Guest User

Untitled

a guest
Nov 18th, 2017
403
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.63 KB | None | 0 0
  1. port 17203
  2. proto tcp
  3. dev tun
  4. ca "C:\Program Files\OpenVPN\easy-rsa\keys\ca.crt"
  5. cert "C:\Program Files\OpenVPN\easy-rsa\keys\server.crt"
  6. key "C:\Program Files\OpenVPN\easy-rsa\keys\server.key"
  7. dh "C:\Program Files\OpenVPN\config\dh4096.pem"
  8. server 10.8.0.0 255.255.255.0
  9. ifconfig-pool-persist ipp.txt
  10. comp-lzo
  11. persist-key
  12. persist-tun
  13. status openvpn-status.log
  14. verb 3
  15. push "route 192.168.0.0 255.255.255.0"
  16. push "redirect-gateway def1"
  17. push "dhcp-option DNS 8.8.8.8"
  18. client-to-client
  19.  
  20. client
  21. dev tun
  22. proto tcp
  23. remote 0.tcp.ngrok.io 10343
  24. resolv-retry infinite
  25. nobind
  26. persist-key
  27. persist-tun
  28. ca "ca.crt"
  29. cert "laptoptouch.crt"
  30. key "laptoptouch.key"
  31. remote-cert-tls server
  32. comp-lzo
  33. verb 3
  34.  
  35. Sat Nov 18 15:56:07 2017 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
  36. Sat Nov 18 15:56:07 2017 Windows version 6.2 (Windows 8 or greater) 64bit
  37. Sat Nov 18 15:56:07 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  38. Sat Nov 18 15:56:07 2017 WARNING: --keepalive option is missing from server config
  39. Sat Nov 18 15:56:07 2017 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
  40. Sat Nov 18 15:56:07 2017 Diffie-Hellman initialized with 4096 bit key
  41. Sat Nov 18 15:56:07 2017 interactive service msg_channel=0
  42. Sat Nov 18 15:56:07 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=d0:50:99:aa:dc:5e
  43. Sat Nov 18 15:56:07 2017 open_tun
  44. Sat Nov 18 15:56:07 2017 TAP-WIN32 device [OpenVPN TAP] opened: \.Global{40E46DCD-C66A-4D63-9AFE-07A9CE0CCF57}.tap
  45. Sat Nov 18 15:56:07 2017 TAP-Windows Driver Version 9.21
  46. Sat Nov 18 15:56:07 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.252 on interface {40E46DCD-C66A-4D63-9AFE-07A9CE0CCF57} [DHCP-serv: 10.8.0.2, lease-time: 31536000]
  47. Sat Nov 18 15:56:07 2017 Sleeping for 10 seconds...
  48. Sat Nov 18 15:56:17 2017 Successful ARP Flush on interface [6] {40E46DCD-C66A-4D63-9AFE-07A9CE0CCF57}
  49. Sat Nov 18 15:56:17 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  50. Sat Nov 18 15:56:17 2017 C:WINDOWSsystem32route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.2
  51. Sat Nov 18 15:56:17 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  52. Sat Nov 18 15:56:17 2017 Route addition via IPAPI succeeded [adaptive]
  53. Sat Nov 18 15:56:17 2017 Could not determine IPv4/IPv6 protocol. Using AF_INET6
  54. Sat Nov 18 15:56:17 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  55. Sat Nov 18 15:56:17 2017 setsockopt(IPV6_V6ONLY=0)
  56. Sat Nov 18 15:56:17 2017 Listening for incoming TCP connection on [AF_INET6][undef]:17203
  57. Sat Nov 18 15:56:17 2017 TCPv6_SERVER link local (bound): [AF_INET6][undef]:17203
