PrivateRouter.com's VPN Router Knowledgebase:
What shipping carrier do you use to Ship DDWRT Routers?
We ship exclusively with USPS for our domestic and international orders. TorGuard uses USPS because of extremely competitive shipping rates and affordable shipping anywhere in the world. Our goal is to keep shipping costs as low as possible while still providing fast and safe delivery.
Where will you ship a TorGuard flashed DDWRT Router?
TorGuard store ships DDWRT Routers worldwide. Anywhere that USPS will verify shipment, we will send. You can use our online shipping calculator to find out the exact shipping costs for your area.
How fast do you process and ship orders?
We process and ship all orders within 24 to 48 hours after payment is approved (M - F). Once an order is approved and processed, we first setup your DDWRT VPN service settings based on the protocol and VPN provider you've chosen. You will receive a tracking number and shipping confirmation email once your router is dispatched.
Who pays for shipping costs?
Currently we require our clients pay full shipping and customs costs for their pre flashed VPN router. We understand shipping can get pricey depending on your location so we do our best to offer the most affordable rates possible. Check back for free shipping promotions from time to time.
Do I pay tax when purchasing a PrivateRouter?
Yes, depending on your shipping address and location you may be charged Value Added Tax on checkout.
How to setup OpenVPN on DD-WRT using TorGuard Startup Scripts
Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).
note: If you are running more than one router on your network, you need to change the DDWRT router
to a different address, such as 192.168.2.1 to avoid IP conflict.
After logging into the DD-WRT router web interface, please click on the 'Services' tab
.
Click on the 'VPN' tab within the 'Services' tab.
Next, under OpenVPN Server/Daemon click "enable".
This is needed to enable the OpenVPN status page. Click Apply Settings..
Next, access the administration tab >> then select commands.
Download the TorGuard DD-WRT Startup Scripts from the link below:
http://torguard.net/downloads/TorGuardDDWRT.zip
Unzip the startup scripts and select the VPN server you wish to connect to by opening the file with a text editor.
Copy the entire contents of the selected startup script and paste into the commands window as in below.
Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your TorGuard VPN service login.
Click "Save Startup" then reboot your router.
That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....
You can see the current status of OpenVPN under the Log area -
In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.
If you don't see any output in the log you may need to reboot your router, on occasion the status page won’t show your vpn status so its always best to verify your ip over at iplocation.net
Congratulations! Now you are ready to use TorGuard using the OpenVPN protocol to encrypt your entire network and any connected devices using your DD-WRT router! Simply visit myip.tg to confirm that your DD-WRT router is connected to TorGuard . If you have any questions Contact our support team. We're available 24/7/365 and will respond quickly.
There are many reasons why a DD-WRT connection may fail to connect correctly. The most common issues are down to little errors like using the wrong TG Service login username or password and server details, even having the incorrect time and date can impact on the connections.
TROUBLESHOOTING DD-WRT
Here is a checklist of common causes and fixes.
1. Try setting 'Use DNSMasq for DNCP', 'Use DNSMasq for DNS' and 'DHCP-Authoritative' to enabled as well as disabled.
2. Ensure the IP of the DD-WRT router is not conflicting with your main router. If your main router is currently 192.168.1.1 DD-WRT has to be in the same subnet, an example of ithis is: 192.168.1.51
3. Ensure the DD-WRT is connected to any other router from its WAN port.
4. You could also try setting the DD-WRT router to a 'Static' connection from the 'Basic Setup' page.
5. Go to your LAN settings and manually change your IP Address, Subnet Mask and Gateway so its pointing to the DD-WRT router. You may also need to change the DNS servers, if you do not want to use your ISPs DNS you can use Google DNS 8.8.8.8 and 8.8.4.4
6. If you have setup a PPTP connection try adding: mppe required,no40,no56,stateless into the 'Additional PPTP Settings' text area.
7. If you have setup a PPTP connection please ensure the PPTP passthrough is enabled from Security -> VPN Passthrough.
8. Try disabling the firewalls on your routers or modems, these can quite often cause connection issues. Once its determined that a firewall is not causing the problem it can always be re-enabled.
9. MTU settings can quite often cause problems, you could try lowering the MTU settings by adding this command on a new line (below verb 3) on your OpenVPN configuration file: tun-mtu 1100
10. Its very important that your router has the correct time and date.
OPENVPN LOGS:
If you are running an OpenVPN Connection you can create a Log which may enable you to see the problem - so you can open a support ticket and send us the details.
1. Add the following after 'verb 3' in your OpenVPN Config startup script:
log /tmp/openvpn.log
2. Reboot you router, wait for about 5 minutes and then run the following command (Run Command) from the command text area in administration (same place as the OpenVPN config file):
ln -s /tmp/openvpn.log /tmp/www/openvpnlog.html
3. Go to the DD-WRT index page and add: /user/openvpnlog.html to it so it looks something like: http://192.168.x.x/user/openvpnlog.html
## If any problems persist please open a support ticket and we will be able to assist you with Your troubleshooting.
How to Setup WireGuard and TorGuard VPN on a GLI OpenWRT Router
GLI Mini VPN routers are portable powerhouses, perfect for any digital nomad or working professional. GLI routers run on OpenWRT firmware and come with an easy to use web panel that makes setting up OpenVPN or WireGuard very easy.
