Probleme de connexion apres connexion au serveur !

Bonjour
alors voila j'arrive a me connecté au serveur frozenway mais apres je perd la connexion ,c'est a dire que je ne peux navigué ou quoi que ce soit , je vous met le journal :
FrozenWay version 1.6.6
----------------------------------
Server: public-01-fr-01
Proxy: 172.18.4.153:3128
Protocol: HTTPS
----------------------------------
Mon May 01 09:49:23 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
Mon May 01 09:49:23 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08

Mon May 01 09:49:24 2017 Control Channel Authentication: using 'C:/Users/pat/Downloads/FrozenWay 1.6.6/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
Mon May 01 09:49:24 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 01 09:49:24 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 01 09:49:24 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon May 01 09:49:24 2017 Attempting to establish TCP connection with [AF_INET]127.0.0.1:54093 [nonblock]
Mon May 01 09:49:24 2017 TCP connection established with [AF_INET]127.0.0.1:54093
Mon May 01 09:49:24 2017 TCPv4_CLIENT link local: [undef]
Mon May 01 09:49:24 2017 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:54093

Mon May 01 09:49:24 2017 TLS: Initial packet from [AF_INET]127.0.0.1:54093, sid=6dbc3b87 2581df59
Mon May 01 09:49:24 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 01 09:49:24 2017 VERIFY OK: nsCertType=SERVER
Mon May 01 09:49:24 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

Mon May 01 09:49:24 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 01 09:49:24 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 01 09:49:24 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 01 09:49:24 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 01 09:49:24 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon May 01 09:49:24 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:54093

Mon May 01 09:49:27 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon May 01 09:49:27 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.13.0.1,dhcp-option WINS 10.13.0.1,route 10.13.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.13.15.74 10.13.15.73'
Mon May 01 09:49:27 2017 OPTIONS IMPORT: --socket-flags option modified
Mon May 01 09:49:27 2017 OPTIONS IMPORT: --ifconfig/up options modified
Mon May 01 09:49:27 2017 OPTIONS IMPORT: route options modified
Mon May 01 09:49:27 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon May 01 09:49:27 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon May 01 09:49:27 2017 open_tun, tt->ipv6=0

Mon May 01 09:49:27 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{50359FD7-3802-49C3-A01C-817BCEBFBCCF}.tap
Mon May 01 09:49:27 2017 TAP-Windows Driver Version 9.21
Mon May 01 09:49:27 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.13.15.74/255.255.255.252 on interface {50359FD7-3802-49C3-A01C-817BCEBFBCCF} [DHCP-serv: 10.13.15.73, lease-time: 31536000]
Mon May 01 09:49:27 2017 Successful ARP Flush on interface [47] {50359FD7-3802-49C3-A01C-817BCEBFBCCF}

Mon May 01 09:49:32 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon May 01 09:49:32 2017 C:\WINDOWS\system32\route.exe ADD 10.13.0.1 MASK 255.255.255.255 10.13.15.73
Mon May 01 09:49:32 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Mon May 01 09:49:32 2017 Route addition via IPAPI succeeded [adaptive]
Mon May 01 09:49:32 2017 Initialization Sequence Completed

IPv4 routing table :
0.0.0.0 0.0.0.0 172.18.17.254 172.18.17.33 35
0.0.0.0 128.0.0.0 10.13.15.73 10.13.15.74 35
10.13.0.1 255.255.255.255 10.13.15.73 10.13.15.74 35
10.13.15.72 255.255.255.252 10.13.15.74 10.13.15.74 291
10.13.15.74 255.255.255.255 10.13.15.74 10.13.15.74 291
10.13.15.75 255.255.255.255 10.13.15.74 10.13.15.74 291
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.13.15.73 10.13.15.74 35
172.18.4.153 255.255.255.255 172.18.17.254 172.18.17.33 35
172.18.17.0 255.255.255.0 172.18.17.33 172.18.17.33 291
172.18.17.33 255.255.255.255 172.18.17.33 172.18.17.33 291
172.18.17.255 255.255.255.255 172.18.17.33 172.18.17.33 291
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 172.18.17.33 172.18.17.33 291
224.0.0.0 240.0.0.0 10.13.15.74 10.13.15.74 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 172.18.17.33 172.18.17.33 291
255.255.255.255 255.255.255.255 10.13.15.74 10.13.15.74 291
Mon May 01 09:50:15 2017 C:\WINDOWS\system32\route.exe DELETE 10.13.0.1 MASK 255.255.255.255 10.13.15.73