  58. Sat Nov 18 15:56:17 2017 TCPv6_SERVER link remote: [AF_UNSPEC]
  59. Sat Nov 18 15:56:17 2017 MULTI: multi_init called, r=256 v=256
  60. Sat Nov 18 15:56:17 2017 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
  61. Sat Nov 18 15:56:17 2017 ifconfig_pool_read(), in='mi5s,10.8.0.4', TODO: IPv6
  62. Sat Nov 18 15:56:17 2017 succeeded -> ifconfig_pool_set()
  63. Sat Nov 18 15:56:17 2017 ifconfig_pool_read(), in='touchlaptop,10.8.0.8', TODO: IPv6
  64. Sat Nov 18 15:56:17 2017 succeeded -> ifconfig_pool_set()
  65. Sat Nov 18 15:56:17 2017 IFCONFIG POOL LIST
  66. Sat Nov 18 15:56:17 2017 mi5s,10.8.0.4
  67. Sat Nov 18 15:56:17 2017 touchlaptop,10.8.0.8
  68. Sat Nov 18 15:56:17 2017 MULTI: TCP INIT maxclients=60 maxevents=64
  69. Sat Nov 18 15:56:17 2017 Initialization Sequence Completed
  70. Sat Nov 18 16:01:40 2017 TCP connection established with [AF_INET6]::1:50863
  71. Sat Nov 18 16:01:41 2017 ::1 TLS: Initial packet from [AF_INET6]::1:50863, sid=b0bf0e9d 8a944728
  72. Sat Nov 18 16:01:42 2017 ::1 VERIFY OK: depth=1, C=IE, ST=LE, L=Dublin, O=Lumen_SA, OU=changeme, CN=OpenVPN-CA, name=changeme, emailAddress=josemiquai@gmail.com
  73. Sat Nov 18 16:01:42 2017 ::1 VERIFY OK: depth=0, C=IE, ST=LE, L=Dublin, O=Lumen_SA, OU=changeme, CN=touchlaptop, name=changeme, emailAddress=josemiquai@gmail.com
  74. Sat Nov 18 16:01:42 2017 ::1 peer info: IV_VER=2.3.17
  75. Sat Nov 18 16:01:42 2017 ::1 peer info: IV_PLAT=win
  76. Sat Nov 18 16:01:42 2017 ::1 peer info: IV_PROTO=2
  77. Sat Nov 18 16:01:42 2017 ::1 peer info: IV_GUI_VER=OpenVPN_GUI_10
  78. Sat Nov 18 16:01:42 2017 ::1 Outgoing Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
  79. Sat Nov 18 16:01:42 2017 ::1 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  80. Sat Nov 18 16:01:42 2017 ::1 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  81. Sat Nov 18 16:01:42 2017 ::1 Incoming Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
  82. Sat Nov 18 16:01:42 2017 ::1 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  83. Sat Nov 18 16:01:42 2017 ::1 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  84. Sat Nov 18 16:01:42 2017 ::1 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
  85. Sat Nov 18 16:01:42 2017 ::1 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  86. Sat Nov 18 16:01:42 2017 ::1 [touchlaptop] Peer Connection Initiated with [AF_INET6]::1:50863
  87. Sat Nov 18 16:01:42 2017 touchlaptop/::1 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)
  88. Sat Nov 18 16:01:42 2017 touchlaptop/::1 MULTI: Learn: 10.8.0.10 -> touchlaptop/::1
  89. Sat Nov 18 16:01:42 2017 touchlaptop/::1 MULTI: primary virtual IP for touchlaptop/::1: 10.8.0.10
  90. Sat Nov 18 16:01:45 2017 touchlaptop/::1 PUSH: Received control message: 'PUSH_REQUEST'
  91. Sat Nov 18 16:01:45 2017 touchlaptop/::1 SENT CONTROL [touchlaptop]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 10.8.0.0 255.255.255.0,topology net30,ifconfig 10.8.0.10 10.8.0.9,peer-id 0' (status=1)
  92.  
  93. Sat Nov 18 16:03:57 2017 OpenVPN 2.3.17 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Jun 20 2017
  94. Sat Nov 18 16:03:57 2017 Windows version 6.2 (Windows 8 or greater) 64bit
  95. Sat Nov 18 16:03:57 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  96. Enter Management Password:
  97. Sat Nov 18 16:03:57 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  98. Sat Nov 18 16:03:57 2017 Need hold release from management interface, waiting...
  99. Sat Nov 18 16:03:57 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  100. Sat Nov 18 16:03:57 2017 MANAGEMENT: CMD 'state on'
  101. Sat Nov 18 16:03:57 2017 MANAGEMENT: CMD 'log all on'
  102. Sat Nov 18 16:03:57 2017 MANAGEMENT: CMD 'hold off'
  103. Sat Nov 18 16:03:57 2017 MANAGEMENT: CMD 'hold release'
  104. Sat Nov 18 16:03:57 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  105. Sat Nov 18 16:03:57 2017 MANAGEMENT: >STATE:1511021037,RESOLVE,,,
  106. Sat Nov 18 16:03:57 2017 Attempting to establish TCP connection with [AF_INET]52.15.62.13:10343 [nonblock]
  107. Sat Nov 18 16:03:57 2017 MANAGEMENT: >STATE:1511021037,TCP_CONNECT,,,
  108. Sat Nov 18 16:03:58 2017 TCP connection established with [AF_INET]52.15.62.13:10343
  109. Sat Nov 18 16:03:58 2017 TCPv4_CLIENT link local: [undef]
  110. Sat Nov 18 16:03:58 2017 TCPv4_CLIENT link remote: [AF_INET]52.15.62.13:10343
  111. Sat Nov 18 16:03:58 2017 MANAGEMENT: >STATE:1511021038,WAIT,,,
  112. Sat Nov 18 16:03:59 2017 MANAGEMENT: >STATE:1511021039,AUTH,,,
  113. Sat Nov 18 16:03:59 2017 TLS: Initial packet from [AF_INET]52.15.62.13:10343, sid=41901220 3c190353
  114. Sat Nov 18 16:03:59 2017 VERIFY OK: depth=1, C=IE, ST=LE, L=Dublin, O=Lumen_SA, OU=changeme, CN=OpenVPN-CA, name=changeme, emailAddress=josemiquai@gmail.com
  115. Sat Nov 18 16:03:59 2017 Validating certificate key usage
  116. Sat Nov 18 16:03:59 2017 ++ Certificate has key usage 00a0, expects 00a0
  117. Sat Nov 18 16:03:59 2017 VERIFY KU OK
  118. Sat Nov 18 16:03:59 2017 Validating certificate extended key usage
  119. Sat Nov 18 16:03:59 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  120. Sat Nov 18 16:03:59 2017 VERIFY EKU OK
  121. Sat Nov 18 16:03:59 2017 VERIFY OK: depth=0, C=IE, ST=LE, L=Dublin, O=Lumen_SA, OU=changeme, CN=server, name=changeme, emailAddress=josemiquai@gmail.com
  122. Sat Nov 18 16:04:00 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  123. Sat Nov 18 16:04:00 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  124. Sat Nov 18 16:04:00 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  125. Sat Nov 18 16:04:00 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  126. Sat Nov 18 16:04:00 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  127. Sat Nov 18 16:04:00 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  128. Sat Nov 18 16:04:00 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  129. Sat Nov 18 16:04:00 2017 [server] Peer Connection Initiated with [AF_INET]52.15.62.13:10343
  130. Sat Nov 18 16:04:01 2017 MANAGEMENT: >STATE:1511021041,GET_CONFIG,,,
  131. Sat Nov 18 16:04:02 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  132. Sat Nov 18 16:04:02 2017 PUSH: Received control message: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 10.8.0.0 255.255.255.0,topology net30,ifconfig 10.8.0.10 10.8.0.9,peer-id 0'
  133. Sat Nov 18 16:04:02 2017 OPTIONS IMPORT: --ifconfig/up options modified
  134. Sat Nov 18 16:04:02 2017 OPTIONS IMPORT: route options modified
  135. Sat Nov 18 16:04:02 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  136. Sat Nov 18 16:04:02 2017 OPTIONS IMPORT: peer-id set
  137. Sat Nov 18 16:04:02 2017 OPTIONS IMPORT: adjusting link_mtu to 1547
