FrozenWay se connecte correctement d'après le journal. Le problème peut venir du fait que votre réseau et le réseau FrozenWay sont sur le même sous-réseau. Une fois connecté, allez sur http://www.monip.org et donnez l'adresse IP qui apparaît svp. Et essayez de décocher la case "Augmenter la métrique de la passerelle par défaut" dans les options réseau de FrozenWay.
Réponses
C'est à dire ? Pouvez-vous donner le journal de connexion / message d'erreur svp ?
----------------------------------
Server: public-01-fr-04
Protocol: OpenVPN
----------------------------------
Wed Apr 15 13:38:50 2015 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Wed Apr 15 13:38:50 2015 Control Channel Authentication: using 'C:/Users/misty/AppData/Local/Temp/Rar$EXa0.636/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Wed Apr 15 13:38:50 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 15 13:38:50 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 15 13:38:50 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Apr 15 13:38:50 2015 Attempting to establish TCP connection with [AF_INET]178.33.213.214:443
Wed Apr 15 13:38:51 2015 TCP connection established with [AF_INET]178.33.213.214:443
Wed Apr 15 13:38:51 2015 TCPv4_CLIENT link local: [undef]
Wed Apr 15 13:38:51 2015 TCPv4_CLIENT link remote: [AF_INET]178.33.213.214:443
Wed Apr 15 13:38:51 2015 TLS: Initial packet from [AF_INET]178.33.213.214:443, sid=f56c6ed1 54caacd1
Wed Apr 15 13:38:54 2015 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Apr 15 13:38:54 2015 VERIFY OK: nsCertType=SERVER
Wed Apr 15 13:38:54 2015 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Apr 15 13:38:56 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Apr 15 13:38:56 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 15 13:38:56 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Apr 15 13:38:56 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Apr 15 13:38:56 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Apr 15 13:38:56 2015 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.213.214:443
Wed Apr 15 13:38:58 2015 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Apr 15 13:38:59 2015 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.198 10.6.1.197'
Wed Apr 15 13:38:59 2015 OPTIONS IMPORT: --socket-flags option modified
Wed Apr 15 13:38:59 2015 OPTIONS IMPORT: --ifconfig/up options modified
Wed Apr 15 13:38:59 2015 OPTIONS IMPORT: route options modified
Wed Apr 15 13:38:59 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Apr 15 13:38:59 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Apr 15 13:38:59 2015 open_tun, tt->ipv6=0
Wed Apr 15 13:38:59 2015 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{51EABB8E-8239-4D1C-A5F2-66890B41FEF2}.tap
Wed Apr 15 13:38:59 2015 TAP-Windows Driver Version 9.9
Wed Apr 15 13:38:59 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.198/255.255.255.252 on interface {51EABB8E-8239-4D1C-A5F2-66890B41FEF2} [DHCP-serv: 10.6.1.197, lease-time: 31536000]
Wed Apr 15 13:38:59 2015 Successful ARP Flush on interface [31] {51EABB8E-8239-4D1C-A5F2-66890B41FEF2}
Wed Apr 15 13:39:04 2015 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Apr 15 13:39:04 2015 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.197
Wed Apr 15 13:39:04 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Apr 15 13:39:04 2015 Route addition via IPAPI succeeded [adaptive]
Wed Apr 15 13:39:04 2015 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.7.255.254 10.2.204.97 9999
0.0.0.0 0.0.0.0 10.6.1.197 10.6.1.198 30
10.0.0.0 255.248.0.0 10.2.204.97 10.2.204.97 281
10.2.204.97 255.255.255.255 10.2.204.97 10.2.204.97 281
10.6.0.1 255.255.255.255 10.6.1.197 10.6.1.198 30
10.6.1.196 255.255.255.252 10.6.1.198 10.6.1.198 286
10.6.1.198 255.255.255.255 10.6.1.198 10.6.1.198 286
10.6.1.199 255.255.255.255 10.6.1.198 10.6.1.198 286
10.7.255.255 255.255.255.255 10.2.204.97 10.2.204.97 281
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
178.33.213.214 255.255.255.255 10.7.255.254 10.2.204.97 25
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 10.2.204.97 10.2.204.97 281
224.0.0.0 240.0.0.0 10.6.1.198 10.6.1.198 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 10.2.204.97 10.2.204.97 281
255.255.255.255 255.255.255.255 10.6.1.198 10.6.1.198 286
Wed Apr 15 13:40:24 2015 C:\Windows\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.197
Wed Apr 15 13:40:24 2015 Route deletion via IPAPI succeeded [adaptive]
Wed Apr 15 13:40:24 2015 Closing TUN/TAP interface
Wed Apr 15 13:40:24 2015 SIGTERM[hard,] received, process exiting