XG SOPPS 550 VPN SUPPORT USERS UNABLE TO CONNECT TO REMOTE VPN
08:22:57 2022 UDPv4 link remote: [AF_INET][login to view URL]
Sat May 14 08:22:57 2022 MANAGEMENT: >STATE:1652512977,WAIT,,,,,,
Sat May 14 08:23:57 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat May 14 08:23:57 2022 TLS Error: TLS handshake failed
Sat May 14 08:23:57 2022 SIGUSR1[soft,tls-error] received, process restarting
Sat May 14 08:23:57 2022 MANAGEMENT: >STATE:1652513037,RECONNECTING,tls-error,,,,,
Sat May 14 08:23:57 2022 Restart pause, 2 second(s)
Sat May 14 08:23:59 2022 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat May 14 08:23:59 2022 UDPv4 link local: [undef]
Sat May 14 08:23:59 2022 UDPv4 link remote: [AF_INET][login to view URL]
Sat May 14 08:23:59 2022 MANAGEMENT: >STATE:1652513039,WAIT,,,,,,
Sat May 14 08:24:59 2022 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat May 14 08:24:59 2022 TLS Error: TLS handshake failed
Sat May 14 08:24:59 2022 SIGUSR1[soft,tls-error] received, process restarting
Sat May 14 08:24:59 2022 MANAGEMENT: >STATE:1652513099,RECONNECTING,tls-error,,,,,
Sat May 14 08:24:59 2022 Restart pause, 2 second(s)
Sat May 14 08:25:01 2022 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat May 14 08:25:01 2022 UDPv4 link local: [undef]
Sat May 14 08:25:01 2022 UDPv4 link remote: [AF_INET][login to view URL]
Sat May 14 08:25:01 2022 MANAGEMENT: >STATE:1652513101,WAIT,,,,,,
Sat May 14 08:25:01 2022 MANAGEMENT: >STATE:1652513101,AUTH,,,,,,
Sat May 14 08:25:01 2022 TLS: Initial packet from [AF_INET][login to view URL], sid=1350e6c3 d856a8f0
Sat May 14 08:25:01 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat May 14 08:25:02 2022 VERIFY OK: depth=2, C=US, O=DigiCert Inc, OU=[login to view URL], CN=DigiCert Global Root CA
Sat May 14 08:25:02 2022 VERIFY OK: depth=1, C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1
Sat May 14 08:25:02 2022 VERIFY X509NAME OK: C=CD, L=Kinshasa, O=FINCA RD CONGO SA, CN=*.[login to view URL]
Sat May 14 08:25:02 2022 VERIFY OK: depth=0, C=CD, L=Kinshasa, O=FINCA RD CONGO SA, CN=*.[login to view URL]
Sat May 14 08:25:03 2022 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat May 14 08:25:03 2022 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat May 14 08:25:03 2022 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat May 14 08:25:03 2022 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat May 14 08:25:03 2022 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat May 14 08:25:03 2022 [*.[login to view URL]] Peer Connection Initiated with [AF_INET][login to view URL]
Sat May 14 08:25:04 2022 MANAGEMENT: >STATE:1652513104,GET_CONFIG,,,,,,
Sat May 14 08:25:05 2022 SENT CONTROL [*.[login to view URL]]: 'PUSH_REQUEST' (status=1)
Sat May 14 08:25:06 2022 AUTH: Received control message: AUTH_FAILED
Sat May 14 08:25:06 2022 SIGUSR1[soft,auth-failure] received, process restarting
Sat May 14 08:25:06 2022 MANAGEMENT: >STATE:1652513106,RECONNECTING,auth-failure,,,,,
Sat May 14 08:25:06 2022 Restart pause, 2 second(s)