In this tutorial, we will show how to configure your GL-MT300N, GL-AR300M (Shadow), or GLI GL-AR750 VPN router for use with TorGuard's WireGuard VPN servers. This tutorial will show how to add settings with GLI's custom web panel using the latest firmware. For OpenWRT luci setup instructions please visit this tutorial.
Step 1.)
First login to the TorGuard members area and click Tools then select Enable WireGuard Access.
Step 2.)
Find the WireGuard VPN server location you wish to connect to and select "Enable WireGuard". Then click "Download Config" and save the WireGuard config file.
Step 3.)
Open a web browser and navigate to: 192.168.8.1 to access the GLI admin Panel. Enter your Admin password.
Step 4.)
In the GLI Admin Panel menu select the VPN tab and click WireGuard Client.
Step 5.)
Click the "Add New Profiles" button to add the WireGuard config file that was downloaded.
Step 6.)
Add a Server Name to the connection then click Next.
Step 7.)
Use a text editor to open the WireGuard config file that was downloaded in Step 2. Right click and choose select all, then click copy.
Step 8.)
Back in the GLI Admin panel right click the configuration text area and select paste. Then click the add button to save your new WireGuard VPN profile.
Step 9.)
Click the Connect button to tunnel through the newly added WireGuard VPN server.
Step 10.)
You should now see Upload / Download stats showing that the WireGuard VPN tunnel is connected.
Step 11.)
Open a new browser tab and visit MyIP.tg to verify your IP address matches the VPN IP.
How Setup OpenVPN on DDWRT with HideMyAss VPN
Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).
note: If you are running more than one router on your network, you need to change the DDWRT router
to a different address, such as 192.168.2.1 to avoid IP conflict.
After logging into the DD-WRT router web interface, please click on the 'Services' tab
.
Click on the 'VPN' tab within the 'Services' tab.
Next, under OpenVPN Server/Daemon click "enable".
This is needed to enable the OpenVPN status page. Click Apply Settings..
Next, access the administration tab >> then select commands.
Copy paste the following startup script in the commands box:
#!/bin/sh USERNAME="MyUsername" PASSWORD="MyPassword" # Your HMA_USER_PASSWORD not PPTP password PROTOCOL="udp" # udp / tcp MUST BE lower case # Add - delete - edit servers between ##BB## and ##EE## REMOTE_SERVERS=" ##BB## remote 173.234.157.210 443 ##EE## " #### DO NOT CHANGE below this line #### CA_CRT='-----BEGIN CERTIFICATE----- MIIGVjCCBD6gAwIBAgIJAOmTY3hf1Bb6MA0GCSqGSIb3DQEBCwUAMIGSMQswCQYD VQQGEwJVSzEPMA0GA1UECAwGTG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xEzARBgNV BAoMClByaXZheCBMdGQxFDASBgNVBAsMC0hNQSBQcm8gVlBOMRYwFAYDVQQDDA1o aWRlbXlhc3MuY29tMR4wHAYJKoZIhvcNAQkBFg9pbmZvQHByaXZheC5jb20wHhcN MTYwOTE0MDk0MTUyWhcNMjYwOTEyMDk0MTUyWjCBkjELMAkGA1UEBhMCVUsxDzAN BgNVBAgMBkxvbmRvbjEPMA0GA1UEBwwGTG9uZG9uMRMwEQYDVQQKDApQcml2YXgg THRkMRQwEgYDVQQLDAtITUEgUHJvIFZQTjEWMBQGA1UEAwwNaGlkZW15YXNzLmNv bTEeMBwGCSqGSIb3DQEJARYPaW5mb0Bwcml2YXguY29tMIICIjANBgkqhkiG9w0B AQEFAAOCAg8AMIICCgKCAgEAxWS4+bOnwzGsEZ2vyqfTg7OEJkdqlA+DmQB3UmeD xX8K+87FTe/htIudr4hQ19q2gaHU4PjN1QsJtkH+VxU6V5p5eeWVVCGpHOhkcI4X K0yodRGn6rhAPJYXI7pJHAronfmqfZz/XM+neTGHQ9VF9zW6Q1001mjT0YklFfpx +CPFiGYsQjqZ+ia9RvaXz5Eu1cQ0EWy4do1l7obmvmTrlqN26z4unmh3HfEKRuwt NeHsSyhdzFW20eT2GhvXniHItqWBDi93U55R84y2GNrQubm207UB6kqbJXPXYnlZ ifvQCxa1hz3sr+vUbRi4wIpj/Da2MK7BLHAuUbClKqFs9OSAffWo/PuhkhFyF5Jh OYXjOMI1PhiTjeSfBmNdC5dFOGT3rStvYxYlB8rwuuyp9DuvInQRuCC62/Lew9pI TULaPUPTU7TeKuk4Hqqn2LtnFTU7CSMRAVgZMxTWuC7PT+9sy+jM3nSqo+QaiVtM xbaWXmZD9UlLEMmM9IkMdHV08DXQonjIi4RnqHWLYRY6pDjJ2E4jleXlS2laIBKl mKIuyxZ/B5IyV2dLKrNAs7j9EC7J82giBBCHbZiHQjZ2CqIi+afHKjniFHhuJSVU e7DY+S/B/ePac7Xha8a5K2LmJ+jpPjvBjJd+2Tp2Eyt8wVn/6iSqKePDny5AZhbY +YkCAwEAAaOBrDCBqTAdBgNVHQ4EFgQU4MZR0iTa8SoTWOJeoOmtynuk8/cwHwYD VR0jBBgwFoAU4MZR0iTa8SoTWOJeoOmtynuk8/cwDwYDVR0TAQH/BAUwAwEB/zAL BgNVHQ8EBAMCAaYwEQYJYIZIAYb4QgEBBAQDAgEWMBoGA1UdEQQTMBGBD2luZm9A cHJpdmF4LmNvbTAaBgNVHRIEEzARgQ9pbmZvQHByaXZheC5jb20wDQYJKoZIhvcN AQELBQADggIBAG+QvRLNs41wHXeM7wq6tqSZl6UFStGc6gIzzVUkysVHwvAqqxj/ 8UncqEwFTxV3KiD/+wLMHZFkLwQgSAHwaTmBKGrK4I6DoUtK+52RwfyU3XA0s5dj 6rKbZKPNdD0jusOTYgbXOCUa6JI2gmpyjk7lq3D66dATs11uP7S2uwjuO3ER5Czt m12RcsrAxjndH2igTgZVu4QQwnNZ39Raq6v5IayKxF0tP1wPxz/JafhIjdNxq6Re P4jsI5y0rJBuXuw+gWC8ePTP4rxWp908kI7vwmmVq9/iisGZelN6G5uEB2d3EiJB B0A3t9LCFT9fKznlp/38To4x1lQhfNbln8zC4qav/8fBfKu5MkuVcdV4ZmHq0bT7 sfzsgHs00JaYOCadBslNu1xVtgooy+ARiGfnzVL9bArLhlVn476JfU22H57M0IaU F5iUTJOWKMSYHNMBWL/m+rgD4In1nEb8DITBW7c1JtC8Iql0UPq1PlxhqMyvXfW9 4njqcF4wQi6PsnJI9X7oHDy+pevRrCR+3R5xWB8C9jr8J80TmsRJRv8chDUOHH4H YjhF7ldJRDmvY+DK6e4jgBOIaqS5i2/PybVYWjBb7VuKDFkLQSqA5g/jELd6hpUL yUgzpAgr7q3iJghthPkS4oxw9NtNvnbQweKIF37HIHiuJRsTRO4jhlX4 -----END CERTIFICATE-----' CLIENT_CRT='-----BEGIN CERTIFICATE----- MIIGMTCCBBmgAwIBAgICAQEwDQYJKoZIhvcNAQELBQAwgZIxCzAJBgNVBAYTAlVL MQ8wDQYDVQQIDAZMb25kb24xDzANBgNVBAcMBkxvbmRvbjETMBEGA1UECgwKUHJp dmF4IEx0ZDEUMBIGA1UECwwLSE1BIFBybyBWUE4xFjAUBgNVBAMMDWhpZGVteWFz cy5jb20xHjAcBgkqhkiG9w0BCQEWD2luZm9AcHJpdmF4LmNvbTAeFw0xNjA5MTQx MDQ2MTRaFw0yNjA5MTExMDQ2MTRaMIGMMQswCQYDVQQGEwJVSzEPMA0GA1UECAwG TG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xEzARBgNVBAoMClByaXZheCBMdGQxFDAS BgNVBAsMC0hNQSBQcm8gVlBOMRAwDgYDVQQDDAdobWF1c2VyMR4wHAYJKoZIhvcN AQkBFg9pbmZvQHByaXZheC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQDt+iUzODRqDxE0NNf05adqkOo0ZISQIgGnhYX6yfQcVcQ3d3lcr59/svL/ yPlk4tjUOfgZ8yFQ1FhaJvbg1g6GihVuHCuU5zMT7O7kc9S5p6PqIIJCfN1t36OB LsX0XpS7FrJa7jTSE4wjEe24MdAt6v+UtB9cyD92zdvVQ8EqS4G48xDNAChPFQfH 69/U0dr+vIV6Zyz5sFB/w3LXeMtvj/0iVu8Hj93hFyB6ZJBwEKvG1UTQ1PJNLRQh wsllxxDUELGT6VkbUQZsfkt6N3hqaK7LyaSjcTvR4hr5eLkQNDEn3dXDPvVhdzvr 9clQWlmi/g5HAqqIxsZMYw4t244VAgMBAAGjggGTMIIBjzAJBgNVHRMEAjAAMBEG CWCGSAGG+EIBAQQEAwIHgDALBgNVHQ8EBAMCB4AwLAYJYIZIAYb4QgENBB8WHU9w ZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBRvO1Mpxud2OAB8 3eubWdvsmNZkCjCBxwYDVR0jBIG/MIG8gBTgxlHSJNrxKhNY4l6g6a3Ke6Tz96GB mKSBlTCBkjELMAkGA1UEBhMCVUsxDzANBgNVBAgMBkxvbmRvbjEPMA0GA1UEBwwG TG9uZG9uMRMwEQYDVQQKDApQcml2YXggTHRkMRQwEgYDVQQLDAtITUEgUHJvIFZQ TjEWMBQGA1UEAwwNaGlkZW15YXNzLmNvbTEeMBwGCSqGSIb3DQEJARYPaW5mb0Bw cml2YXguY29tggkA6ZNjeF/UFvowGgYDVR0RBBMwEYEPaW5mb0Bwcml2YXguY29t MBoGA1UdEgQTMBGBD2luZm9AcHJpdmF4LmNvbTATBgNVHSUEDDAKBggrBgEFBQcD AjANBgkqhkiG9w0BAQsFAAOCAgEAZvP84ngB9A0VGmYc53Niowj6FzMZQR3ePDB0 Bs5Wbdco+ZCQLkI0XbdaIKdXnL/cSEGS2ZFb4aUorLFwOHmTs1OYmWYCtEQlyOSQ BQfrxEKk2o9azYmOekUkjzmEDrFlHOqHyTSeCzkHCSfH2e2jucswoFT3hq/OvcoG wzc8WSNbyI4oAugJtl4FGPTkpdtkV0aghirFiA6kZOdvPL43ItDT9/oi7ew2hj2b YGqfeuXISKhZrsauQhTEOgZuZYtcjKqnwFWSXYWAEmBZpDeM/agCymfVtipH0Pc8 xd97d8GW8WwOHqmRaENgK/0vdSUeirYQL/Lu1LBecJUXlJfXZ06lYcRS8/6G46Ki ukkGw9IiLcKgLh3DAxVLxy1c+FIjnYVd/vkE+wCKBgIdsPDE93K7UgjTCMrr5adi llNyAYCXAxtrNon8L20DZx06uRA2koUgX7ZZ7YFZJ1piGDD5pNxNuyEcjHIspcSV rk02nBLraveA9KZD3/v6G9UMsSuQTQC9Igksw24czYbKHF6kSPhrDu2PbTCThl7r 738s6c97W6KtBfKb2sMwHnQwWRUXeNLm5NVC/ZB8adKJXGOOW24Gy/rmjo/UCMYl P4qwfnvSjDLZrbxkFn3fikzf60rJT1K3/7MYfiotpMDGjADKDZFZ1yKSX8Oda5Gz Y4J75tA= -----END