Déconnection de voobly apres 10 min

novembre 2013 modifié dans Support technique
salut voila dons 1à jours que j'utilise Frozenway pour jouer a AGE OF CONQUERORS sur voobly , le probleme en fait c'est que apres disons 10 min de jeux la connection de mon compte voobly se coupe et je me retrouve bloqué dans une partie c'est tres chiant , meme quand je joue pas je laisse mon compte Voobly ouvert et up il se deconnecte tous seul , y a une solution pour ça ou nn merci

Réponses

  • voici le journal de la connection
    FrozenWay version 1.6.5
    ----------------------------------
    Server: public-01-fr-01
    Protocol: OpenVPN
    ----------------------------------
    Sat Nov 30 13:37:15 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Sat Nov 30 13:37:15 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Sat Nov 30 13:37:16 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 30 13:37:16 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

    Sat Nov 30 13:37:16 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Sat Nov 30 13:37:16 2013 Attempting to establish TCP connection with [AF_INET]178.33.255.49:443
    Sat Nov 30 13:37:16 2013 TCP connection established with [AF_INET]178.33.255.49:443
    Sat Nov 30 13:37:16 2013 TCPv4_CLIENT link local: [undef]
    Sat Nov 30 13:37:16 2013 TCPv4_CLIENT link remote: [AF_INET]178.33.255.49:443
    Sat Nov 30 13:37:16 2013 TLS: Initial packet from [AF_INET]178.33.255.49:443, sid=de94cc6b a908731d

    Sat Nov 30 13:37:16 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sat Nov 30 13:37:16 2013 VERIFY OK: nsCertType=SERVER
    Sat Nov 30 13:37:16 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sat Nov 30 13:37:16 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Nov 30 13:37:16 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 30 13:37:16 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Nov 30 13:37:16 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 30 13:37:16 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Sat Nov 30 13:37:16 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.255.49:443

    Sat Nov 30 13:37:18 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Sat Nov 30 13:37:18 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.30.162 10.1.30.161'
    Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: --socket-flags option modified
    Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: --ifconfig/up options modified
    Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: route options modified
    Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sat Nov 30 13:37:18 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sat Nov 30 13:37:18 2013 open_tun, tt->ipv6=0
  • Salut,

    Peux tu donner le journal de connexion complet après une 30e de minute connecté à FrozenWay ?
  • salut,
    je suis désolé pour la réponse tardive ,
    en fait en plus du problème décrit dans le message précédant , ( deconnection du compte voobly tous seul) il y a un autre problème.
    c'est que une fois connecter a voobly et quand je veux rentrer au salon là ou je vais choisir une partie il y a un message qui s'affiche ( impossible de se connecter au salon problème de firewall .
    voila le de journal de connexion apres 30 min connecté a FrozenWay comme tu m'a demandé . j'esepere que tu pourras résoudre ce probleme car j'ai trop envie de faire quelques partie.
    FrozenWay version 1.6.5
    ----------------------------------
    Server: public-01-fr-01
    Protocol: OpenVPN
    ----------------------------------
    Fri Dec 06 17:41:52 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Fri Dec 06 17:41:52 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file

    Fri Dec 06 17:41:52 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Fri Dec 06 17:41:52 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Fri Dec 06 17:41:52 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Fri Dec 06 17:41:52 2013 Attempting to establish TCP connection with [AF_INET]178.33.255.49:443
    Fri Dec 06 17:41:52 2013 TCP connection established with [AF_INET]178.33.255.49:443
    Fri Dec 06 17:41:52 2013 TCPv4_CLIENT link local: [undef]
    Fri Dec 06 17:41:52 2013 TCPv4_CLIENT link remote: [AF_INET]178.33.255.49:443
    Fri Dec 06 17:41:53 2013 TLS: Initial packet from [AF_INET]178.33.255.49:443, sid=99475350 a971d3e4

    Fri Dec 06 17:41:53 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Fri Dec 06 17:41:53 2013 VERIFY OK: nsCertType=SERVER
    Fri Dec 06 17:41:53 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Fri Dec 06 17:41:53 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Fri Dec 06 17:41:53 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Fri Dec 06 17:41:53 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Fri Dec 06 17:41:53 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Fri Dec 06 17:41:53 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Fri Dec 06 17:41:53 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.255.49:443

    Fri Dec 06 17:41:55 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Fri Dec 06 17:41:56 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.27.106 10.1.27.105'
    Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: --socket-flags option modified
    Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: --ifconfig/up options modified
    Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: route options modified
    Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Fri Dec 06 17:41:56 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Fri Dec 06 17:41:56 2013 open_tun, tt->ipv6=0
    Fri Dec 06 17:41:56 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}.tap

