Just rebooted the RT-AC68U side and observed the log on the AX86U side and this is what log captured on the server /RT-AX86U side after the reboot and the client didn't connect (replaced the original IP of the client with X.X.X.X):Yup, agreed. Will see how it goes tonight. Will report findings. Thanks.
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AX86U, emailAddress=me@asusrouter.lan
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, emailAddress=me@asusrouter.lan
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_VER=2.6.3
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_PLAT=linux
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_TCPNL=1
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_MTU=1600
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_NCP=2
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC:AES-128-CBC
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_PROTO=990
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_LZO_STUB=1
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_COMP_STUB=1
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 peer info: IV_COMP_STUBv2=1
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 TLS: Username/Password authentication succeeded for username 'some name'
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 TLS: tls_multi_process: initial untrusted session promoted to trusted
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Aug 31 13:18:51 ovpn-server1[13096]: X.X.X.X:32922 [client] Peer Connection Initiated with [AF_INET6]::ffff:[X.X.X.Xclient side]:32922 (via ::ffff:[X.X.X.X server side]%eth0)
Aug 31 13:18:51 ovpn-server1[13096]: client/X.X.X.X:32922 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
Aug 31 13:18:51 ovpn-server1[13096]: client/X.X.X.X:32922 MULTI: Learn: 10.8.0.2 -> client/X.X.X.X:32922
Aug 31 13:18:51 ovpn-server1[13096]: client/X.X.X.X:32922 MULTI: primary virtual IP for client/X.X.X.X:32922: 10.8.0.2
Aug 31 13:18:51 ovpn-server1[13096]: client/X.X.X.X:32922 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.50.0 255.255.255.0 vpn_gateway 500,dhcp-option DNS 9.9.9.11,dhcp-option DNS 149.112.112.11,redirect-gateway def1,explicit-exit-notify 3,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
Aug 31 13:18:52 ovpn-server1[13096]: client/X.X.X.X:32922 Data Channel: cipher 'AES-256-GCM', peer-id: 0
Aug 31 13:18:52 ovpn-server1[13096]: client/X.X.X.X:32922 Timers: ping 15, ping-restart 120
Aug 31 13:18:52 ovpn-server1[13096]: client/X.X.X.X:32922 Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
Not sure I follow what the entry is all about since the client didn't reconnect till I did it manually.
Last edited: