How to configure OpenVPN?

Hi all,

Device: RAK7258 LTE, firmware version LoRaGateway_1.1.0053_Release_r187

Can I ask how to properly set up OpenVPN in RAK7258? I can not find instructions for this.

Reproduce:

  1. copy cert, key, ca and tls_auth file to /lib/uci/upload/

  2. config /etc/config/openvpn to following
    ‘’’
    config openvpn ‘sample_client’
    option client ‘1’
    option dev ‘tun’
    option resolv_retry ‘infinite’
    option persist_key ‘1’
    option user ‘nobody’
    option verb ‘3’
    option remote ‘OPENVPN_SERVER_DOMAIN’
    option proto ‘tcp-client’
    option key_direction ‘1’
    option setenv ‘opt block-outside-dns’
    option sndbuf ‘0’
    option rcvbuf ‘0’
    option auth ‘SHA512’
    option cipher ‘AES-256-CBC’
    option remote_cert_tls ‘server’
    option key ‘/lib/uci/upload/openvpn_key.txt’
    option cert ‘/lib/uci/upload/openvpn_cert.txt’
    option ca ‘/lib/uci/upload/openvpn_ca.txt’
    option tls_auth ‘/lib/uci/upload/openvpn_tls_auth.txt 1’
    option enabled ‘1’
    ‘’’

