn connects but wget and web pages don't resolve: $uname -a Linux 4.4.0-38-generic #57-Ubuntu SMP Tue Sep 6 2016 x86_64 x86_64 x86_64 GNU/Linux $ufw reset $ufw allow out on wlp1s0 to 213.152.161.180 port 443 proto udp $ufw allow out on tun0 $ufw status verbose Status: active Logging: on (low) Default: deny (incoming), deny (outgoing), disabled (routed) New profiles: skip To Action From -- ------ ---- 213.152.161.180 443/udp ALLOW OUT Anywhere on wlp1s0 # NL-Alblasserdam_Alchiba_UDP-443.ovpn Anywhere ALLOW OUT Anywhere on tun0 # tun0 $openvpn --config ~/VPN/NL-Alblasserdam_Alchiba_UDP-443.ovpn Mon Oct 3 2016 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Feb 2 2016 Mon Oct 3 2016 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 Mon Oct 3 2016 Control Channel Authentication: tls-auth using INLINE static key file Mon Oct 3 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Socket Buffers: R=[212992->212992] S=[212992->212992] Mon Oct 3 2016 UDPv4 link local: [undef] Mon Oct 3 2016 UDPv4 link remote: [AF_INET]213.152.161.180:443 Mon Oct 3 2016 TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=b2d0c912 4505e529 Mon Oct 3 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Oct 3 2016 Validating certificate key usage Mon Oct 3 2016 ++ Certificate has key usage 00a0, expects 00a0 Mon Oct 3 2016 VERIFY KU OK Mon Oct 3 2016 Validating certificate extended key usage Mon Oct 3 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Oct 3 2016 VERIFY EKU OK Mon Oct 3 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Mon Oct 3 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Oct 3 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Oct 3 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Oct 3 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mon Oct 3 2016 [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443 Mon Oct 3 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Mon Oct 3 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.48.174 255.255.0.0' Mon Oct 3 2016 OPTIONS IMPORT: timers and/or timeouts modified Mon Oct 3 2016 OPTIONS IMPORT: LZO parms modified Mon Oct 3 2016 OPTIONS IMPORT: --ifconfig/up options modified Mon Oct 3 2016 OPTIONS IMPORT: route options modified Mon Oct 3 2016 OPTIONS IMPORT: route-related options modified Mon Oct 3 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Oct 3 2016 ROUTE_GATEWAY 10.42.0.1/255.255.255.0 IFACE=wlp1s0 HWADDR=xx:xx:xx:xx:xx:xx Mon Oct 3 2016 TUN/TAP device tun0 opened Mon Oct 3 2016 TUN/TAP TX queue length set to 100 Mon Oct 3 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Mon Oct 3 2016 /sbin/ip link set dev tun0 up mtu 1500 Mon Oct 3 2016 /sbin/ip addr add dev tun0 10.4.48.174/16 broadcast 10.4.255.255 Mon Oct 3 2016 /sbin/ip route add 213.152.161.180/32 via 10.42.0.1 Mon Oct 3 2016 /sbin/ip route add 0.0.0.0/1 via 10.4.0.1 Mon Oct 3 2016 /sbin/ip route add 128.0.0.0/1 via 10.4.0.1 Mon Oct 3 2016 Initialization Sequence Completed $route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 10.4.0.1 128.0.0.0 UG 0 0 0 tun0 0.0.0.0 10.42.0.1 0.0.0.0 UG 600 0 0 wlp1s0 10.4.0.0 0.0.0.0 255.255.0.0 U 0 0 0 tun0 10.42.0.0 0.0.0.0 255.255.255.0 U 600 0 0 wlp1s0 128.0.0.0 10.4.0.1 128.0.0.0 UG 0 0 0 tun0 169.254.0.0 0.0.0.0 255.255.0.0 U 1000 0 0 wlp1s0 213.152.161.180 10.42.0.1 255.255.255.255 UGH 0 0 0 wlp1s0 $ip addr 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: wlp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether xx:xx:xx:xx:xx:xx brd ff:ff:ff:ff:ff:ff inet 10.42.0.9/24 brd 10.42.0.255 scope global wlp1s0 valid_lft forever preferred_lft forever inet6 <removed>/64 scope link valid_lft forever preferred_lft forever 3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 100 link/none inet 10.4.48.174/16 brd 10.4.255.255 scope global tun0 valid_lft forever preferred_lft forever inet6 <removed>/64 scope link flags 800 valid_lft forever preferred_lft forever i don't usually touch my iptables directly but here's the output: $iptables -L Chain INPUT (policy DROP) target prot opt source destination ufw-before-logging-input all -- anywhere anywhere ufw-before-input all -- anywhere anywhere ufw-after-input all -- anywhere anywhere ufw-after-logging-input all -- anywhere anywhere ufw-reject-input all -- anywhere anywhere ufw-track-input all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ufw-before-logging-forward all -- anywhere anywhere