    Fri Dec 06 17:41:56 2013 TAP-Windows Driver Version 9.9
    Fri Dec 06 17:41:56 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.27.106/255.255.255.252 on interface {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613} [DHCP-serv: 10.1.27.105, lease-time: 31536000]
    Fri Dec 06 17:41:56 2013 Successful ARP Flush on interface [3] {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}

    Fri Dec 06 17:42:01 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Fri Dec 06 17:42:01 2013 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.27.105
    Fri Dec 06 17:42:01 2013 Route addition via IPAPI succeeded [adaptive]
    Fri Dec 06 17:42:01 2013 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.109 9999
    0.0.0.0 0.0.0.0 10.1.27.105 10.1.27.106 1
    10.0.0.0 255.0.0.0 10.5.0.109 10.5.0.109 25
    10.1.0.1 255.255.255.255 10.1.27.105 10.1.27.106 1
    10.1.27.104 255.255.255.252 10.1.27.106 10.1.27.106 30
    10.1.27.106 255.255.255.255 127.0.0.1 127.0.0.1 30
    10.5.0.109 255.255.255.255 127.0.0.1 127.0.0.1 25
    10.255.255.255 255.255.255.255 10.1.27.106 10.1.27.106 30
    10.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 25
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    178.33.255.49 255.255.255.255 10.0.0.254 10.5.0.109 1
    224.0.0.0 240.0.0.0 10.1.27.106 10.1.27.106 30
    224.0.0.0 240.0.0.0 10.5.0.109 10.5.0.109 25
    255.255.255.255 255.255.255.255 10.1.27.106 1
    255.255.255.255 255.255.255.255 10.1.27.106 10.1.27.106 1
    255.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 1
  • Dans les options réseau de FrozenWay, décoche la case "Augmenter la métrique de la passerelle par défaut".
  • Bonjour ,
    merci beaucoup mais
    là je viens d'essayer mais ça n'a pas marcher , les deux problèmes décrits avant percistent.
    y'aurais pas d'autres solutions stp
  • voila le journal de connexion
    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-04-fr-04
    Protocol: OpenVPN
    ----------------------------------
    Mon Dec 09 12:57:27 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Mon Dec 09 12:57:28 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Mon Dec 09 12:57:28 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Dec 09 12:57:28 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

    Mon Dec 09 12:57:28 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Mon Dec 09 12:57:28 2013 Attempting to establish TCP connection with [AF_INET]88.190.203.75:443
    Mon Dec 09 12:57:28 2013 TCP connection established with [AF_INET]88.190.203.75:443
    Mon Dec 09 12:57:28 2013 TCPv4_CLIENT link local: [undef]
    Mon Dec 09 12:57:28 2013 TCPv4_CLIENT link remote: [AF_INET]88.190.203.75:443
    Mon Dec 09 12:57:28 2013 TLS: Initial packet from [AF_INET]88.190.203.75:443, sid=dec7266c 966ef6c9

    Mon Dec 09 12:57:28 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Dec 09 12:57:28 2013 VERIFY OK: nsCertType=SERVER
    Mon Dec 09 12:57:28 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Dec 09 12:57:28 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Dec 09 12:57:28 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Dec 09 12:57:28 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Dec 09 12:57:28 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Dec 09 12:57:28 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Dec 09 12:57:28 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.75:443

    Mon Dec 09 12:57:31 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon Dec 09 12:57:31 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.13.110 10.4.13.109'
    Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: --socket-flags option modified
    Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: route options modified
    Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

    Mon Dec 09 12:57:31 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon Dec 09 12:57:31 2013 open_tun, tt->ipv6=0
    Mon Dec 09 12:57:31 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}.tap
    Mon Dec 09 12:57:31 2013 TAP-Windows Driver Version 9.9
    Mon Dec 09 12:57:31 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.110/255.255.255.252 on interface {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613} [DHCP-serv: 10.4.13.109, lease-time: 31536000]
    Mon Dec 09 12:57:31 2013 Successful ARP Flush on interface [3] {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}

    Mon Dec 09 12:57:36 2013 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
    Mon Dec 09 12:57:36 2013 Route: Waiting for TUN/TAP interface to come up...