  3. reboot and you will see the system log as below
    ‘’’
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Interface ‘wwan’ has link connectivity
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Interface ‘wwan’ is setting up now
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Bridge ‘br-lan’ link is up
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Interface ‘lan’ has link connectivity
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: VLAN ‘eth0.1’ link is up
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Network device ‘lo’ link is up
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Interface ‘loopback’ has link connectivity
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: VLAN ‘eth0.2’ link is up
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Interface ‘wan’ has link connectivity
    Wed Oct 16 11:13:38 2019 daemon.notice netifd: Interface ‘wan’ is setting up now
    Wed Oct 16 11:13:39 2019 user.notice ping-watchdog: lan br-lan ifup
    Wed Oct 16 11:13:39 2019 daemon.notice netifd: wwan (1480): Command failed: Permission denied
    Wed Oct 16 11:13:39 2019 daemon.notice netifd: wan (1526): udhcpc: option -h NAME is deprecated, use -x hostname:NAME
    Wed Oct 16 11:13:39 2019 daemon.notice netifd: wan (1526): udhcpc (v1.23.2) started
    Wed Oct 16 11:13:39 2019 authpriv.info dropbear[1520]: Not backgrounding
    Wed Oct 16 11:13:39 2019 kern.warn kernel: [ 45.390000] efuse_probe: efuse = 10000002
    Wed Oct 16 11:13:40 2019 daemon.notice netifd: Interface ‘wwan’ is now down
    Wed Oct 16 11:13:40 2019 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
    Wed Oct 16 11:13:40 2019 kern.warn kernel: [ 45.570000] tssi_0_target_pwr_g_band = 27
    Wed Oct 16 11:13:40 2019 kern.warn kernel: [ 45.580000] tssi_1_target_pwr_g_band = 27
    Wed Oct 16 11:13:40 2019 daemon.err uhttpd[1581]: socket(): Address family not supported by protocol
    Wed Oct 16 11:13:40 2019 daemon.err uhttpd[1581]: socket(): Address family not supported by protocol
    Wed Oct 16 11:13:40 2019 kern.info kernel: [ 45.940000] br-lan: port 1(eth0.1) entered forwarding state
    Wed Oct 16 11:13:44 2019 daemon.info loraSrv[1654]: Initializing signal handlers
    Wed Oct 16 11:13:45 2019 daemon.warn openvpn(sample_client)[1666]: Unrecognized option or missing parameter(s) in openvpn-sample_client.conf:14: block-outside-dns (2.3.6)
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: OpenVPN 2.3.6 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Oct 15 2019
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.08
    Wed Oct 16 11:13:45 2019 daemon.warn openvpn(sample_client)[1666]: WARNING: you are using user/group/chroot/setcon without persist-tun – this may cause restarts to fail
    Wed Oct 16 11:13:45 2019 daemon.warn openvpn(sample_client)[1666]: WARNING: file ‘/lib/uci/upload/openvpn_key.txt’ is group or others accessible
    Wed Oct 16 11:13:45 2019 daemon.warn openvpn(sample_client)[1666]: WARNING: file ‘/lib/uci/upload/openvpn_tls_auth.txt’ is group or others accessible
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: Control Channel Authentication: using ‘/lib/uci/upload/openvpn_tls_auth.txt’ as a OpenVPN static key file
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: Outgoing Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: Socket Buffers: R=[87380->87380] S=[16384->16384]
    Wed Oct 16 11:13:45 2019 daemon.err openvpn(sample_client)[1666]: RESOLVE: Cannot resolve host address: OPENVPN_SERVER_DOMAIN: Name or service not known
    Wed Oct 16 11:13:45 2019 daemon.notice openvpn(sample_client)[1666]: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
    Wed Oct 16 11:13:45 2019 daemon.err openvpn(sample_client)[1666]: RESOLVE: Cannot resolve host address: OPENVPN_SERVER_DOMAIN: Name or service not known
    Wed Oct 16 11:13:45 2019 user.emerg syslog: sh: on: unknown operand
    Wed Oct 16 11:13:45 2019 kern.info kernel: [ 51.400000] S95done (1668): drop_caches: 1
    Wed Oct 16 11:13:47 2019 daemon.info evloop[1657]: evloopInit Done.
    Wed Oct 16 11:13:47 2019 daemon.info md[1657]: mdInit Done.
    Wed Oct 16 11:13:47 2019 daemon.info mqttEv[1657]: mqttEvInit Done.
    Wed Oct 16 11:13:49 2019 daemon.info unknown[1657]: gwManagerInit: Init gateway Manager
    Wed Oct 16 11:13:49 2019 daemon.info bufrd[1657]: bufrdInit Done.
    Wed Oct 16 11:13:49 2019 daemon.info bufrd[1657]: ENTER bufrdCreate `gwbridge-rd’
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: MQTT Init Start
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Mqtt - Client ID gwbridge-60c5a8fffe76121b
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Mqtt - Retain 0
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Mqtt - Clean Session 1
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Mqtt - Qos 1
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Mqtt - keepalive 10
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: CA CERT File null
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: CA PATH /etc/ssl/certs/
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Client CERT File null
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: Client Key File null
    Wed Oct 16 11:13:49 2019 daemon.info gwBridge[1657]: TLS Version : tlsv1.2
    Wed Oct 16 11:13:49 2019 daemon.info procd: - init complete -
    Wed Oct 16 11:13:50 2019 kern.warn kernel: [ 55.870000] <==== rt28xx_init, Status=0
    Wed Oct 16 11:13:50 2019 daemon.notice netifd: Interface ‘wwan’ is disabled
    Wed Oct 16 11:13:50 2019 daemon.notice netifd: Interface ‘wwan’ is enabled
    Wed Oct 16 11:13:50 2019 daemon.notice netifd: Interface ‘wwan’ is setting up now