  138. Sat Nov 18 16:04:02 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=3c:a0:67:99:05:39
  139. Sat Nov 18 16:04:02 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  140. Sat Nov 18 16:04:02 2017 MANAGEMENT: >STATE:1511021042,ASSIGN_IP,,10.8.0.10,
  141. Sat Nov 18 16:04:02 2017 open_tun, tt->ipv6=0
  142. Sat Nov 18 16:04:02 2017 TAP-WIN32 device [Ethernet 3] opened: \.Global{37A463F7-1E28-44F6-960F-CBAFB68BFF06}.tap
  143. Sat Nov 18 16:04:02 2017 TAP-Windows Driver Version 9.21
  144. Sat Nov 18 16:04:02 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.10/255.255.255.252 on interface {37A463F7-1E28-44F6-960F-CBAFB68BFF06} [DHCP-serv: 10.8.0.9, lease-time: 31536000]
  145. Sat Nov 18 16:04:02 2017 Successful ARP Flush on interface [5] {37A463F7-1E28-44F6-960F-CBAFB68BFF06}
  146. Sat Nov 18 16:04:07 2017 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
  147. Sat Nov 18 16:04:07 2017 C:WINDOWSsystem32route.exe ADD 52.15.62.13 MASK 255.255.255.255 192.168.0.1
  148. Sat Nov 18 16:04:07 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
  149. Sat Nov 18 16:04:07 2017 Route addition via IPAPI succeeded [adaptive]
  150. Sat Nov 18 16:04:07 2017 C:WINDOWSsystem32route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.9
  151. Sat Nov 18 16:04:07 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  152. Sat Nov 18 16:04:07 2017 Route addition via IPAPI succeeded [adaptive]
  153. Sat Nov 18 16:04:07 2017 C:WINDOWSsystem32route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.9
  154. Sat Nov 18 16:04:07 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  155. Sat Nov 18 16:04:07 2017 Route addition via IPAPI succeeded [adaptive]
  156. Sat Nov 18 16:04:07 2017 MANAGEMENT: >STATE:1511021047,ADD_ROUTES,,,
  157. Sat Nov 18 16:04:07 2017 C:WINDOWSsystem32route.exe ADD 192.168.0.0 MASK 255.255.255.0 10.8.0.9
  158. Sat Nov 18 16:04:07 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  159. Sat Nov 18 16:04:07 2017 Route addition via IPAPI succeeded [adaptive]
  160. Sat Nov 18 16:04:07 2017 C:WINDOWSsystem32route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.9
  161. Sat Nov 18 16:04:07 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  162. Sat Nov 18 16:04:07 2017 Route addition via IPAPI succeeded [adaptive]
  163. Sat Nov 18 16:04:07 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  164. Sat Nov 18 16:04:07 2017 Initialization Sequence Completed
  165. Sat Nov 18 16:04:07 2017 MANAGEMENT: >STATE:1511021047,CONNECTED,SUCCESS,10.8.0.10,52.15.62.13
  166. Sat Nov 18 16:05:38 2017 C:WINDOWSsystem32route.exe DELETE 10.8.0.0 MASK 255.255.255.0 10.8.0.9
  167. Sat Nov 18 16:05:38 2017 Route deletion via IPAPI succeeded [adaptive]
  168. Sat Nov 18 16:05:38 2017 C:WINDOWSsystem32route.exe DELETE 192.168.0.0 MASK 255.255.255.0 10.8.0.9
  169. Sat Nov 18 16:05:38 2017 Route deletion via IPAPI succeeded [adaptive]
  170. Sat Nov 18 16:05:38 2017 C:WINDOWSsystem32route.exe DELETE 52.15.62.13 MASK 255.255.255.255 192.168.0.1
  171. Sat Nov 18 16:05:38 2017 Route deletion via IPAPI succeeded [adaptive]
  172. Sat Nov 18 16:05:38 2017 C:WINDOWSsystem32route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.9
  173. Sat Nov 18 16:05:38 2017 Route deletion via IPAPI succeeded [adaptive]
  174. Sat Nov 18 16:05:38 2017 C:WINDOWSsystem32route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.9
  175. Sat Nov 18 16:05:38 2017 Route deletion via IPAPI succeeded [adaptive]
  176. Sat Nov 18 16:05:38 2017 Closing TUN/TAP interface
  177. Sat Nov 18 16:05:38 2017 SIGTERM[hard,] received, process exiting
  178. Sat Nov 18 16:05:38 2017 MANAGEMENT: >STATE:1511021138,EXITING,SIGTERM,,
  179.  