Mon May 01 09:50:15 2017 Route deletion via IPAPI succeeded [adaptive]
Mon May 01 09:50:15 2017 Closing TUN/TAP interface
Mon May 01 09:50:15 2017 SIGTERM[hard,] received,

Réponses

  • FrozenWay déconnecté, ouvre l'invite de commande Windows en tant qu'admin et tape la commande suivante : route add 172.18.4.153 mask 255.255.255.255 172.18.17.254 et réessaye de te connecter.
  • mai 2017 modifié
    pareil :

    FrozenWay version 1.6.6
    ----------------------------------
    Server: premium-03-fr-01
    Protocol: OpenVPN
    ----------------------------------
    Sun May 21 13:27:27 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
    Sun May 21 13:27:27 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08

    Sun May 21 13:27:28 2017 Control Channel Authentication: using 'C:/Users/petit/Desktop/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
    Sun May 21 13:27:28 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:27:28 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:27:28 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Sun May 21 13:27:28 2017 Attempting to establish TCP connection with [AF_INET]212.129.54.114:443 [nonblock]

    Sun May 21 13:27:29 2017 TCP connection established with [AF_INET]212.129.54.114:443
    Sun May 21 13:27:29 2017 TCPv4_CLIENT link local: [undef]
    Sun May 21 13:27:29 2017 TCPv4_CLIENT link remote: [AF_INET]212.129.54.114:443
    Sun May 21 13:27:29 2017 TLS: Initial packet from [AF_INET]212.129.54.114:443, sid=898857e6 7dbc0065

    Sun May 21 13:27:29 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sun May 21 13:27:29 2017 VERIFY OK: nsCertType=SERVER
    Sun May 21 13:27:29 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sun May 21 13:27:29 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sun May 21 13:27:29 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:27:29 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sun May 21 13:27:29 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:27:29 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Sun May 21 13:27:29 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]212.129.54.114:443

    Sun May 21 13:27:32 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Sun May 21 13:27:32 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.6.222 10.1.6.221'
    Sun May 21 13:27:32 2017 OPTIONS IMPORT: --socket-flags option modified
    Sun May 21 13:27:32 2017 OPTIONS IMPORT: --ifconfig/up options modified
    Sun May 21 13:27:32 2017 OPTIONS IMPORT: route options modified
    Sun May 21 13:27:32 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sun May 21 13:27:32 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sun May 21 13:27:32 2017 open_tun, tt->ipv6=0
    Sun May 21 13:27:32 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{92AF5291-4FF2-4D3C-87AF-A7674556DC50}.tap
    Sun May 21 13:27:32 2017 TAP-Windows Driver Version 9.21
    Sun May 21 13:27:32 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.6.222/255.255.255.252 on interface {92AF5291-4FF2-4D3C-87AF-A7674556DC50} [DHCP-serv: 10.1.6.221, lease-time: 31536000]
    Sun May 21 13:27:32 2017 Successful ARP Flush on interface [12] {92AF5291-4FF2-4D3C-87AF-A7674556DC50}