    Wed Oct 16 11:13:50 2019 daemon.notice netifd: wan (1526): Sending discover…
    Wed Oct 16 11:13:50 2019 daemon.notice netifd: wan (1526): Sending discover…
    Wed Oct 16 11:13:50 2019 daemon.notice netifd: wan (1526): Sending discover…
    Wed Oct 16 11:13:50 2019 daemon.err openvpn(sample_client)[1666]: RESOLVE: Cannot resolve host address: OPENVPN_SERVER_DOMAIN: Name or service not known
    Wed Oct 16 11:13:50 2019 daemon.err mqttEv[1657]: mqttEvConnectStart: [[gwBridgeS Mqtt Client]] Unable to connect
    Wed Oct 16 11:13:50 2019 daemon.info gwBridge[1657]: MQTT Init Done
    Wed Oct 16 11:13:50 2019 daemon.info evloop[1657]: ENTER evloopRun
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: radio0 (1474): Interface doesn’t accept private ioctl…
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: radio0 (1474): set (8BE2): Invalid argument
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: wwan (1751): udhcpc: option -h NAME is deprecated, use -x hostname:NAME
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: wwan (1751): udhcpc (v1.23.2) started
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: Network device ‘ra0’ link is up
    Wed Oct 16 11:13:51 2019 kern.info kernel: [ 57.090000] device ra0 entered promiscuous mode
    Wed Oct 16 11:13:51 2019 kern.info kernel: [ 57.100000] br-lan: port 2(ra0) entered forwarding state
    Wed Oct 16 11:13:51 2019 kern.info kernel: [ 57.110000] br-lan: port 2(ra0) entered forwarding state
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: wwan (1751): Sending discover…
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: wwan (1751): Sending select for 10.247.19.203…
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: wwan (1751): Lease of 10.247.19.203 obtained, lease time 7200
    Wed Oct 16 11:13:51 2019 daemon.notice netifd: Interface ‘wwan’ is now up
    Wed Oct 16 11:13:53 2019 kern.info kernel: [ 59.110000] br-lan: port 2(ra0) entered forwarding state
    Wed Oct 16 11:13:54 2019 daemon.info mqttEv[1657]: mqttEvRegister : Register mosquitto event [gwBridgeS Mqtt Client]
    Wed Oct 16 11:13:54 2019 daemon.info dnsmasq[1779]: started, version 2.73 cachesize 150
    Wed Oct 16 11:13:54 2019 daemon.info dnsmasq[1779]: compile time options: no-IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC loop-detect inotify
    Wed Oct 16 11:13:54 2019 daemon.info dnsmasq[1779]: DNS service limited to local subnets
    Wed Oct 16 11:13:54 2019 daemon.info dnsmasq-dhcp[1779]: DHCP, IP range 192.168.230.100 – 192.168.230.249, lease time 12h
    Wed Oct 16 11:13:54 2019 daemon.info dnsmasq[1779]: using local addresses only for domain lan
    Wed Oct 16 11:13:54 2019 daemon.info dnsmasq[1779]: reading /tmp/resolv.conf.auto
    Wed Oct 16 11:13:55 2019 daemon.info dnsmasq[1779]: using local addresses only for domain lan
    Wed Oct 16 11:13:55 2019 daemon.info dnsmasq[1779]: using nameserver 10.4.27.70#53
    Wed Oct 16 11:13:55 2019 daemon.info dnsmasq[1779]: using nameserver 10.5.133.45#53
    Wed Oct 16 11:13:55 2019 daemon.info dnsmasq[1779]: read /etc/hosts - 1 addresses
    Wed Oct 16 11:13:55 2019 daemon.info dnsmasq[1779]: read /tmp/hosts/dhcp - 1 addresses
    Wed Oct 16 11:13:55 2019 daemon.info dnsmasq-dhcp[1779]: read /etc/ethers - 0 addresses
    Wed Oct 16 11:13:55 2019 user.notice ping-watchdog: loopback lo ifup
    Wed Oct 16 11:13:55 2019 daemon.info gwBridge[1657]: mosqConnectCB: Mqtt Connect Success …
    Wed Oct 16 11:13:55 2019 daemon.notice openvpn(sample_client)[1666]: Attempting to establish TCP connection with [AF_INET]OPENVPN_SERVER_IP:1194 [nonblock]
    Wed Oct 16 11:13:56 2019 user.notice lora_pkt_fwd[1635]: INFO: [main] concentrator started, packet can now be received
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: TCP connection established with [AF_INET]OPENVPN_SERVER_IP:1194
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: TCPv4_CLIENT link local: [undef]
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: TCPv4_CLIENT link remote: [AF_INET]OPENVPN_SERVER_IP:1194
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: TLS: Initial packet from [AF_INET]OPENVPN_SERVER_IP:1194, sid=02a0b193 73b0691a
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY OK: depth=1, CN=ChangeMe
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: Validating certificate key usage
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: ++ Certificate has key usage 00a0, expects 00a0
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY KU OK
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: Validating certificate extended key usage
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY EKU OK
    Wed Oct 16 11:13:56 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY OK: depth=0, CN=server
    Wed Oct 16 11:13:57 2019 kern.notice kernel: [ 62.580000] random: nonblocking pool is initialized
    Wed Oct 16 11:13:57 2019 user.notice ping-watchdog: wwan wwan0 ifup
    Wed Oct 16 11:13:57 2019 user.notice firewall: Reloading firewall due to ifup of wwan (wwan0)
    Wed Oct 16 11:13:57 2019 daemon.err openvpn(sample_client)[1666]: Connection reset, restarting [-1]
    Wed Oct 16 11:13:57 2019 daemon.notice openvpn(sample_client)[1666]: SIGUSR1[soft,connection-reset] received, process restarting
    Wed Oct 16 11:13:57 2019 daemon.notice openvpn(sample_client)[1666]: Restart pause, 5 second(s)
    Wed Oct 16 11:13:58 2019 kern.info kernel: [ 64.070000] lora_pkt_fwd uses obsolete (PF_INET,SOCK_PACKET)
    Wed Oct 16 11:13:58 2019 daemon.info gwManager[1657]: create_gateway: Create Gateway 60c5a8fffe76121b
