OpenVPN & NordVPN on R6220 - no internet & RX =0

HI All,
I spend few days with configuration OpenVPN and NordVPN. Till now I cant establish internet connection.
I've installed OpenWrt 19.07.6 and OpenVPN and tried several instructions/protocols/servers, and always connection logs shows that I am connected to VPN but without access to internet. I can't ping any IP.

Any suggestions will be very helpful

logs:

Mon Feb  1 10:11:20 2021 daemon.info dnsmasq[1782]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Feb  1 10:11:20 2021 daemon.info dnsmasq-dhcp[1782]: read /etc/ethers - 0 addresses
Mon Feb  1 10:11:20 2021 daemon.info dnsmasq[1782]: read /etc/hosts - 4 addresses
Mon Feb  1 10:11:20 2021 daemon.info dnsmasq[1782]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Feb  1 10:11:20 2021 daemon.info dnsmasq-dhcp[1782]: read /etc/ethers - 0 addresses
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: SENT CONTROL [pl185.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.5 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: timers and/or timeouts modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: compression parms modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: Socket Buffers: R=[344320->327680] S=[44800->327680]
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: route options modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: route-related options modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: peer-id set
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: adjusting link_mtu to 1659
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: OPTIONS IMPORT: data channel crypto options modified
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: TUN/TAP device tun0 opened
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: TUN/TAP TX queue length set to 100
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: /sbin/ifconfig tun0 10.7.3.5 netmask 255.255.255.0 mtu 1500 broadcast 10.7.3.255
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: /sbin/route add -net 194.110.114.171 netmask 255.255.255.255 gw 192.168.1.1
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.3.1
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.3.1
Mon Feb  1 10:11:20 2021 daemon.notice netifd: Interface 'vpn' is enabled
Mon Feb  1 10:11:20 2021 daemon.notice netifd: Network device 'tun0' link is up
Mon Feb  1 10:11:20 2021 daemon.notice netifd: Interface 'vpn' has link connectivity
Mon Feb  1 10:11:20 2021 daemon.notice netifd: Interface 'vpn' is setting up now
Mon Feb  1 10:11:20 2021 daemon.notice netifd: Interface 'vpn' is now up
Mon Feb  1 10:11:20 2021 daemon.notice openvpn(custom_config)[1313]: Initialization Sequence Completed
Mon Feb  1 10:11:20 2021 user.notice firewall: Reloading firewall due to ifup of vpn (tun0)
Mon Feb  1 10:11:21 2021 daemon.info dnsmasq[1782]: read /etc/hosts - 4 addresses
Mon Feb  1 10:11:21 2021 daemon.info dnsmasq[1782]: read /tmp/hosts/odhcpd - 0 addresses
Mon Feb  1 10:11:21 2021 daemon.info dnsmasq[1782]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Feb  1 10:11:21 2021 daemon.info dnsmasq-dhcp[1782]: read /etc/ethers - 0 addresses
Mon Feb  1 10:11:22 2021 daemon.info dnsmasq[1782]: read /etc/hosts - 4 addresses
Mon Feb  1 10:11:22 2021 daemon.info dnsmasq[1782]: read /tmp/hosts/odhcpd - 1 addresses
Mon Feb  1 10:11:22 2021 daemon.info dnsmasq[1782]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Feb  1 10:11:22 2021 daemon.info dnsmasq-dhcp[1782]: read /etc/ethers - 0 addresses
Mon Feb  1 10:12:18 2021 authpriv.info dropbear[1967]: Child connection from 192.168.1.157:64575
Mon Feb  1 10:12:20 2021 authpriv.notice dropbear[1967]: Password auth succeeded for 'root' from 192.168.1.157:64575
Mon Feb  1 10:12:26 2021 daemon.err uhttpd[1156]: luci: accepted login on /admin/status/syslog for root from 192.168.1.157