ufw-before-forward all -- anywhere anywhere ufw-after-forward all -- anywhere anywhere ufw-after-logging-forward all -- anywhere anywhere ufw-reject-forward all -- anywhere anywhere ufw-track-forward all -- anywhere anywhere Chain OUTPUT (policy DROP) target prot opt source destination ufw-before-logging-output all -- anywhere anywhere ufw-before-output all -- anywhere anywhere ufw-after-output all -- anywhere anywhere ufw-after-logging-output all -- anywhere anywhere ufw-reject-output all -- anywhere anywhere ufw-track-output all -- anywhere anywhere Chain ufw-after-forward (1 references) target prot opt source destination Chain ufw-after-input (1 references) target prot opt source destination ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST Chain ufw-after-logging-forward (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-after-logging-input (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-after-logging-output (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-after-output (1 references) target prot opt source destination Chain ufw-before-forward (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ACCEPT icmp -- anywhere anywhere icmp destination-unreachable ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp time-exceeded ACCEPT icmp -- anywhere anywhere icmp parameter-problem ACCEPT icmp -- anywhere anywhere icmp echo-request ufw-user-forward all -- anywhere anywhere Chain ufw-before-input (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ufw-logging-deny all -- anywhere anywhere ctstate INVALID DROP all -- anywhere anywhere ctstate INVALID ACCEPT icmp -- anywhere anywhere icmp destination-unreachable ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp time-exceeded ACCEPT icmp -- anywhere anywhere icmp parameter-problem ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc ufw-not-local all -- anywhere anywhere ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900 ufw-user-input all -- anywhere anywhere Chain ufw-before-logging-forward (1 references) target prot opt source destination Chain ufw-before-logging-input (1 references) target prot opt source destination Chain ufw-before-logging-output (1 references) target prot opt source destination Chain ufw-before-output (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED ufw-user-output all -- anywhere anywhere Chain ufw-logging-allow (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] " Chain ufw-logging-deny (2 references) target prot opt source destination RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10 LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] " Chain ufw-not-local (1 references) target prot opt source destination RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10 DROP all -- anywhere anywhere Chain ufw-reject-forward (1 references) target prot opt source destination Chain ufw-reject-input (1 references) target prot opt source destination Chain ufw-reject-output (1 references) target prot opt source destination Chain ufw-skip-to-policy-forward (0 references) target prot opt source destination DROP all -- anywhere anywhere Chain ufw-skip-to-policy-input (7 references) target prot opt source destination DROP all -- anywhere anywhere Chain ufw-skip-to-policy-output (0 references) target prot opt source destination DROP all -- anywhere anywhere Chain ufw-track-forward (1 references) target prot opt source destination Chain ufw-track-input (1 references) target prot opt source destination Chain ufw-track-output (1 references) target prot opt source destination Chain ufw-user-forward (1 references) target prot opt source destination Chain ufw-user-input (1 references) target prot opt source destination Chain ufw-user-limit (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] " REJECT all -- anywhere anywhere reject-with icmp-port-unreachable Chain ufw-user-limit-accept (0 references) target prot opt source destination ACCEPT all -- anywhere anywhere Chain ufw-user-logging-forward (0 references) target prot opt source destination Chain ufw-user-logging-input (0 references) target prot opt source destination Chain ufw-user-logging-output (0 references) target prot opt source destination Chain ufw-user-output (1 references) target prot opt source destination ACCEPT udp -- anywhere 213.152.161.180 udp dpt:https ACCEPT all -- anywhere anywhere any help would be great. let me know if you need anymore info.
