Search the Community
Showing results for tags 'Adapter'.
Found 5 results
-
I had been having some connection speed drops, so one of the first things i did was update my network drivers. My on-board NIC had an update and TAP adapter still the same. My connection drops on vpn connected traffic went as far down as 50 Mbps sometimes. Anyway, i was fiddling around and then something hit me... I went to Windows 10 Network Center, through the control panel, and looked up the indicated speed over the individual adapters. I noticed that my on-board NIC had the speed on 1Gbps which is normal, but the TAP-Windows adapter V9 had a indicated network speed of 100Mbps. The next day it was 10Mbps for a few hours... Here i was thinking, maybe i can manually set it to 1Gbps (TAP adapter) through the device manager just like with the NIC adapter there (which is on automatic), but that was not possible as far as the properties window went. So here's my situation. I have a 200/20 Mbps (down/up) speed, but with Airvpn connected through Eddie i only get 110Mbps down on a good day. That is on any given server, though i mainly connect to Dutch servers (The Netherlands). Is it possible to bump the network adapter speed up to 1Gbps, instead of 100Mbps (or automatic)? If not, is there anything else i can do to get the most out of my connection speed? I am not expecting to get the full 200Mbps on vpn, but at least a speed high than 110Mbps on a reasonably 'average' population server and load through Eddie. I did read some guides here on the forums, but none of those actually managed to help me thus far.
-
Here's the log. It just cycles over and over again, never connecting. ___________________________________________________________________________________________________ I 2017.03.05 19:45:19 - DNS of a network adapter restored to original settings (Ralink RT5390R 802.11bgn Wi-Fi Adapter)I 2017.03.05 19:45:20 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.03.05 19:45:23 - Checking authorization ...! 2017.03.05 19:45:23 - Connecting to Gemma (Canada, Vancouver). 2017.03.05 19:45:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.03.05 19:45:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.03.05 19:45:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.03.05 19:45:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.03.05 19:45:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:25 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2017.03.05 19:45:25 - OpenVPN > UDPv4 link local: [undef]. 2017.03.05 19:45:25 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443. 2017.03.05 19:45:25 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=6b36d440 0ea641d4. 2017.03.05 19:45:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.03.05 19:45:25 - OpenVPN > Validating certificate key usage. 2017.03.05 19:45:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.03.05 19:45:25 - OpenVPN > VERIFY KU OK. 2017.03.05 19:45:25 - OpenVPN > Validating certificate extended key usage. 2017.03.05 19:45:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.03.05 19:45:25 - OpenVPN > VERIFY EKU OK. 2017.03.05 19:45:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.03.05 19:45:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.03.05 19:45:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.03.05 19:45:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.03.05 19:45:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2017.03.05 19:45:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.03.05 19:45:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.37.190 255.255.0.0'. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.03.05 19:45:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.03.05 19:45:34 - OpenVPN > open_tun, tt->ipv6=0. 2017.03.05 19:45:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4DDBFCB8-FB95-4B51-AB55-F8E9B44F34EA}.tap. 2017.03.05 19:45:34 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.03.05 19:45:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.37.190/255.255.0.0 [sUCCEEDED]. 2017.03.05 19:45:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.37.190/255.255.0.0 on interface {4DDBFCB8-FB95-4B51-AB55-F8E9B44F34EA} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.03.05 19:45:34 - OpenVPN > Successful ARP Flush on interface [6] {4DDBFCB8-FB95-4B51-AB55-F8E9B44F34EA}. 2017.03.05 19:45:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.1.1. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 4. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - Starting Management Interface. 2017.03.05 19:45:39 - OpenVPN > Initialization Sequence CompletedI 2017.03.05 19:45:40 - DNS of a network adapter forced (Ralink RT5390R 802.11bgn Wi-Fi Adapter)I 2017.03.05 19:45:40 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.03.05 19:45:40 - Flushing DNSI 2017.03.05 19:45:41 - Checking routeW 2017.03.05 19:46:42 - The operation has timed out! 2017.03.05 19:46:42 - Disconnecting. 2017.03.05 19:46:42 - Management - Send 'signal SIGTERM'. 2017.03.05 19:46:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.03.05 19:46:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.03.05 19:46:42 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.1.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > Closing TUN/TAP interface. 2017.03.05 19:46:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.03.05 19:46:47 - Connection terminated.