CERTIFICATE-----' CLIENT_KEY='-----BEGIN RSA PRIVATE KEY----- MIIEpgIBAAKCAQEA7folMzg0ag8RNDTX9OWnapDqNGSEkCIBp4WF+sn0HFXEN3d5 XK+ff7Ly/8j5ZOLY1Dn4GfMhUNRYWib24NYOhooVbhwrlOczE+zu5HPUuaej6iCC Qnzdbd+jgS7F9F6UuxayWu400hOMIxHtuDHQLer/lLQfXMg/ds3b1UPBKkuBuPMQ zQAoTxUHx+vf1NHa/ryFemcs+bBQf8Ny13jLb4/9IlbvB4/d4RcgemSQcBCrxtVE 0NTyTS0UIcLJZccQ1BCxk+lZG1EGbH5Lejd4amiuy8mko3E70eIa+Xi5EDQxJ93V wz71YXc76/XJUFpZov4ORwKqiMbGTGMOLduOFQIDAQABAoIBAQDSBjU0igMAI0IM sCJzuQbS7wgzqw6vYcPSA+5lkjyFkU/1n9SU70411knNYqJv3iB81JhY1pFtk6pS DhdOALybElyta+EurgkPKckACBYSr5fjNkOfyDFoGbpkdVIxRBPBNdu8koQ9bxD7 loQVTqkrDT35ECqpqPURtcaw5fYhiwQWtLXSTqF6WMXgTlNI9vDGNHVOzDZPpUEY q6MZjK2kayE9wYGAKj+zDHVSdvXeofJX5RCqUi74NrQi3X6FArQCz9Epxb7GzBAn xD4BTC5+TltVwu5VhCLGIZDS4EXsw9xQAr3Z4V8CTTtiv3W8+c0bMb5U31H64EzW yTeHGDbhAoGBAP5+WgAnl9vFT6EPp1jKFBM4F6pm+77YRswnca9EMjCok0vqeHPE 9Xt8BsfLZV1rch7pb9LW9nkjEL5vWxsGceMEQRrbhISCx+MZdIkL706nOHTXXJ+c UNR4gdnSlq9bFW8y3hmRLRLcUOjHZiPL5RQSCgPkAjXF7WwZOc/67ke5AoGBAO9i w/XS8gIvP3DHqSN2dlX0SgIamLDYbrbeeHm4jZ/m+tNyE9q8kJXq3jKCTRMd3dNZ 0OPm0MBMdoKY0cksq7w6OTQ3HOid9VaPuOsNC2X+q878GpsJ+ZKKw9433Gio9nCt VOcBnLa3dtz0DCwRe97j2rrcUnjVDoLE10C89a89AoGBANR5MTMH22WFKqJRq2oZ 7QDOyBNgv7XqY9F27RdjXHP7il7Ld51QR5O9TPvp+MsyNalRRCdHiahBem1EE1BQ 5SygFKsTs2PevHwCeKUi7b1BJ4WFeLNZkrKRmff+NghZh1+7nGrEJlmkz3hJYiFo ze0f0nTFHINAqKSjuvzFh8MhAoGBAORMxyKcaV2X/eLrJ+3APp8++Y4EG3cdEomo pjE/xyGmwbQCadkEWMgBVKPLDQKcS0ATulp/eLrMsYFfiUNZLPe4d3HK1fErJB3H t83DhQli1ivy1tThsHkHikFV+Qh/i3hudjhRm0nOsreKsEke64nouGPZV3YRi2M/ oyIElDLpAoGBALPVdMwjF3zLQdfxAtzl0SjXYAK+fgtcdtyXx8bT6oP9MOLdEzjx EINZrEe84Bs0zor1XqW65Ahm0H1OAgiTsmOakZMLygfW2O9QrZOCkx9wb3b1VvUT uniNUD9nBmXEG1GtnSxxo9Vf7sFc8paPSx+EBo1dsXYmIA+8jX9hv+6T -----END RSA PRIVATE KEY-----' OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'` if [ "$OPVPNENABLE" != 0 ]; then nvram set openvpncl_enable=0 nvram commit fi sleep 30 mkdir /tmp/hma; cd /tmp/hma echo -e "$USERNAMEn$PASSWORD" > userpass.conf echo "$CA_CRT" > ca.crt; echo "$CLIENT_CRT" > client.crt; echo "$CLIENT_KEY" > client.key echo "#!/bin/sh iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE" > route-up.sh echo "#!/bin/sh iptables -t nat -D POSTROUTING -o tun0 -j MASQUERADE" > route-down.sh chmod 644 ca.crt client.crt; chmod 600 client.key userpass.conf; chmod 700 route-up.sh route-down.sh sleep 30 echo "client management 127.0.0.1 5001 management-log-cache 100 dev tun proto $PROTOCOL script-security 2 hand-window 60 verb 3 mute 5 mtu-disc yes cipher bf-cbc auth sha1 tun-mtu 1500 resolv-retry infinite nobind persist-key persist-tun ns-cert-type server keepalive 20 120 reneg-sec 0 log hmavpn.log ca ca.crt cert client.crt key client.key status-version 3 status status daemon auth-user-pass /tmp/hma/userpass.conf remote-random $REMOTE_SERVERS" > hma.conf ln -s /tmp/hma/hmavpn.log /tmp/hmavpn.log ln -s /tmp/hma/status /tmp/status (killall openvpn; openvpn --config /tmp/hma/hma.conf --route-up /tmp/hma/route-up.sh --down /tmp/hma/route-down.sh) & [ -f /tmp/custom.sh ] && /tmp/custom.sh exit 0
Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your HideMyAss VPN service login.
Click "Save Startup" then reboot your router.
That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....
You can see the current status of OpenVPN under the Log area -
In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.
How to setup OpenVPN on DD-WRT using IPVanish Startup Scripts
Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).
note: If you are running more than one router on your network, you need to change the DDWRT router