  180. IPv4 Route Table
  181. ===========================================================================
  182. Active Routes:
  183. Network Destination Netmask Gateway Interface Metric
  184. 0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.46 25
  185. 10.8.0.0 255.255.255.0 10.8.0.2 10.8.0.1 35
  186. 10.8.0.0 255.255.255.252 On-link 10.8.0.1 291
  187. 10.8.0.1 255.255.255.255 On-link 10.8.0.1 291
  188. 10.8.0.3 255.255.255.255 On-link 10.8.0.1 291
  189. 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
  190. 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
  191. 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
  192. 192.168.0.0 255.255.255.0 On-link 192.168.0.46 281
  193. 192.168.0.46 255.255.255.255 On-link 192.168.0.46 281
  194. 192.168.0.255 255.255.255.255 On-link 192.168.0.46 281
  195. 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
  196. 224.0.0.0 240.0.0.0 On-link 192.168.0.46 281
  197. 224.0.0.0 240.0.0.0 On-link 10.8.0.1 291
  198. 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
  199. 255.255.255.255 255.255.255.255 On-link 192.168.0.46 281
  200. 255.255.255.255 255.255.255.255 On-link 10.8.0.1 291
  201. ===========================================================================
  202. Persistent Routes:
  203. None
  204.  
  205. IPv4 Route Table
  206. ===========================================================================
  207. Active Routes:
  208. Network Destination Netmask Gateway Interface Metric
  209. 0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.25 55
  210. 0.0.0.0 128.0.0.0 10.8.0.9 10.8.0.10 35
  211. 10.8.0.0 255.255.255.0 10.8.0.9 10.8.0.10 35
  212. 10.8.0.8 255.255.255.252 On-link 10.8.0.10 291
  213. 10.8.0.10 255.255.255.255 On-link 10.8.0.10 291
  214. 10.8.0.11 255.255.255.255 On-link 10.8.0.10 291
  215. 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
  216. 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
  217. 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
  218. 128.0.0.0 128.0.0.0 10.8.0.9 10.8.0.10 35
  219. 192.168.0.0 255.255.255.0 On-link 192.168.0.25 311
  220. 192.168.0.0 255.255.255.0 10.8.0.9 10.8.0.10 35
  221. 192.168.0.25 255.255.255.255 On-link 192.168.0.25 311
  222. 192.168.0.255 255.255.255.255 On-link 192.168.0.25 311
  223. 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
  224. 224.0.0.0 240.0.0.0 On-link 192.168.0.25 311
  225. 224.0.0.0 240.0.0.0 On-link 10.8.0.10 291
  226. 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
  227. 255.255.255.255 255.255.255.255 On-link 192.168.0.25 311
  228. 255.255.255.255 255.255.255.255 On-link 10.8.0.10 291
  229. ===========================================================================
  230. Persistent Routes:
  231. None
Add Comment
Please, Sign In to add comment