-
Hello, I have this problem which is not going away since I installed Eddie. It occurs with stable Eddie 2.10 and the new 2.11.3 beta. Installed new windows 10 x64, no anti-virus software whatsoever, only windows firewall and windows defender (I somehow can't deactive windows defender) I did not changed windows firewall settings. The mainboard got only 1 ethernet port. Router is working with no errors. I did not configure the router - just installed and it worked 100%. Cut to the chase: Case 1: - My internet connection is only working, when Eddie is running and I'm connected to an airvpn-server. Whether Windows firewall is running or not, doesn't matter. Whether network lock is enabled/disabled doesn't matter. With this, I can do everything: browse internet, listen to internet radio stream, play online games. http://www.pic-upload.de/view-31678207/working.png.html Case 2: - Eddie is running but not connected to an airvpn server, network lock is deactivated; windows firewall enabled/disabled The tap-windows-adapter V9, which was installed during the Eddie installation, is disconnected (windows diagnosis: Ethernet cable is not connected). I can't browse website, listen to internet radio BUT I can play my online game unreal tournament 2004. Peculiar: I can't browse or whatsoever, BUT whenever I try to load a website, the orange mainboard LED (ethernet port) begins to blink - this means it's up and working. The green LED is always on, indicating that the hardware is working. http://www.pic-upload.de/view-31678297/notworking.png.html Case 3: - Eddie is closed, windows firewall enabled/disabled. Same result as in case 2, except again: UT2k4. Eddie is starting with windows. Even when I disable autostart and windows starts without eddie, I get same result as in case 2/3. As I already mentioned, there is one strange exception: it's the online game I play, u2k4. In case 2/3, I start the game, I go to the ingame tab "Servers" and the game is showing me the ut2004-servers, up and running, so I can connect to them and play online. But the even strager thing is: case 2/3 with network locked disabled (ofc. I need to disable network lock when Eddie is up and running, or else every traffic would got blocked). I start the game, go to "Join Game" and the "news feed" is showing me that the game can't connect to the "UT2k4 Master Server" -> "Querying Master Server: The UT2004 master server could not be reached. Please try again later." This normally means that I'm offline and can't connect, but as already mentioned: In the other tab, servers are shown to me and I can play online. So I thought that windows firewall/eddie set up some strange internet connection rules. I checked the windows firewall setting and reseted them to the default settings, but nothing changed. I checked HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, there are ~100 registry keys. But as mentioned: I did not change anything. I think this is not how this Eddie is supposed to work. thanks in advance
-
A maybe quick and probably elementary question: In a Linux Mint Virtualbox installation running Eddie with Network Lock active, do I need to/should I have any additional firewall going?
