I followed the other posts relative to setting up PIA's OpenVPN, and for the life of me, I cannot get my tunnel to connect and assign an IP. Is there any pertinent log information that will pinpoint exactly why? Here is my config info:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name WAN_IN { default-action drop description "WAN to internal" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } } name WAN_LOCAL { default-action drop description "WAN to router" rule 1 { action accept description "Allow established/related" state { established enable related enable } } rule 2 { action accept description "Ext ping" log disable protocol icmp } rule 4 { action accept description ESP log disable protocol 50 } rule 5 { action accept description IKE destination { port 500 } log disable protocol udp } rule 6 { action accept description NAT-T destination { port 4500 } log disable protocol udp } rule 7 { action accept description L2TP destination { port 1701 } log disable protocol udp } rule 8 { action drop description "Drop invalid state" state { invalid enable } } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.1.1/24 description "Local 2" duplex auto speed auto } ethernet eth1 { address dhcp description Internet duplex auto firewall { in { } local { name WAN_LOCAL } } speed auto } ethernet eth2 { description Local duplex auto speed auto } ethernet eth3 { description Local duplex auto speed auto } ethernet eth4 { description Local duplex auto speed auto } loopback lo { } openvpn vtun0 { config-file /config/auth/USEast2.ovpn description PIA } switch switch0 { address 192.168.2.1/24 description Local mtu 1500 switch-port { interface eth2 { } interface eth3 { } interface eth4 { } vlan-aware disable } } } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative disable subnet 192.168.1.0/24 { default-router 192.168.1.1 dns-server 192.168.1.1 lease 86400 start 192.168.1.21 { stop 192.168.1.240 } } } shared-network-name LAN2 { authoritative disable subnet 192.168.2.0/24 { default-router 192.168.2.1 dns-server 192.168.2.1 lease 86400 start 192.168.2.21 { stop 192.168.2.240 } static-mapping xxxxxx { ip-address 192.168.2.127 mac-address xxxxxx } static-mapping xxxxxxx { ip-address 192.168.2.30 mac-address xxxxxxx } } } use-dnsmasq disable } dns { dynamic { interface eth1 { service afraid { host-name xxxxxxxx login xxxxxx password xxxxxxx server freedns.afraid.org } } } forwarding { cache-size 150 listen-on eth0 listen-on switch0 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { outbound-interface eth1 type masquerade } } snmp { community public { authorization ro } contact "xxxxxxxx" location xxxxxx v3 { } } ssh { port 22 protocol-version v2 } } system { host-name ubnt login { user xxxxxx { authentication { encrypted-password xxxxxxx } level admin } } ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } syslog { global { facility all { level notice } facility protocols { level debug } } host 192.168.2.30 { facility all { level notice } } } time-zone UTC } vpn { ipsec { auto-firewall-nat-exclude enable ipsec-interfaces { interface eth1 } nat-networks { allowed-network 0.0.0.0/0 { } } nat-traversal enable } l2tp { remote-access { authentication { local-users { username xxxxxx { password xxxxxx } } mode local } client-ip-pool { start 172.16.1.10 stop 172.16.1.19 } dhcp-interface eth1 dns-servers { server-1 8.8.8.8 server-2 8.8.4.4 } ipsec-settings { authentication { mode pre-shared-secret pre-shared-secret xxxxxx } ike-lifetime 3600 } } } }
And here is the content of my OpenVPN file:
client dev-type tun proto udp remote us-east.privateinternetaccess.com 1198 resolv-retry infinite nobind persist-key persist-tun cipher aes-128-cbc auth sha1 tls-client remote-cert-tls server auth-user-pass /config/auth/auth.txt comp-lzo verb 1 reneg-sec 0 crl-verify /config/auth/crl.rsa.2048.pem ca /config/auth/ca.rsa.2048.crt disable-occ route-nopull
I've been messing with this all day and it's driving me insane.