    Sun May 21 13:27:37 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Sun May 21 13:27:37 2017 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.6.221
    Sun May 21 13:27:37 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
    Sun May 21 13:27:37 2017 Route addition via IPAPI succeeded [adaptive]
    Sun May 21 13:27:37 2017 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.67 50
    0.0.0.0 128.0.0.0 10.1.6.221 10.1.6.222 35
    10.1.0.1 255.255.255.255 10.1.6.221 10.1.6.222 35
    10.1.6.220 255.255.255.252 10.1.6.222 10.1.6.222 291
    10.1.6.222 255.255.255.255 10.1.6.222 10.1.6.222 291
    10.1.6.223 255.255.255.255 10.1.6.222 10.1.6.222 291
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
    128.0.0.0 128.0.0.0 10.1.6.221 10.1.6.222 35
    192.168.2.0 255.255.255.0 192.168.2.67 192.168.2.67 306
    192.168.2.67 255.255.255.255 192.168.2.67 192.168.2.67 306
    192.168.2.255 255.255.255.255 192.168.2.67 192.168.2.67 306
    212.129.54.114 255.255.255.255 192.168.2.1 192.168.2.67 50
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
    224.0.0.0 240.0.0.0 10.1.6.222 10.1.6.222 291
    224.0.0.0 240.0.0.0 192.168.2.67 192.168.2.67 306
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
    255.255.255.255 255.255.255.255 10.1.6.222 10.1.6.222 291
    255.255.255.255 255.255.255.255 192.168.2.67 192.168.2.67 306
    Sun May 21 13:30:07 2017 Connection reset, restarting [0]
    Sun May 21 13:30:07 2017 SIGUSR1[soft,connection-reset] received, process restarting
    Sun May 21 13:30:07 2017 Restart pause, 1 second(s)

    Sun May 21 13:30:08 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Sun May 21 13:30:08 2017 Attempting to establish TCP connection with [AF_INET]212.129.54.114:443 [nonblock]

    Sun May 21 13:30:09 2017 TCP connection established with [AF_INET]212.129.54.114:443
    Sun May 21 13:30:09 2017 TCPv4_CLIENT link local: [undef]
    Sun May 21 13:30:09 2017 TCPv4_CLIENT link remote: [AF_INET]212.129.54.114:443
    Sun May 21 13:30:09 2017 TLS: Initial packet from [AF_INET]212.129.54.114:443, sid=332a9570 1ac895e2

    Sun May 21 13:30:09 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sun May 21 13:30:09 2017 VERIFY OK: nsCertType=SERVER
    Sun May 21 13:30:09 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sun May 21 13:30:09 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sun May 21 13:30:09 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:30:09 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sun May 21 13:30:09 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:30:09 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Sun May 21 13:30:09 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]212.129.54.114:443

    Sun May 21 13:30:11 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Sun May 21 13:30:11 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.6.222 10.1.6.221'
    Sun May 21 13:30:11 2017 OPTIONS IMPORT: --socket-flags option modified
    Sun May 21 13:30:11 2017 OPTIONS IMPORT: --ifconfig/up options modified
    Sun May 21 13:30:11 2017 OPTIONS IMPORT: route options modified
    Sun May 21 13:30:11 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sun May 21 13:30:11 2017 Preserving previous TUN/TAP instance: FrozenWay
    Sun May 21 13:30:11 2017 Initialization Sequence Completed



    Je vais donc essayer de taper votre code dans la console


  • J ai essayer la phrase dans la console mais toujours pareil. Ca marche deux secondes et ca coupe




    FrozenWay version 1.6.6
    ----------------------------------
    Server: premium-03-fr-01
    Protocol: OpenVPN
    ----------------------------------
    Sun May 21 13:43:00 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
    Sun May 21 13:43:00 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08

    Sun May 21 13:43:00 2017 Control Channel Authentication: using 'C:/Users/petit/Desktop/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
    Sun May 21 13:43:00 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:43:00 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:43:00 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Sun May 21 13:43:00 2017 Attempting to establish TCP connection with [AF_INET]212.129.54.114:443 [nonblock]