to a different address, such as 192.168.2.1 to avoid IP conflict.
After logging into the DD-WRT router web interface, please click on the 'Services' tab
.
Click on the 'VPN' tab within the 'Services' tab.
Next, under OpenVPN Server/Daemon click "enable".
This is needed to enable the OpenVPN status page. Click Apply Settings..
Next, access the administration tab >> then select commands.
Copy paste the following startup script in the commands box:
#!/bin/sh SERVER="phx-a20.ipvanish.com" PROTOCOL="udp" # You can use tcp or udp, but make sure the letters are lowercase. PORT="443" # You can select port 443 for either tcp or udp. Port 1194 also works for udp. USER="MYUSERNAME" # Replace MYUSERNAME with your IPVanish Username. PASS="MYPASSWORD" # Replace MYPASSWORD with your IPVanish Password. # This script will cause the entire router startup sequence to be about 2 minutes. ntpclient pool.ntp.org stopservice process_monitor startservice process_monitor sleep 30 mkdir /tmp/openvpncl echo client > /tmp/openvpncl/openvpn.conf && echo dev tun >> /tmp/openvpncl/openvpn.conf && echo proto "$PROTOCOL" >> /tmp/openvpncl/openvpn.conf && echo remote "$SERVER" "$PORT" >> /tmp/openvpncl/openvpn.conf && echo resolv-retry infinite >> /tmp/openvpncl/openvpn.conf && echo nobind >> /tmp/openvpncl/openvpn.conf && echo persist-key >> /tmp/openvpncl/openvpn.conf && echo persist-tun >> /tmp/openvpncl/openvpn.conf && echo persist-remote-ip >> /tmp/openvpncl/openvpn.conf && echo tun-mtu 1500 >> /tmp/openvpncl/openvpn.conf && echo ca /tmp/openvpncl/ca.crt >> /tmp/openvpncl/openvpn.conf && echo remote-cert-tls server >> /tmp/openvpncl/openvpn.conf && echo auth-user-pass /tmp/auth.conf >> /tmp/openvpncl/openvpn.conf && echo comp-lzo >> /tmp/openvpncl/openvpn.conf && echo verb 4 >> /tmp/openvpncl/openvpn.conf && echo auth SHA256 >> /tmp/openvpncl/openvpn.conf && echo cipher AES-256-CBC >> /tmp/openvpncl/openvpn.conf && echo keysize 256 >> /tmp/openvpncl/openvpn.conf && echo tls-cipher DHE-RSA-AES256-SHA >> /tmp/openvpncl/openvpn.conf && echo script-security 3 system >> /tmp/openvpncl/openvpn.conf echo log /tmp/openvpncl/openvpn.log >> /tmp/openvpncl/openvpn.conf echo daemon >> /tmp/openvpncl/openvpn.conf echo status-version 3 >> /tmp/openvpncl/openvpn.conf echo status /tmp/openvpncl/status.log 5 >> /tmp/openvpncl/openvpn.conf echo -e "$USERn$PASS" > /tmp/auth.conf chmod 600 /tmp/auth.conf echo -----BEGIN CERTIFICATE----- > /tmp/openvpncl/ca.crt echo MIIErTCCA5WgAwIBAgIJAMYKzSS8uPKDMA0GCSqGSIb3DQEBDQUAMIGVMQswCQYD >> /tmp/openvpncl/ca.crt echo VQQGEwJVUzELMAkGA1UECBMCRkwxFDASBgNVBAcTC1dpbnRlciBQYXJrMREwDwYD >> /tmp/openvpncl/ca.crt echo VQQKEwhJUFZhbmlzaDEVMBMGA1UECxMMSVBWYW5pc2ggVlBOMRQwEgYDVQQDEwtJ >> /tmp/openvpncl/ca.crt echo UFZhbmlzaCBDQTEjMCEGCSqGSIb3DQEJARYUc3VwcG9ydEBpcHZhbmlzaC5jb20w >> /tmp/openvpncl/ca.crt echo HhcNMTIwMTExMTkzMjIwWhcNMjgxMTAyMTkzMjIwWjCBlTELMAkGA1UEBhMCVVMx >> /tmp/openvpncl/ca.crt echo CzAJBgNVBAgTAkZMMRQwEgYDVQQHEwtXaW50ZXIgUGFyazERMA8GA1UEChMISVBW >> /tmp/openvpncl/ca.crt echo YW5pc2gxFTATBgNVBAsTDElQVmFuaXNoIFZQTjEUMBIGA1UEAxMLSVBWYW5pc2gg >> /tmp/openvpncl/ca.crt echo Q0ExIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAaXB2YW5pc2guY29tMIIBIjANBgkq >> /tmp/openvpncl/ca.crt echo hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt9DBWNr/IKOuY3TmDP5x7vYZR0DGxLbX >> /tmp/openvpncl/ca.crt echo U8TyAzBbjUtFFMbhxlHiXVQrZHmgzih94x7BgXM7tWpmMKYVb+gNaqMdWE680Qm3 >> /tmp/openvpncl/ca.crt echo