-
My hardward/firmware: Router ModelLinksys WRT 1200AC Firmware VersionDD-WRT v3.0-r28788 std (01/13/16)Kernel VersionLinux 3.18.25 #59 SMP Mon Jan 11 11:48:34 CET 2016 armv7l My goal: To open ports 8000 and 8001 on my router to allow shoutcast server to livestream from static ip 192.168.10.172 on the network. Hi, After reading https://airvpn.org/external_link/?url=https%3A%2F%2Fwww.dd-wrt.com%2Fwiki%2Findex.php%2FIptables_command%23Port_Forwarding_to_a_specific_LAN_IP and also being told that the GUI interface only forwards from WAN to LAN and not from TUN to LAN... it seems this is my last obstacle to streaming with Shoutcast. I still haven't been able to get IPTABLES to work for me yet. I tried different variations of the commands, but nothing worked for me... then I didn't know if I was putting the right information into the variables. Has anyone with this or similar dd-wrt set up successfully added open ports to your router firewall using IPTABLES? If so, can I see how your commands look? Currently, all I have for my firewall commands are, Firewall iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT iptables -I INPUT -i tun0 -j REJECT iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE What else should be there to open port 8000 and 8001 to the static IP listed above? Thanks for any help and directions.
-
I've been trying to set my plex server up on a windows machine to be visible outside my network. I've tried port forwards on the client page, the airVPN-configured router, and through the windows firewall. What am I missing to make plex visible through the VPN? note: I have another non-VPN router which allows the plex server out... but I want to keep the windows machine on the VPN router all the time. Any suggestions?
-
Hello everybody, i suscribed few days ago to airvpn and i'm looking for a solution to make an "ip binding" system to prevent connection to internet when the VPN is offline. The point is that i read a lot of informations about the network locker and windows firewall, but i only have Gdata firewall (i don't know if it's good to launch two firewalls at the same time...) I don't really have a brillant computering knowledge si i'm kind of lost with all theses procedures. can you help me with this ? I specially want ipbinding when i'm using utorrent, to avoid data sharing when my public IP can me seen by everybody.. thank you a lot
-
Hello everyone, I have AirVPN installed on a second desktop of mine, and I'm having an odd problem with it. I can connect to AirVPN servers fine and get acceptable speeds, however, when I shut down the VPN, I can no longer connect to the internet. So, I need to be connected to some VPN server to be able to connect to the internet. I suspect this is due to a bug with the Network Lock feature, which I'm using on both desktops (one of which is not having any problems). Both desktops are connected to the save network via Ethernet cable. I tried disabling network lock on the afflicted desktop, but had no results. I also tried uninstalling AirVPN (and restarting the PC), which also did not help. Is this a known bug, or perhaps something entirely different? I tried searching online for a solution, but all I get are threads about people not being able to connect with a VPN, not without. Thanks in advance!
-
Hello, I've recently buy an account and it works great but i can't connect without the app. It's very disturbing if i want to connect to a restricted wi-fi or on a slow connection. I've tried to uninstall it but it doesn't work. i will try to uninstall and Ccleaner or search how to make it work more longer than i did but it still a problem to solve. SFMBE (Sorry For My Bad English), i'm not a native speaker. Thanks in advance
-
I have not had a chance to setup my pfsense box to connect strickly to airVpn. I have been trolling the pfSense forums and read the wiki and seen where a few developers split from pfSense because it was becoming too commercial. I downloaded the image and installed in a VM but have not done much to it. Just wanted to know how many here would move to this version of firewall in leu of pfSense. Dont get me wrong im sticking with pfsense since pfSense_fan did one heck of a job on the guide, i was just wondering.
-
Hello, Prior to having trouble I was using an older version of Comodo Firewall that had a GUI similar to the one in this post: https://airvpn.org/topic/3405-windows-comodo-prevent-leaks/ (sorry I don't recall the exact version). The firewall was working fine and prevented any form of leaks when AirVPN was disconnected for whatever reason. Upon doing a clean install of Comodo Firewall two days ago and reconfiguring the global rules as described in the tutorial above traffic coming from my computer when the VPN connections is down is no longer blocked based on ipleak.net. Im assuming there is something that changed in the new version of Comodo Firewall because I followed the same procedure as I had in the past. This blog post: https://www.bestvpn.com/blog/10218/build-your-own-vpn-kill-switch-in-windows-comodo/ also mentioned problems regarding their implementation of preventing leaks upon using the new version of Comodo Firewall, so I don't believe I am following the tutorial provided by AirVPN incorrectly. If anyone else could test AirVPNs initial tutorial with the newest version of Comodo Firewall it would be appreciated just so I know it's not me that is doing something wrong. If that is the case I can take screenshots of what I've done to try to fix my issue. As of now I have been using the Network Lock feature in the GUI and it seems to be working fine which I will stick to if I can't get Comodo to work. Thanks.