    Sun May 21 13:43:01 2017 TCP connection established with [AF_INET]212.129.54.114:443
    Sun May 21 13:43:01 2017 TCPv4_CLIENT link local: [undef]
    Sun May 21 13:43:01 2017 TCPv4_CLIENT link remote: [AF_INET]212.129.54.114:443
    Sun May 21 13:43:01 2017 TLS: Initial packet from [AF_INET]212.129.54.114:443, sid=cf88242f be986d05

    Sun May 21 13:43:01 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sun May 21 13:43:01 2017 VERIFY OK: nsCertType=SERVER
    Sun May 21 13:43:01 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sun May 21 13:43:01 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sun May 21 13:43:01 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:43:01 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sun May 21 13:43:01 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sun May 21 13:43:01 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Sun May 21 13:43:01 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]212.129.54.114:443

    Sun May 21 13:43:03 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Sun May 21 13:43:03 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.6.222 10.1.6.221'
    Sun May 21 13:43:03 2017 OPTIONS IMPORT: --socket-flags option modified
    Sun May 21 13:43:03 2017 OPTIONS IMPORT: --ifconfig/up options modified
    Sun May 21 13:43:03 2017 OPTIONS IMPORT: route options modified
    Sun May 21 13:43:03 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sun May 21 13:43:03 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sun May 21 13:43:03 2017 open_tun, tt->ipv6=0
    Sun May 21 13:43:03 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{92AF5291-4FF2-4D3C-87AF-A7674556DC50}.tap
    Sun May 21 13:43:03 2017 TAP-Windows Driver Version 9.21
    Sun May 21 13:43:03 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.6.222/255.255.255.252 on interface {92AF5291-4FF2-4D3C-87AF-A7674556DC50} [DHCP-serv: 10.1.6.221, lease-time: 31536000]
    Sun May 21 13:43:03 2017 Successful ARP Flush on interface [12] {92AF5291-4FF2-4D3C-87AF-A7674556DC50}

    Sun May 21 13:43:08 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Sun May 21 13:43:08 2017 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.6.221
    Sun May 21 13:43:08 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
    Sun May 21 13:43:08 2017 Route addition via IPAPI succeeded [adaptive]
    Sun May 21 13:43:08 2017 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.2.1 192.168.2.67 50
    0.0.0.0 128.0.0.0 10.1.6.221 10.1.6.222 35
    10.1.0.1 255.255.255.255 10.1.6.221 10.1.6.222 35
    10.1.6.220 255.255.255.252 10.1.6.222 10.1.6.222 291
    10.1.6.222 255.255.255.255 10.1.6.222 10.1.6.222 291
    10.1.6.223 255.255.255.255 10.1.6.222 10.1.6.222 291
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
    128.0.0.0 128.0.0.0 10.1.6.221 10.1.6.222 35
    172.18.4.153 255.255.255.255 172.18.17.254 192.168.2.67 51
    192.168.2.0 255.255.255.0 192.168.2.67 192.168.2.67 306
    192.168.2.67 255.255.255.255 192.168.2.67 192.168.2.67 306
    192.168.2.255 255.255.255.255 192.168.2.67 192.168.2.67 306
    212.129.54.114 255.255.255.255 192.168.2.1 192.168.2.67 50
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
    224.0.0.0 240.0.0.0 10.1.6.222 10.1.6.222 291
    224.0.0.0 240.0.0.0 192.168.2.67 192.168.2.67 306
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
    255.255.255.255 255.255.255.255 10.1.6.222 10.1.6.222 291
    255.255.255.255 255.255.255.255 192.168.2.67 192.168.2.67 306
    Sun May 21 13:47:08 2017 C:\WINDOWS\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.6.221
    Sun May 21 13:47:08 2017 Route deletion via IPAPI succeeded [adaptive]
    Sun May 21 13:47:08 2017 Closing TUN/TAP interface
    Sun May 21 13:47:08 2017 SIGTERM[hard,] received, process exiting

Connectez-vous ou Inscrivez-vous pour répondre.