today I solved everything:
I understand that:
1) There is no need to open the ports on the endian Firewall (screenshot 1)
2) To make the vpn work just remove the line:
remote-cert-tls server
The further questions are:
1) We lowered the security level by removing the string:
remote-cert-tls server ?
what should i do?
2) Another waring comes out, which I think is related to compression:
WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2021-04-25 19:44:15 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Seems the error disappears when i delete the line:
“comp-lzo”
but in that case other errors appear:
WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1573', remote='link-mtu 1574'
WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo’
3) Another waring comes out, which I think is related to TLS
WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
but here in the end it is not clear what must be done.
4) Another waring comes out:
Sun Apr 25 19:51:57 2021 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
but here in the end it is not clear what must be done.
5) Another warning comes out:
WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
but here in the end it is not clear what must be done.
in short, the vpn works but there are “warnings” everywhere!
No good…