Given Balance 380 w/8.2.0 build 5103 firmware:
The OpenVPN server is setup. Clients are using the profile file produced by the 380. Connections work fine except clients lose connection once or twice a day. OpenVPN client says user is still connected, but user cannot access anything without disconnecting & reconnecting.
The disconnect is per user experience, not every client connect at once.
The periodic cycle of verification occurs. But on the last when the disconnects appears to happen, the following never returns. Maybe the cause?
2022-09-06 14:24:54 PUSH: Received control message: ‘PUSH_REPLY, auth-tokenSESS_ID’
Here’s sample of last cycle plus most recent when the “disconnect” occurs:
2022-09-06 14:24:54 VERIFY OK: depth=1, C=US, O=Peplink, CN=OpenVPN CA/[email protected]
2022-09-06 14:24:54 VERIFY KU OK
2022-09-06 14:24:54 Validating certificate extended key usage
2022-09-06 14:24:54 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-09-06 14:24:54 VERIFY EKU OK
2022-09-06 14:24:54 VERIFY OK: depth=0, C=US, O=Peplink, CN=OpenVPN Server/[email protected]
2022-09-06 14:24:54 Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
2022-09-06 14:24:54 Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
2022-09-06 14:24:54 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-09-06 14:24:54 PUSH: Received control message: ‘PUSH_REPLY, auth-tokenSESS_ID’
2022-09-06 15:23:09 VERIFY OK: depth=1, C=US, O=Peplink, CN=OpenVPN CA/[email protected]
2022-09-06 15:23:09 VERIFY KU OK
2022-09-06 15:23:09 Validating certificate extended key usage
2022-09-06 15:23:09 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-09-06 15:23:09 VERIFY EKU OK
2022-09-06 15:23:09 VERIFY OK: depth=0, C=US, O=Peplink, CN=OpenVPN Server/[email protected]
2022-09-06 15:23:09 Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
2022-09-06 15:23:09 Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
2022-09-06 15:23:09 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Is there a configuration problem? A default timeout period?