-
Hello, I have this problem which is not going away since I installed Eddie. It occurs with stable Eddie 2.10 and the new 2.11.3 beta. Installed new windows 10 x64, no anti-virus software whatsoever, only windows firewall and windows defender (I somehow can't deactive windows defender) I did not changed windows firewall settings. The mainboard got only 1 ethernet port. Router is working with no errors. I did not configure the router - just installed and it worked 100%. Cut to the chase: Case 1: - My internet connection is only working, when Eddie is running and I'm connected to an airvpn-server. Whether Windows firewall is running or not, doesn't matter. Whether network lock is enabled/disabled doesn't matter. With this, I can do everything: browse internet, listen to internet radio stream, play online games. http://www.pic-upload.de/view-31678207/working.png.html Case 2: - Eddie is running but not connected to an airvpn server, network lock is deactivated; windows firewall enabled/disabled The tap-windows-adapter V9, which was installed during the Eddie installation, is disconnected (windows diagnosis: Ethernet cable is not connected). I can't browse website, listen to internet radio BUT I can play my online game unreal tournament 2004. Peculiar: I can't browse or whatsoever, BUT whenever I try to load a website, the orange mainboard LED (ethernet port) begins to blink - this means it's up and working. The green LED is always on, indicating that the hardware is working. http://www.pic-upload.de/view-31678297/notworking.png.html Case 3: - Eddie is closed, windows firewall enabled/disabled. Same result as in case 2, except again: UT2k4. Eddie is starting with windows. Even when I disable autostart and windows starts without eddie, I get same result as in case 2/3. As I already mentioned, there is one strange exception: it's the online game I play, u2k4. In case 2/3, I start the game, I go to the ingame tab "Servers" and the game is showing me the ut2004-servers, up and running, so I can connect to them and play online. But the even strager thing is: case 2/3 with network locked disabled (ofc. I need to disable network lock when Eddie is up and running, or else every traffic would got blocked). I start the game, go to "Join Game" and the "news feed" is showing me that the game can't connect to the "UT2k4 Master Server" -> "Querying Master Server: The UT2004 master server could not be reached. Please try again later." This normally means that I'm offline and can't connect, but as already mentioned: In the other tab, servers are shown to me and I can play online. So I thought that windows firewall/eddie set up some strange internet connection rules. I checked the windows firewall setting and reseted them to the default settings, but nothing changed. I checked HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules, there are ~100 registry keys. But as mentioned: I did not change anything. I think this is not how this Eddie is supposed to work. thanks in advance
-
I'm not sure where to start on this one tbh. I was sat looking at my comp the other day and came up with the idea of using my router firewall (multi OS boot PC) to reject the majority of unwanted traffic. At the moment on my linux mint install (I'm very new to linux - 2 weeks) this is done by iptables and similar setup on windows OS. With windows this isn't a problem as the tap adapter produces a MAC but on my linux install it uses Tun masquerading as my eth adapter IP/no MAC. I should probably first ask is there a need - it would make life easier and rejects traffic at the router reducing network load, a second(1st) line of leak defence if an accidental change is made? I can't setup a firewall rule on my router (non wrt/tomato) that will give the restrictions needed without a separate MAC or IP to my physical adapter. I have tried to setup a Tap adapter on my linux install and ultimately failed. I have tried (linux mint) using gnome network manager (bridge utils installed) ticking the box use tap and downloaded Airvpn config files (no extra lines at point of download) replacing the lines in the file after putting in directory 'dev tun' with 'dev tap0' along with bridge ip's etc and without. I did read somewhere I may need to change 'update-resolv-conf'... Basically I'm out of my depth without help at this stage and I didn't want to make the huge number of changes some articles I read gave guidance for without further advice and guidance. In summary: 1- Will this indeed work well as a second leak protection measure? 2- Is it worth the effort? 3- Thoughts on the idea? 4- How do I change to use a Tap instead of tun with minimal/succinct changes? IF this makes no sense at all, please feel free to pull me up on it