-
Hey guys, here is my setup: I have port 80/443 forwarded to my little server at home with my home router, works great but after connecting to VPN it stops working and i'm unable to reach my server from outside over port 80/443, still works on my LAN though... Is it possible to be connected to VPN and still use local portforwards? Thx <3
-
Hello, I used OpenVPN on my 2 pc (both WIndows 10) and since 2 weeks my client won't work on my desktop pc. I have to do the stuff i want on my crappy laptop. The air vpn client start but won't connect to a server. It already did this on my laptop but it stopped mysteriously Thanks in advance and SFMBE (Sorry For My Bad English).
-
Hi, enabling Network Lock at Windows/system start make sense to me, so I'm looking into a FW option to go along with it... currenlty running Symantec Endpoint Protection... gotta see if I can translate the Comodo tutorial over to SEP... so besides Comodo free version, which is mentioned in the NL tut on this site, are there any other FW solutions that you can recommend (commercial or free) that can be easily set up (possibly with a step by step guide here) to shut down all traffic except the AirVPN tunnel ? Thanks. - M
-
this is a duplicate, mods please delete this thread !!!
-
Hi guys My problem is the following: I have port forwarding enabled on my airvpn, and I can ssh without problem with the command ssh -p myport user@myhost.airdns.org from home or from my cellphone. Now the problem is that at work myport is locked by the corporate firewall, and for all I can see all the other useful myports are... Port 22 is instead open... is there a way to go around the firewall? Please let me know. Thanks a lot
-
Following NaDre's instructions on "Guide to Setting Up VPN Just for Torrenting on Windows"....... https://airvpn.org/topic/9491-guide-to-setting-up-vpn-just-for-torrenting-on-windows/ I wanted some input on whether "everything" looks ok and is setup right. I'm posting screenshots below of how it's setup. Input from any advanced user, staff and anyone that knows what they're doing would be awesome. Thank You and have an day/night. *Some pics were unable to be uploaded*
-
Well, I had some disappointing results with DD-WRT (lack of stability on my router) so I'm planning to go back to stock firmware and place a firewall appliance between the router and the modem, to control which traffic goes where in a simple, GUI way. I saw some posts on here mentioning pFsense, but me being me I wanted to try out something else first. More Googling showed Sophos UTM is a popular Firewall with a great user interface. Has anyone had any success running AirVPN with Sophos UTM Firewall? I have the software installed but I can't seem to find a way to add an openVPN client connection, SSL or SSH connection. Perhaps I'm missing something? I'm also considering trying out Untangle, IPfire and finally pFsense if I don't find what I want with the others. Yeah, I'm scared off pFsense's interface..
-
Does the term host address from AirVPN.xml serve as a synonym for front-end server from e.g. Windows & Comodo - Prevent leaks tutorial? AirVPN's front-end servers have been changed few times since I bought first subscription. Can I therefore use AirVPN.xml to update Comodo Firewall/iptables configuration?
-
Dear AirVpn Forum Members, Since i am using Airvpn in my work, behind work firewall, my firewall blocks ddwrt open vpn connection. But in my computer I can use AirVpn SSH in my work. All i need please make a tutorial, how we setup ssh + openvpn on to DDWRT routers for airvpn. There is SSH service in DDWRT. I need how we configure it. Could you please show me the configuration of SSH + airvpn openvpn settings for ddwrt router? Best regards,