    Mon Dec 09 12:57:41 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon Dec 09 12:57:41 2013 C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.13.109
    Mon Dec 09 12:57:41 2013 Route addition via IPAPI succeeded [adaptive]
    Mon Dec 09 12:57:41 2013 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.109 9999
    0.0.0.0 0.0.0.0 10.4.13.109 10.4.13.110 1
    10.0.0.0 255.0.0.0 10.5.0.109 10.5.0.109 25
    10.4.0.1 255.255.255.255 10.4.13.109 10.4.13.110 1
    10.4.13.108 255.255.255.252 10.4.13.110 10.4.13.110 30
    10.4.13.110 255.255.255.255 127.0.0.1 127.0.0.1 30
    10.5.0.109 255.255.255.255 127.0.0.1 127.0.0.1 25
    10.255.255.255 255.255.255.255 10.4.13.110 10.4.13.110 30
    10.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 25
    88.190.203.75 255.255.255.255 10.0.0.254 10.5.0.109 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    224.0.0.0 240.0.0.0 10.4.13.110 10.4.13.110 30
    224.0.0.0 240.0.0.0 10.5.0.109 10.5.0.109 25
    255.255.255.255 255.255.255.255 10.4.13.110 1
    255.255.255.255 255.255.255.255 10.4.13.110 10.4.13.110 1
    255.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109
  • Donne le journal avec la case décochée stp.
  • voila merci beaucoup
    FrozenWay version 1.6.5
    ----------------------------------
    Server: public-01-fr-02
    Protocol: OpenVPN
    ----------------------------------
    Mon Dec 09 18:45:56 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Mon Dec 09 18:45:57 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Mon Dec 09 18:45:57 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Dec 09 18:45:57 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

    Mon Dec 09 18:45:57 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Mon Dec 09 18:45:57 2013 Attempting to establish TCP connection with [AF_INET]178.33.213.212:443
    Mon Dec 09 18:45:57 2013 TCP connection established with [AF_INET]178.33.213.212:443
    Mon Dec 09 18:45:57 2013 TCPv4_CLIENT link local: [undef]
    Mon Dec 09 18:45:57 2013 TCPv4_CLIENT link remote: [AF_INET]178.33.213.212:443
    Mon Dec 09 18:45:57 2013 TLS: Initial packet from [AF_INET]178.33.213.212:443, sid=64f2c29a 7cfcae03

    Mon Dec 09 18:45:57 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Dec 09 18:45:57 2013 VERIFY OK: nsCertType=SERVER
    Mon Dec 09 18:45:57 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Dec 09 18:45:57 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Dec 09 18:45:57 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Dec 09 18:45:57 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Dec 09 18:45:57 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Dec 09 18:45:57 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Dec 09 18:45:57 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.213.212:443

    Mon Dec 09 18:46:00 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon Dec 09 18:46:00 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.44.50 10.4.44.49'
    Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: --socket-flags option modified
    Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: route options modified
    Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

    Mon Dec 09 18:46:00 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon Dec 09 18:46:00 2013 open_tun, tt->ipv6=0
    Mon Dec 09 18:46:00 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}.tap
    Mon Dec 09 18:46:00 2013 TAP-Windows Driver Version 9.9
    Mon Dec 09 18:46:00 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.44.50/255.255.255.252 on interface {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613} [DHCP-serv: 10.4.44.49, lease-time: 31536000]
    Mon Dec 09 18:46:00 2013 Successful ARP Flush on interface [3] {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}

    Mon Dec 09 18:46:05 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon Dec 09 18:46:05 2013 C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.44.49

    Mon Dec 09 18:46:05 2013 Route addition via IPAPI succeeded [adaptive]
    Mon Dec 09 18:46:05 2013 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.109 25
    0.0.0.0 128.0.0.0 10.4.44.49 10.4.44.50 1
    10.0.0.0 255.0.0.0 10.5.0.109 10.5.0.109 25
    10.4.0.1 255.255.255.255 10.4.44.49 10.4.44.50 1
    10.4.44.48 255.255.255.252 10.4.44.50 10.4.44.50 30
    10.4.44.50 255.255.255.255 127.0.0.1 127.0.0.1 30
    10.5.0.109 255.255.255.255 127.0.0.1 127.0.0.1 25
    10.255.255.255 255.255.255.255 10.4.44.50 10.4.44.50 30
    10.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 25
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    128.0.0.0 128.0.0.0 10.4.44.49 10.4.44.50 1
    178.33.213.212 255.255.255.255 10.0.0.254 10.5.0.109 1
    224.0.0.0 240.0.0.0 10.4.44.50 10.4.44.50 30
    224.0.0.0 240.0.0.0 10.5.0.109 10.5.0.109 25
    255.255.255.255 255.255.255.255 10.4.44.50 1
    255.255.255.255 255.255.255.255 10.4.44.50 10.4.44.50 1
    255.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 1
    Mon Dec 09 20:39:42 2013 C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.44.49
    Mon Dec 09 20:39:42 2013 Route deletion via IPAPI succeeded [adaptive]
    Mon Dec 09 20:39:42 2013 Closing TUN/TAP interface

    Mon Dec 09 20:39:42 2013 SIGTERM[hard,] received, process exiting
  • As tu une page Web d'authentification que tu dois garder ouverte pour garder ta connexion Internet active sur ton réseau ?

