I have a problem because I am using OpenVPN on the OVH GAME server. The problem is that when the filtration starts on an OVH attack, my client is cut off. It is treated together as an attack.
I read on the OVH website that:
"The UDP fragmentation is blocked (DROP) by default. When you enable the Network Firewall, if you use a VPN, remember to configure your maximum transmission unit (MTU) correctly. For example, on OpenVPN, you can tick MTU test."
I also set MTU to 1432 according to this guide:
But it still cuts off my client for OVH filtration.
I wrote a ticket to but got information to make a dump of the attack. Unfortunately, it won't help me because I have a lot of different attacks. With the weakest attack, he even cuts me off.
Code: Select all
setenv FORWARD_COMPATIBLE 1 client server-poll-timeout 4 nobind remote xxx.xxx.xxx.xxx 1194 udp remote xxx.xxx.xxx.xxx 1194 udp remote xxx.xxx.xxx.xxx 443 tcp remote xxx.xxx.xxx.xxx 1194 udp remote xxx.xxx.xxx.xxx 1194 udp remote xxx.xxx.xxx.xxx 1194 udp remote xxx.xxx.xxx.xxx 1194 udp remote xxx.xxx.xxx.xxx 1194 udp dev tun dev-type tun ns-cert-type server setenv opt tls-version-min 1.0 or-highest reneg-sec 604800 sndbuf 100000 rcvbuf 100000 mssfix 1432 auth-user-pass pass.txt # NOTE: LZO commands are pushed by the Access Server at connect time. # NOTE: The below line doesn't disable LZO. comp-lzo no verb 3 setenv PUSH_PEER_INFO
Bardzo bym był wdzięczny jakby ktoś znał rozwiązanie.