I am not able to connect to my VPN server successfully, please help.
Most of the steps, I am following this guide,
http://www.howtogeek.com/60774/connect-to-your-home-network-from-anywhere-with-openvpn-and-tomato/
Server Log
iptable of my VPN Server
Most of the steps, I am following this guide,
http://www.howtogeek.com/60774/connect-to-your-home-network-from-anywhere-with-openvpn-and-tomato/
Server Log
Sep 25 08:39:59 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8683
Sep 25 08:39:59 openvpn[25399]: 116.226.231.34:8683 TLS: Initial packet from [AF_INET]116.226.231.34:8683, sid=24399a2d a364bc2f
Sep 25 08:40:23 openvpn[25399]: 116.226.231.34:8683 VERIFY OK: depth=1, C=CN, ST=HK, L=HongKong, O=CCH, CN=CCH, emailAddress=bearchui@gmail.com
Sep 25 08:40:23 openvpn[25399]: 116.226.231.34:8683 VERIFY OK: depth=0, C=CN, ST=HK, O=CCH, CN=adam, emailAddress=bearchui@gmail.com
Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sep 25 08:40:27 openvpn[25399]: 116.226.231.34:8683 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sep 25 08:40:27 openvpn[25399]: 116.226.231.34:8683 [adam] Peer Connection Initiated with [AF_INET]116.226.231.34:8683
Sep 25 08:40:27 openvpn[25399]: adam/116.226.231.34:8683 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Sep 25 08:40:27 openvpn[25399]: adam/116.226.231.34:8683 MULTI: Learn: 10.8.0.6 -> adam/116.226.231.34:8683
Sep 25 08:40:27 openvpn[25399]: adam/116.226.231.34:8683 MULTI: primary virtual IP for adam/116.226.231.34:8683: 10.8.0.6
Sep 25 08:40:28 openvpn[25399]: adam/116.226.231.34:8683 PUSH: Received control message: 'PUSH_REQUEST'
Sep 25 08:40:28 openvpn[25399]: adam/116.226.231.34:8683 send_push_reply(): safe_cap=940
Sep 25 08:40:28 openvpn[25399]: adam/116.226.231.34:8683 SENT CONTROL [adam]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1)
Sep 25 08:41:00 openvpn[25399]: adam/116.226.231.34:8683 read TCPv4_SERVER: Connection timed out (code=145)
Sep 25 08:41:00 openvpn[25399]: adam/116.226.231.34:8683 Connection reset, restarting [0]
Sep 25 08:41:00 openvpn[25399]: adam/116.226.231.34:8683 SIGUSR1[soft,connection-reset] received, client-instance restarting
Sep 25 08:41:43 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8820
Sep 25 08:41:43 openvpn[25399]: 116.226.231.34:8820 TLS: Initial packet from [AF_INET]116.226.231.34:8820, sid=52a7fa46 e301ee06
Sep 25 08:42:34 openvpn[25399]: 116.226.231.34:8820 VERIFY OK: depth=1, C=CN, ST=HK, L=HongKong, O=CCH, CN=CCH, emailAddress=bearchui@gmail.com
Sep 25 08:42:34 openvpn[25399]: 116.226.231.34:8820 VERIFY OK: depth=0, C=CN, ST=HK, O=CCH, CN=adam, emailAddress=bearchui@gmail.com
Sep 25 08:42:43 openvpn[25399]: 116.226.231.34:8820 Connection reset, restarting [0]
Sep 25 08:42:43 openvpn[25399]: 116.226.231.34:8820 SIGUSR1[soft,connection-reset] received, client-instance restarting
Sep 25 08:42:48 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8894
Sep 25 08:42:48 openvpn[25399]: 116.226.231.34:8894 TLS: Initial packet from [AF_INET]116.226.231.34:8894, sid=111cc2af eb95fe4a
Sep 25 08:43:05 openvpn[25399]: 116.226.231.34:8894 VERIFY OK: depth=1, C=CN, ST=HK, L=HongKong, O=CCH, CN=CCH, emailAddress=bearchui@gmail.com
Sep 25 08:43:05 openvpn[25399]: 116.226.231.34:8894 VERIFY OK: depth=0, C=CN, ST=HK, O=CCH, CN=adam, emailAddress=bearchui@gmail.com
Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 TLS Error: TLS handshake failed
Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 Fatal TLS error (check_tls_errors_co), restarting
Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 SIGUSR1[soft,tls-error] received, client-instance restarting
Sep 25 08:44:20 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8985
Sep 25 08:44:20 openvpn[25399]: 116.226.231.34:8985 TLS: Initial packet from [AF_INET]116.226.231.34:8985, sid=d713a149 f90e8d07
Sep 25 08:45:20 openvpn[25399]: 116.226.231.34:8985 Connection reset, restarting [-1]
Sep 25 08:45:20 openvpn[25399]: 116.226.231.34:8985 SIGUSR1[soft,connection-reset] received, client-instance restarting
Sep 25 08:45:29 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:9096
Sep 25 08:45:29 openvpn[25399]: 116.226.231.34:9096 TLS: Initial packet from [AF_INET]116.226.231.34:9096, sid=334f0cef 07312ce1
Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 TLS Error: TLS handshake failed
Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 Fatal TLS error (check_tls_errors_co), restarting
Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 SIGUSR1[soft,tls-error] received, client-instance restarting
iptable of my VPN Server
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:1194
ACCEPT all -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:1194
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere state RELATED,ESTAB LISHED
ACCEPT all -- anywhere anywhere state NEW
DROP tcp -- anywhere anywhere tcp dpt:5916
ACCEPT all -- anywhere anywhere state NEW
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt: bootpc
ACCEPT tcp -- anywhere router.asus.com tcp dpt:www
ACCEPT tcp -- anywhere router.asus.com tcp dpt:8443
ACCEPT tcp -- anywhere anywhere tcp dpt:8082
ACCEPT tcp -- anywhere anywhere tcp dpt:https
ACCEPT tcp -- anywhere anywhere tcp dpt:1723
ACCEPT gre -- anywhere anywhere
DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/S YN TCPMSS clamp to PMTU
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTAB LISHED
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
DROP icmp -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate DNAT
ACCEPT all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain FUPNP (0 references)
target prot opt source destination
ACCEPT tcp -- anywhere 192.168.1.2 tcp dpt:51413
Chain PControls (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain logaccept (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT '
ACCEPT all -- anywhere anywhere
Chain logdrop (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP'
DROP all -- anywhere anywhere