/etc/config/firewall

config defaults
	option syn_flood '1'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'REJECT'

config zone
	option name 'lan'
	list network 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'wan'
	list network 'wan'
	list network 'wan6'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option src_ip 'fc00::/6'
	option dest_ip 'fc00::/6'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config include
	option path '/etc/firewall.user'

config zone
	option name 'vpn'
	option input 'ACCEPT'
	option forward 'ACCEPT'
	option output 'ACCEPT'
	option network 'vpn'
	option masq '1'

config forwarding
	option src 'lan'
	option dest 'vpn'

/etc/config/openvpn

config openvpn 'custom_config'
	option enabled '1'
	option config '/etc/openvpn/pl185.nordvpn.com.tcp.ovpn'

/etc/config/network


config interface 'loopback'
	option ifname 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fdec:c908:f33f::/48'

config interface 'lan'
	option type 'bridge'
	option ifname 'eth0.1'
	option proto 'static'
	option ipaddr '192.168.1.1'
	option netmask '255.255.255.0'
	option ip6assign '60'

config device 'lan_eth0_1_dev'
	option name 'eth0.1'
	option macaddr 'dc:ef:09:10:e1:48'

config interface 'wan'
	option ifname 'eth0.2'
	option proto 'dhcp'

config device 'wan_eth0_2_dev'
	option name 'eth0.2'
	option macaddr 'dc:ef:09:10:e1:49'

config interface 'wan6'
	option ifname 'eth0.2'
	option proto 'dhcpv6'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '0 1 2 3 6t'

config switch_vlan
	option device 'switch0'
	option vlan '2'
	option ports '4 6t'

config interface 'vpn'
	option ifname 'tun0'
	option proto 'none'


/etc/openvpn/pl185.nordvpn.com.tcp.ovpn

client
dev tun0
proto tcp
remote 194.110.114.171 443
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no