nOwmhy/dulXDkEHAwD05i/iTx4ZaUdtV2vsKBxRg1vdC4AEiwD7bqV4HOi13xcG9 >> /tmp/openvpncl/ca.crt echo 71aQ55Mj1KeCdA0aNvpat1LWx2jjWxsfI8s2Lv5Fkoi1HO1+vTnnaEsJZrBgAkLX >> /tmp/openvpncl/ca.crt echo pItqP29Lik3/OBIvkBIxlKrhiVPixE5qNiD+eSPirsmROvsyIonoJtuY4Dw5K6pc >> /tmp/openvpncl/ca.crt echo NlKyYiwo1IOFYU3YxffwFJk+bSW4WVBhsdf5dGxq/uOHmuz5gdwxCwIDAQABo4H9 >> /tmp/openvpncl/ca.crt echo MIH6MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFEv9FCWJHefBcIPX9p8RHCVOGe6u >> /tmp/openvpncl/ca.crt echo MIHKBgNVHSMEgcIwgb+AFEv9FCWJHefBcIPX9p8RHCVOGe6uoYGbpIGYMIGVMQsw >> /tmp/openvpncl/ca.crt echo CQYDVQQGEwJVUzELMAkGA1UECBMCRkwxFDASBgNVBAcTC1dpbnRlciBQYXJrMREw >> /tmp/openvpncl/ca.crt echo DwYDVQQKEwhJUFZhbmlzaDEVMBMGA1UECxMMSVBWYW5pc2ggVlBOMRQwEgYDVQQD >> /tmp/openvpncl/ca.crt echo EwtJUFZhbmlzaCBDQTEjMCEGCSqGSIb3DQEJARYUc3VwcG9ydEBpcHZhbmlzaC5j >> /tmp/openvpncl/ca.crt echo b22CCQDGCs0kvLjygzANBgkqhkiG9w0BAQ0FAAOCAQEAI2dkh/43ksV2fdYpVGhY >> /tmp/openvpncl/ca.crt echo aFZPVqCJoToCez0IvOmLeLGzow+EOSrY508oyjYeNP4VJEjApqo0NrMbKl8g/8bp >> /tmp/openvpncl/ca.crt echo LBcotOCF1c1HZ+y9v7648uumh01SMjsbBeHOuQcLb+7gX6c0pEmxWv8qj5JiW3/1 >> /tmp/openvpncl/ca.crt echo L1bktnjW5Yp5oFkFSMXjOnIoYKHyKLjN2jtwH6XowUNYpg4qVtKU0CXPdOznWcd9 >> /tmp/openvpncl/ca.crt echo /zSfa393HwJPeeVLbKYaFMC4IEbIUmKYtWyoJ9pJ58smU3pWsHZUg9Zc0LZZNjkN >> /tmp/openvpncl/ca.crt echo lBdQSLmUHAJ33Bd7pJS0JQeiWviC+4UTmzEWRKa7pDGnYRYNu2cUo0/voStphv8E >> /tmp/openvpncl/ca.crt echo VA== >> /tmp/openvpncl/ca.crt echo -----END CERTIFICATE----- >> /tmp/openvpncl/ca.crt chmod 644 /tmp/openvpncl/ca.crt touch /tmp/openvpncl/openvpn.log chmod 664 /tmp/openvpncl/openvpn.log echo "#!/bin/sh" > /tmp/openvpncl/route-up.sh echo "iptables -I POSTROUTING -t nat -o tun0 -j MASQUERADE" >> /tmp/openvpncl/route-up.sh echo "iptables -I INPUT -t filter -i tun0 -j ACCEPT" >> /tmp/openvpncl/route-up.sh echo -e "#!/bin/shnsleep 2" > /tmp/openvpncl/route-down.sh echo "iptables -D POSTROUTING -t nat -o tun0 -j MASQUERADE" >> /tmp/openvpncl/route-down.sh echo "iptables -D INPUT -t filter -i tun0 -j ACCEPT" >> /tmp/openvpncl/route-down.sh chmod 700 /tmp/openvpncl/route-up.sh chmod 700 /tmp/openvpncl/route-down.sh (openvpn --config /tmp/openvpncl/openvpn.conf --ca /tmp/openvpncl/ca.crt --route-up /tmp/openvpncl/route-up.sh --down-pre /tmp/openvpncl/route-down.sh &) sleep 480 echo "*** SYSTEM REPORT ***" > /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt echo "------------> * OpenVPN Information * <------------" >> /tmp/openvpncl/report.txt echo "Command: openvpn --version" >> /tmp/openvpncl/report.txt echo "Command: cat /tmp/openvpncl/status.log" >> /tmp/openvpncl/report.txt echo "Command: cat /tmp/openvpncl/openvpn.log" >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt openvpn --version >> /tmp/openvpncl/report.txt cat /tmp/openvpncl/status.log >> /tmp/openvpncl/report.txt cat /tmp/openvpncl/openvpn.log >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt echo "------------> * System Log * <------------" >> /tmp/openvpncl/report.txt echo "Command: cat /var/log/messages" >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt sleep 120 cat /var/log/messages >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt echo "------------> * Current Adapters * <------------" >> /tmp/openvpncl/report.txt echo "Command: ifconfig" >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt ifconfig >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt echo "------------> * IP Tables * <------------" >> /tmp/openvpncl/report.txt echo "Command: iptables -nvxL" >> /tmp/openvpncl/report.txt echo "Command: iptables -nvxL nat" >> /tmp/openvpncl/report.txt echo "Command: ip ro" >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt iptables -nvxL >> /tmp/openvpncl/report.txt iptables -nvxL nat >> /tmp/openvpncl/report.txt ip ro >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt echo "------------> * Processes * <------------" >> /tmp/openvpncl/report.txt echo "Command: ps" >> /tmp/openvpncl/report.txt echo >> /tmp/openvpncl/report.txt ps >> /tmp/openvpncl/report.txt exit 0
Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.
Click "Save Startup" then reboot your router.
That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....
You can see the current status of OpenVPN under the Log area -
In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.
How to setup OpenVPN on DD-WRT using NordVPN Startup Scripts
Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).
note: If you are running more than one router on your network, you need to change the DDWRT router
to a different address, such as 192.168.2.1 to avoid IP conflict.
After logging into the DD-WRT router web interface, please click on the 'Services' tab
.
Click on the 'VPN' tab within the 'Services' tab.
Next, under OpenVPN Server/Daemon click "enable".
This is needed to enable the OpenVPN status page. Click Apply Settings..
Next, access the administration tab >> then select commands.
Copy paste the following startup script in the commands box:
#!/bin/sh
USERNAME=""
PASSWORD=""
PROTO="udp"
TUN="tun1"
REMOTE="remote 38.132.111.190 1194"
CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'
TLS_AUTH='-----BEGIN OpenVPN Static key V1-----
3f0caf14b74143b1f704cf87c160b27c
6214d16c712c66f1c387e888176f50c4
8afdee9386ce38a87825ddf9a7eea2dc
f36572969bc1c37e6b9d4c279e69da96
3cc3c606dd70b83f78e34e7bd66b86e6
755a88a4fc3c129d018bfe704c9d387b
69eb293f150aa0a7ad69bc328099ce76
43bf4df8c8586ddcdb639e7fe301ac6a
b13f6a9558f5482ab50b4493b1739e7d
4512e0adedca74254baf5ae8023e70b6
dba8929dfd9ed288aba1114f13014696
8c268df506a3977b6d8db067a54592ba
e7c54eea57d0a001f01b4f479677369e
7da3bcf8bd6a14a35a85960fee0b8d90
a2d7402b3fd798bd79cf33b4c2bfb34f
4ea5ef59a2a0771ac909fa37b0e5357d
-----END OpenVPN Static key V1-----'
#### Don't modify below here, except the "auth sha512" line ####
#### Ensure gui client disabled ####
if [ `nvram get openvpncl_enable` != 0 ]; then
nvram set openvpncl_enable=0
nvram commit
sleep 10
fi
mkdir /tmp/vpncl; cd /tmp/vpncl
echo -e "$USERNAMEn$PASSWORD" > userpass.txt
echo "#!/bin/sh
iptables -t nat -I POSTROUTING -o $TUN -j MASQUERADE" > route-up.sh
echo "#!/bin/sh
iptables -t nat -D POSTROUTING -o $TUN -j MASQUERADE" > route-down.sh
echo "$CA_CRT" > ca.crt
echo "$TLS_AUTH" > tls-auth.key
sleep 10
echo "client
dev $TUN
proto $PROTO
$REMOTE
resolv-retry infinite
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
keepalive 5 30
mute 20
verb 3
log-append /tmp/vpn.log
log /tmp/nord.log
fast-io
auth-user-pass userpass.txt
script-security 2
remote-cert-tls server
cipher AES-256-CBC
#some of our servers are using sha1 and in this case you should comment the line below
auth sha512
ca ca.crt
tls-auth tls-auth.key 1
daemon" > openvpn.conf
chmod 600 ca.crt tls-auth.key userpass.txt openvpn.conf; chmod 700 route-up.sh route-down.sh
(killall openvpn ; openvpn --config openvpn.conf --route-up /tmp/vpncl/route-up.sh --down-pre /tmp/vpncl/route-down.sh) &
exit 0
Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your NordVPN service login.
