eCatcher fails to create routes after upgrading to 7.0.0

Hi,
I upgraded eCatcher from 6.10 to 7.0.0, and after this I can no longer ping anything on the LAN side. I cannot reach the eWON either with LAN or WAN ip from the VPN.

The VPN says it’s connected and all.
I then tried uninstalling eCatcher completely, rebooted computer, installed 6.10 again, but it fails to connect in 6.10 as well. I have now uninstalled 6.10 once again, and reinstalled 7.0.0 but I still cannot reach any devices.

I have no warnings or errors in eCatcher, and no network interfaces with the same IP. It worked fine with 6.10 before the first upgrade.

I can connect to the same eWON devices, with 7.0.0, on another computer.

OS is Windows 10 Pro, 22H2, OS version 19045.3570.

image

BR Daniel

Hi Daniel,

Can you ping the Ewon’s VPN IP (starting 10.29.X.X in your screenshot)?

Have you rebooted since reinstalling the new version of Ecatcher?

As a heads up, this forum will be archived tomorrow as we transition to its replacement. You can read more here: New HMS Forum!

Here are the logs, there is an error message “Unable to change broadcast route to metric 280: Invalid parameter during reset of broadcast route.” in the log.

2023-10-31 08:23:08.013[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,MANAGEMENT: >STATE:1698736988,GET_CONFIG,
2023-10-31 08:23:08.013[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >STATE:1698736988,GET_CONFIG,
2023-10-31 08:23:08.013[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,SENT CONTROL [server-client]: ‘PUSH_REQUEST’ (status=1)
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,PUSH: Received control message: ‘PUSH_REPLY,topology subnet,ping 10,ping-exit 300,ifconfig 10.29.10.200 255.255.0.0,peer-id 46,cipher AES-256-GCM’
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,OPTIONS IMPORT: timers and/or timeouts modified
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,OPTIONS IMPORT: --ifconfig/up options modified
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,OPTIONS IMPORT: peer-id set
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,OPTIONS IMPORT: adjusting link_mtu to 1657
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,OPTIONS IMPORT: data channel crypto options modified
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,Data Channel: using negotiated cipher ‘AES-256-GCM’
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,interactive service msg_channel=0
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,open_tun
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,tap-windows6 device [Talk2m-eCatcher] opened
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,TAP-Windows Driver Version 9.21
2023-10-31 08:23:08.044[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,Successful ARP Flush on interface [18] {527553B3-2CC2-44AD-8F9A-0BD0CBD09127}
2023-10-31 08:23:08.100[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,MANAGEMENT: >STATE:1698736988,ASSIGN_IP,10.29.10.200,
2023-10-31 08:23:08.100[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >STATE:1698736988,ASSIGN_IP,10.29.10.200,
2023-10-31 08:23:08.100[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,NETSH: C:\windows\system32\netsh.exe interface ip set address 18 static 10.29.10.200 255.255.0.0
2023-10-31 08:23:08.147[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,NETSH: C:\windows\system32\netsh.exe interface ip delete dns 18 all
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,NETSH: C:\windows\system32\netsh.exe interface ip delete wins 18 all
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,IPv4 MTU set to 1500 on interface 18 using SetIpInterfaceEntry()
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,I,Initialization Sequence Completed
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >LOG:1698736988,MANAGEMENT: >STATE:1698736988,CONNECTED,SUCCESS,10.29.10.200,159.8.202.192,1194,
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - Management Interface R: >STATE:1698736988,CONNECTED,SUCCESS,10.29.10.200,159.8.202.192,1194,
2023-10-31 08:23:08.181[INFO][openvpn-007DAAA0] OpenVpnManager - CONNECTED
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - Interface found for [10.29.10.200(3356105994)] : 11
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - interface name :{527553B3-2CC2-44AD-8F9A-0BD0CBD09127}
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - address :10.29.10.200
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - netMask :255.255.0.0
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - broadcast address :10.29.255.255
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] broadcast - udp socket creation to brodcast on 10.29.255.255 port 1234
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - tunnelBroadcaster created !
2023-10-31 08:23:08.181[DEBUG][openvpn-007DAAA0] OpenVpnManager - packet sent through the tunnel
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] service - telnet Request = route add 192.168.0.0 255.255.255.0 10.29.178.228 30
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] default - Looking for adapter Talk2m-eCatcher
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] route - Found adapter: {527553B3-2CC2-44AD-8F9A-0BD0CBD09127} ( 0080C77A )
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] default - Found adapter at 18
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] service - telnet Response = SUCCESS | RT1 | 20231031T07:23:09 | Ewon LAN devices network added. (code 1)
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] service - telnet Request = route broadcast on 10.29.178.228
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] default - Looking for adapter Talk2m-eCatcher
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] route - Found adapter: {527553B3-2CC2-44AD-8F9A-0BD0CBD09127} ( 0080C77A )
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] default - Found adapter at 18
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] route - set metric for broadcast route to 280 (=0(vpn interface) + 281 (lowest broadcat metric) -1)
2023-10-31 08:23:09.181[ERROR][telnet-007DAD20] route - Unable to change broadcast route to metric 280: Invalid parameter during reset of broadcast route.
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] service - telnet Response = OK
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] service - telnet Request = route postconnect
2023-10-31 08:23:09.181[DEBUG][telnet-007DAD20] default - Looking for adapter Talk2m-eCatcher
2023-10-31 08:23:09.197[DEBUG][telnet-007DAD20] route - Found adapter: {527553B3-2CC2-44AD-8F9A-0BD0CBD09127} ( 0080C77A )
2023-10-31 08:23:09.197[DEBUG][telnet-007DAD20] default - Found adapter at 18
2023-10-31 08:23:09.197[DEBUG][telnet-007DAD20] default - Found adapter at 18
2023-10-31 08:23:09.197[DEBUG][telnet-007DAD20] default - flush response: 0
2023-10-31 08:23:09.197[DEBUG][telnet-007DAD20] service - telnet Response = SUCCESS | RT1 | 20231031T07:23:09 | post connect arp cleanup done (code 1)

Hi,

No I cannot ping that either.
I tried uninstalling first the driver using the deltapall.bat (as admin), then uninstalled eCatcher, then deleted the ecatcher directory in Program Files (x86). Then rebooted. Reinstalled eCatcher. Rebooted again. But it still does not work.

BR Daniel

Hi Daniel,

Can you go ahead and submit a ticket at https://support.hms-networks.com/ so we can take a closer look at this and possibly escalate it to the developers? You’ve done a thorough job troubleshooting already, and given the same device can be reached from another computer, it’s not clear where this issue is coming from.

Hi all,

With help from HMS support, the problem was solved. This is what I did:

  1. In eCatcher TAP disable all features excepted the IPV4, reboot the PC

  2. Disable all taps excepted the eCatcher TAP and the TAP uses to give internet access, and reboot the PC

  3. Check if it’s working, and after enable one by one of the other TAPs until you identifies the one which give the issue.

1 Like