    Wed Oct 16 11:14:02 2019 daemon.warn openvpn(sample_client)[1666]: WARNING: you are using user/group/chroot/setcon without persist-tun – this may cause restarts to fail
    Wed Oct 16 11:14:02 2019 daemon.notice openvpn(sample_client)[1666]: Socket Buffers: R=[87380->87380] S=[16384->16384]
    Wed Oct 16 11:14:02 2019 daemon.notice openvpn(sample_client)[1666]: Attempting to establish TCP connection with [AF_INET]OPENVPN_SERVER_IP:1194 [nonblock]
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: TCP connection established with [AF_INET]OPENVPN_SERVER_IP:1194
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: TCPv4_CLIENT link local: [undef]
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: TCPv4_CLIENT link remote: [AF_INET]OPENVPN_SERVER_IP:1194
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: TLS: Initial packet from [AF_INET]OPENVPN_SERVER_IP:1194, sid=9dd37583 9c3c1742
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY OK: depth=1, CN=ChangeMe
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: Validating certificate key usage
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: ++ Certificate has key usage 00a0, expects 00a0
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY KU OK
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: Validating certificate extended key usage
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY EKU OK
    Wed Oct 16 11:14:03 2019 daemon.notice openvpn(sample_client)[1666]: VERIFY OK: depth=0, CN=server
    Wed Oct 16 11:14:05 2019 daemon.notice openvpn(sample_client)[1666]: Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
    Wed Oct 16 11:14:05 2019 daemon.notice openvpn(sample_client)[1666]: Data Channel Encrypt: Using 512 bit message hash ‘SHA512’ for HMAC authentication
    Wed Oct 16 11:14:05 2019 daemon.notice openvpn(sample_client)[1666]: Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
    Wed Oct 16 11:14:05 2019 daemon.notice openvpn(sample_client)[1666]: Data Channel Decrypt: Using 512 bit message hash ‘SHA512’ for HMAC authentication
    Wed Oct 16 11:14:05 2019 daemon.notice openvpn(sample_client)[1666]: Control Channel: TLSv1, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-SHA, 2048 bit RSA
    Wed Oct 16 11:14:05 2019 daemon.notice openvpn(sample_client)[1666]: [server] Peer Connection Initiated with [AF_INET]OPENVPN_SERVER_IP:1194
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: SENT CONTROL [server]: ‘PUSH_REQUEST’ (status=1)
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: PUSH: Received control message: ‘PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 172.31.0.2,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.16 255.255.255.0,peer-id 0’
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: OPTIONS IMPORT: timers and/or timeouts modified
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: OPTIONS IMPORT: --ifconfig/up options modified
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: OPTIONS IMPORT: route options modified
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: OPTIONS IMPORT: route-related options modified
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: OPTIONS IMPORT: peer-id set
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: TUN/TAP device tun0 opened
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: TUN/TAP TX queue length set to 100
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: /sbin/ifconfig tun0 10.8.0.16 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: /sbin/route add -net OPENVPN_SERVER_IP netmask 255.255.255.255 gw 10.247.19.204
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.0.1
    Wed Oct 16 11:14:07 2019 daemon.notice openvpn(sample_client)[1666]: Initialization Sequence Completed
    Wed Oct 16 11:14:20 2019 daemon.err mqttEv[1657]: mqttEvDisconnectCB : MqttClient [gwBridgeS Mqtt Client] Disconnected : [7]
    Wed Oct 16 11:14:20 2019 daemon.err mqttEv[1657]: mqttEvRdReady: mosquitto [[gwBridgeS Mqtt Client]] loop read ERR: 7
    Wed Oct 16 11:14:36 2019 daemon.err mqttEv[1657]: mqttEvReconnect: [gwBridgeS Mqtt Client] Reconnected ERR - [15]
    Wed Oct 16 11:14:36 2019 daemon.err mqttEv[1657]: mqttReconnectTimerHandler: Cannot connect …
    Wed Oct 16 11:14:51 2019 daemon.err mqttEv[1657]: mqttEvReconnect: [gwBridgeS Mqtt Client] Reconnected ERR - [15]
    Wed Oct 16 11:14:51 2019 daemon.err mqttEv[1657]: mqttReconnectTimerHandler: Cannot connect …
    Wed Oct 16 11:15:06 2019 daemon.err mqttEv[1657]: mqttEvReconnect: [gwBridgeS Mqtt Client] Reconnected ERR - [15]
    Wed Oct 16 11:15:06 2019 daemon.err mqttEv[1657]: mqttReconnectTimerHandler: Cannot connect …
    Wed Oct 16 11:15:21 2019 daemon.err mqttEv[1657]: mqttEvReconnect: [gwBridgeS Mqtt Client] Reconnected ERR - [15]
    Wed Oct 16 11:15:21 2019 daemon.err mqttEv[1657]: mqttReconnectTimerHandler: Cannot connect …
    Wed Oct 16 11:15:25 2019 daemon.info dnsmasq-dhcp[1779]: DHCPREQUEST(br-lan) 192.168.230.113 fc:77:74:d2:3d:ef
    Wed Oct 16 11:15:25 2019 daemon.info dnsmasq-dhcp[1779]: DHCPACK(br-lan) 192.168.230.113 fc:77:74:d2:3d:ef DESKTOP-A8RK081
    Wed Oct 16 11:15:36 2019 daemon.err mqttEv[1657]: mqttEvReconnect: [gwBridgeS Mqtt Client] Reconnected ERR - [15]
    Wed Oct 16 11:15:36 2019 daemon.err mqttEv[1657]: mqttReconnectTimerHandler: Cannot connect …
    Wed Oct 16 11:15:48 2019 user.warn lora_pkt_fwd[1635]: [up] Receive Downlink Packet! Drop it
    Wed Oct 16 11:15:51 2019 daemon.err mqttEv[1657]: mqttEvReconnect: [gwBridgeS Mqtt Client] Reconnected ERR - [15]
    Wed Oct 16 11:15:51 2019 daemon.err mqttEv[1657]: mqttReconnectTimerHandler: Cannot connect …
    ‘’’