    As tu un message d'erreur de Voobly ? FrozenWay ?

    Peux tu envoyer le résultat de la commande suivante dans l'invite de commande dès que Voobly déconnecte toute seul ?

    route print
  • bonjour il y a une page d'authentification mais je suis pas obliger de la garder ouverte pour garder la connexion active par.
    voila le resultat de route print apres deconnecxion de voobly merci
    Microsoft Windows XP [version 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.

    D:\Documents and Settings\A136783>route print
    ===========================================================================
    Liste d'Interfaces
    0x1 ........................... MS TCP Loopback interface
    0x2 ...00 1b 77 a8 23 6b ...... Intel(R) PRO/Wireless 3945ABG Network Connection
    - McAfee NDIS Intermediate Filter Miniport
    0x3 ...00 ff af 4b b6 6a ...... TAP-Windows Adapter V9 - McAfee NDIS Intermediat
    e Filter Miniport
    0x10005 ...00 1c 23 02 e7 14 ...... Broadcom NetXtreme 57xx Gigabit Controller
    ===========================================================================
    ===========================================================================
    Itinéraires actifs :
    Destination réseau Masque réseau Adr. passerelle Adr. interface Métrique
    0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.54 25
    0.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
    10.0.0.0 255.0.0.0 10.5.0.54 10.5.0.54 25
    10.5.0.1 255.255.255.255 10.5.3.5 10.5.3.6 1
    10.5.0.54 255.255.255.255 127.0.0.1 127.0.0.1 25
    10.5.3.4 255.255.255.252 10.5.3.6 10.5.3.6 30
    10.5.3.6 255.255.255.255 127.0.0.1 127.0.0.1 30
    10.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 25
    10.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 30
    88.190.203.80 255.255.255.255 10.0.0.254 10.5.0.54 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    128.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
    224.0.0.0 240.0.0.0 10.5.0.54 10.5.0.54 25
    224.0.0.0 240.0.0.0 10.5.3.6 10.5.3.6 30
    255.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 1
    255.255.255.255 255.255.255.255 10.5.3.6 10005 1
    255.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 1
    Passerelle par défaut : 10.5.3.5
    ===========================================================================
    Itinéraires persistants :
    Aucun

    D:\Documents and Settings\A136783>
  • voila le meme mais mieux organisé merci
    Microsoft Windows XP [version 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.

    D:\Documents and Settings\A136783>route print
    ===========================================================================
    Liste d'Interfaces
    0x1 ........................... MS TCP Loopback interface
    0x2 ...00 1b 77 a8 23 6b ...... Intel(R) PRO/Wireless 3945ABG Network Connection
    - McAfee NDIS Intermediate Filter Miniport
    0x3 ...00 ff af 4b b6 6a ...... TAP-Windows Adapter V9 - McAfee NDIS Intermediat
    e Filter Miniport
    0x10005 ...00 1c 23 02 e7 14 ...... Broadcom NetXtreme 57xx Gigabit Controller
    ===========================================================================
    ===========================================================================
    Itinéraires actifs :
    Destination réseau Masque réseau Adr. passerelle Adr. interface Métrique
    0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.54 25
    0.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
    10.0.0.0 255.0.0.0 10.5.0.54 10.5.0.54 25
    10.5.0.1 255.255.255.255 10.5.3.5 10.5.3.6 1
    10.5.0.54 255.255.255.255 127.0.0.1 127.0.0.1 25
    10.5.3.4 255.255.255.252 10.5.3.6 10.5.3.6 30
    10.5.3.6 255.255.255.255 127.0.0.1 127.0.0.1 30
    10.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 25
    10.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 30
    88.190.203.80 255.255.255.255 10.0.0.254 10.5.0.54 1
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
    128.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
    224.0.0.0 240.0.0.0 10.5.0.54 10.5.0.54 25
    224.0.0.0 240.0.0.0 10.5.3.6 10.5.3.6 30
    255.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 1
    255.255.255.255 255.255.255.255 10.5.3.6 10005 1
    255.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 1
    Passerelle par défaut : 10.5.3.5
    ===========================================================================
    Itinéraires persistants :
  • Peux tu essayer de désactiver McAfee, ou la partie surveillance du réseau tout du moins ?
Connectez-vous ou Inscrivez-vous pour répondre.