I have a problem because I am using OpenVPN on the OVH GAME server. The problem is that when the filtration starts on an OVH attack, my client is cut off. It is treated together as an attack.
I read on the OVH website that:
"The UDP fragmentation is blocked (DROP) by default. When you enable the Network Firewall, if you use a VPN, remember to configure your maximum transmission unit (MTU) correctly. For example, on OpenVPN, you can tick MTU test."
I also set MTU to 1432 according to this guide:
https://www.sonassi.com/help/troubleshooting/setting-correct-mtu-for-openvpn
But it still cuts off my client for OVH filtration.
I wrote a ticket to but got information to make a dump of the attack. Unfortunately, it won't help me because I have a lot of different attacks. With the weakest attack, he even cuts me off.

My configuration:
Code: Select all
setenv FORWARD_COMPATIBLE 1
client
server-poll-timeout 4
nobind
remote xxx.xxx.xxx.xxx 1194 udp
remote xxx.xxx.xxx.xxx 1194 udp
remote xxx.xxx.xxx.xxx 443 tcp
remote xxx.xxx.xxx.xxx 1194 udp
remote xxx.xxx.xxx.xxx 1194 udp
remote xxx.xxx.xxx.xxx 1194 udp
remote xxx.xxx.xxx.xxx 1194 udp
remote xxx.xxx.xxx.xxx 1194 udp
dev tun
dev-type tun
ns-cert-type server
setenv opt tls-version-min 1.0 or-highest
reneg-sec 604800
sndbuf 100000
rcvbuf 100000
mssfix 1432
auth-user-pass pass.txt
# NOTE: LZO commands are pushed by the Access Server at connect time.
# NOTE: The below line doesn't disable LZO.
comp-lzo no
verb 3
setenv PUSH_PEER_INFO
Bardzo bym był wdzięczny jakby ktoś znał rozwiązanie.