The issue:

  1. from the system log above, you can see the OpenVPN is connected
  2. enter command ip address, you will see it has tun setup with expected static ip address 10.8.0.16
  3. ping 1.1.1.1 and 8.8.8.8, both are working fine
  4. however, ping google.com failed, seems the dns is not working

Thanks a lot!

Cheers,
Paul

Follow up my post above, this issue seems to be a DNS leakage issue. I found a workaround:

  1. Edit the /etc/config/dhcp file.
  2. Delete the line “option resolvfile ‘/tmp/resolv.conf.auto’”
  3. Add following lines
    option noresolv ‘1’
    list server ‘1.1.1.1’
    list server ‘8.8.8.8’

With this configuration, your gateway should be able to use OpenVPN and you can remotely access your gateway.

There seems still some firewall traffic rules issue which blocks my pc talking to the internet via the RAK7258 WiFi.

Hope someone could help me out of this. Thanks.

Cheers,
Paul

1 Like

The following procedures and updates are illustrative regarding the Open VPN configuration.I have tried out that .I have following two queries in this trail that I have setup my router to create a OpenVPN connection and I have installed the OpenVPN app on my Samsung Android phone. Uptil this it worked out fine.
Now I just want to view my cameras using the iVMS-4500 app on my phone, while I’m on the OpenVPN connection. But I don’t know anything about what information I have to enter into the app.I have thought that I can choose between HiDDNS - IP/Domain - IP Server, but I think I have to use IP/Domain.
But,when I selecting the IP/Domain, I entered the IP of my camera (10.0.0.100) in the adresse field, and the portnumber in the port field, and then username and password. But it does not work.And secondly,I am unable to setup VPN server In my Arlo pro 2.Suggest us what to do regarding these arlo app for pc for the updated resolution.