remote-cert-tls server

verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
<ca>
-----BEGIN CERTIFICATE-----
MIIFCjCCAvKgAwIBAgIBATANBgkqhkiG9w0BAQ0FADA5MQswCQYDVQQGEwJQQTEQ
MA4GA1UEChMHTm9yZFZQTjEYMBYGA1UEAxMPTm9yZFZQTiBSb290IENBMB4XDTE2
MDEwMTAwMDAwMFoXDTM1MTIzMTIzNTk1OVowOTELMAkGA1UEBhMCUEExEDAOBgNV
BAoTB05vcmRWUE4xGDAWBgNVBAMTD05vcmRWUE4gUm9vdCBDQTCCAiIwDQYJKoZI
hvcNAQEBBQADggIPADCCAgoCggIBAMkr/BYhyo0F2upsIMXwC6QvkZps3NN2/eQF
kfQIS1gql0aejsKsEnmY0Kaon8uZCTXPsRH1gQNgg5D2gixdd1mJUvV3dE3y9FJr
XMoDkXdCGBodvKJyU6lcfEVF6/UxHcbBguZK9UtRHS9eJYm3rpL/5huQMCppX7kU
eQ8dpCwd3iKITqwd1ZudDqsWaU0vqzC2H55IyaZ/5/TnCk31Q1UP6BksbbuRcwOV
skEDsm6YoWDnn/IIzGOYnFJRzQH5jTz3j1QBvRIuQuBuvUkfhx1FEwhwZigrcxXu
MP+QgM54kezgziJUaZcOM2zF3lvrwMvXDMfNeIoJABv9ljw969xQ8czQCU5lMVmA
37ltv5Ec9U5hZuwk/9QO1Z+d/r6Jx0mlurS8gnCAKJgwa3kyZw6e4FZ8mYL4vpRR
hPdvRTWCMJkeB4yBHyhxUmTRgJHm6YR3D6hcFAc9cQcTEl/I60tMdz33G6m0O42s
Qt/+AR3YCY/RusWVBJB/qNS94EtNtj8iaebCQW1jHAhvGmFILVR9lzD0EzWKHkvy
WEjmUVRgCDd6Ne3eFRNS73gdv/C3l5boYySeu4exkEYVxVRn8DhCxs0MnkMHWFK6
MyzXCCn+JnWFDYPfDKHvpff/kLDobtPBf+Lbch5wQy9quY27xaj0XwLyjOltpiST
LWae/Q4vAgMBAAGjHTAbMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqG
SIb3DQEBDQUAA4ICAQC9fUL2sZPxIN2mD32VeNySTgZlCEdVmlq471o/bDMP4B8g
nQesFRtXY2ZCjs50Jm73B2LViL9qlREmI6vE5IC8IsRBJSV4ce1WYxyXro5rmVg/
k6a10rlsbK/eg//GHoJxDdXDOokLUSnxt7gk3QKpX6eCdh67p0PuWm/7WUJQxH2S
DxsT9vB/iZriTIEe/ILoOQF0Aqp7AgNCcLcLAmbxXQkXYCCSB35Vp06u+eTWjG0/
pyS5V14stGtw+fA0DJp5ZJV4eqJ5LqxMlYvEZ/qKTEdoCeaXv2QEmN6dVqjDoTAo
k0t5u4YRXzEVCfXAC3ocplNdtCA72wjFJcSbfif4BSC8bDACTXtnPC7nD0VndZLp
+RiNLeiENhk0oTC+UVdSc+n2nJOzkCK0vYu0Ads4JGIB7g8IB3z2t9ICmsWrgnhd
NdcOe15BincrGA8avQ1cWXsfIKEjbrnEuEk9b5jel6NfHtPKoHc9mDpRdNPISeVa
wDBM1mJChneHt59Nh8Gah74+TM1jBsw4fhJPvoc7Atcg740JErb904mZfkIEmojC
VPhBHVQ9LHBAdM8qFI2kRK0IynOmAZhexlP/aT/kpEsEPyaZQlnBn3An1CRz8h0S
PApL8PytggYKeQmRhl499+6jLxcZ2IegLfqq41dzIjwHwTMplg+1pKIOVojpWA==
-----END CERTIFICATE-----
</ca>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
e685bdaf659a25a200e2b9e39e51ff03
0fc72cf1ce07232bd8b2be5e6c670143
f51e937e670eee09d4f2ea5a6e4e6996
5db852c275351b86fc4ca892d78ae002
d6f70d029bd79c4d1c26cf14e9588033
cf639f8a74809f29f72b9d58f9b8f5fe
fc7938eade40e9fed6cb92184abb2cc1
0eb1a296df243b251df0643d53724cdb
5a92a1d6cb817804c4a9319b57d53be5
80815bcfcb2df55018cc83fc43bc7ff8
2d51f9b88364776ee9d12fc85cc7ea5b
9741c4f598c485316db066d52db4540e
212e1518a9bd4828219e24b20d88f598
a196c9de96012090e333519ae18d3509
9427e7b372d348d352dc4c85e18cd4b9
3f8a56ddb2e64eb67adfc9b337157ff4
-----END OpenVPN Static key V1-----
</tls-auth>

auth-user-pass /etc/openvpn/pass.txt

1 Like

Make sure to download the latest client config from the VPN provider site.

Optimize MTU on the WAN interface and enable MTU fix for the VPN zone:

uci set firewall.@zone[2].mtu_fix="1"
uci commit firewall
/etc/init.d/firewall restart

If the issue persists, activate the VPN connection and post the output to pastebin.com:

ubus call system board; uci show network; uci show firewall; uci show openvpn; \
ip address show; ip route show table all; ip rule show; iptables-save; \
head -v -n -0 /etc/resolv.* /tmp/resolv.* /tmp/resolv.*/*
2 Likes

HI,
Thanks for answer!
Unfortunately the issue still persist:

1 Like
uci set network.lan.ipaddr="192.168.2.1"
uci commit network
/etc/init.d/network restart
sleep 10
/etc/init.d/openvpn restart

Thanks a lot!!!!!
You save me a lot off time!!!

THAAANKS!!!:slight_smile:

1 Like

This topic was automatically closed 0 minutes after the last reply. New replies are no longer allowed.