Click "Save Startup" then reboot your router.
That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....
You can see the current status of OpenVPN under the Log area -
In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.
How to setup OpenVPN on DD-WRT using Private Internet Access Startup Scripts
Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).
note: If you are running more than one router on your network, you need to change the DDWRT router
to a different address, such as 192.168.2.1 to avoid IP conflict.
After logging into the DD-WRT router web interface, please click on the 'Services' tab
.
Click on the 'VPN' tab within the 'Services' tab.
Next, under OpenVPN Server/Daemon click "enable".
This is needed to enable the OpenVPN status page. Click Apply Settings..
Next, access the administration tab >> then select commands.
Copy paste the following startup script in the commands box:
#!/bin/sh USERNAME="Your_PIA_Username" PASSWORD="Your_PIA_Password" PROTOCOL="udp" # Add - delete - edit servers between ##BB## and ##EE## REMOTE_SERVERS=" ##BB## # US - WEST remote us-west.privateinternetaccess.com 1194 ##EE## " #### DO NOT CHANGE below this line unless you know exactly what you're doing #### CA_CRT='-----BEGIN CERTIFICATE----- MIID2jCCA0OgAwIBAgIJAOtqMkR2JSXrMA0GCSqGSIb3DQEBBQUAMIGlMQswCQYD VQQGEwJVUzELMAkGA1UECBMCT0gxETAPBgNVBAcTCENvbHVtYnVzMSAwHgYDVQQK ExdQcml2YXRlIEludGVybmV0IEFjY2VzczEjMCEGA1UEAxMaUHJpdmF0ZSBJbnRl cm5ldCBBY2Nlc3MgQ0ExLzAtBgkqhkiG9w0BCQEWIHNlY3VyZUBwcml2YXRlaW50 ZXJuZXRhY2Nlc3MuY29tMB4XDTEwMDgyMTE4MjU1NFoXDTIwMDgxODE4MjU1NFow gaUxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJPSDERMA8GA1UEBxMIQ29sdW1idXMx IDAeBgNVBAoTF1ByaXZhdGUgSW50ZXJuZXQgQWNjZXNzMSMwIQYDVQQDExpQcml2 YXRlIEludGVybmV0IEFjY2VzcyBDQTEvMC0GCSqGSIb3DQEJARYgc2VjdXJlQHBy aXZhdGVpbnRlcm5ldGFjY2Vzcy5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ AoGBAOlVlkHcxfN5HAswpryG7AN9CvcvVzcXvSEo91qAl/IE8H0knKZkIAhe/z3m hz0t91dBHh5yfqwrXlGiyilplVB9tfZohvcikGF3G6FFC9j40GKP0/d22JfR2vJt 4/5JKRBlQc9wllswHZGmPVidQbU0YgoZl00bAySvkX/u1005AgMBAAGjggEOMIIB CjAdBgNVHQ4EFgQUl8qwY2t+GN0pa/wfq+YODsxgVQkwgdoGA1UdIwSB0jCBz4AU l8qwY2t+GN0pa/wfq+YODsxgVQmhgaukgagwgaUxCzAJBgNVBAYTAlVTMQswCQYD VQQIEwJPSDERMA8GA1UEBxMIQ29sdW1idXMxIDAeBgNVBAoTF1ByaXZhdGUgSW50 ZXJuZXQgQWNjZXNzMSMwIQYDVQQDExpQcml2YXRlIEludGVybmV0IEFjY2VzcyBD QTEvMC0GCSqGSIb3DQEJARYgc2VjdXJlQHByaXZhdGVpbnRlcm5ldGFjY2Vzcy5j b22CCQDrajJEdiUl6zAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBQUAA4GBAByH atXgZzjFO6qctQWwV31P4qLelZzYndoZ7olY8ANPxl7jlP3YmbE1RzSnWtID9Gge fsKHi1jAS9tNP2E+DCZiWcM/5Y7/XKS/6KvrPQT90nM5klK9LfNvS+kFabMmMBe2 llQlzAzFiIfabACTQn84QLeLOActKhK8hFJy2Gy6 -----END CERTIFICATE-----' OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'` if [ "$OPVPNENABLE" != 0 ]; then nvram set openvpncl_enable=0 nvram commit fi sleep 10 mkdir /tmp/pia; cd /tmp/pia echo -e "$USERNAMEn$PASSWORD" > userpass.conf echo "$CA_CRT" > ca.crt echo "#!/bin/sh iptables -t nat -I POSTROUTING -o tun0 -j MASQUERADE" > route-up.sh echo "#!/bin/sh iptables -t nat -D POSTROUTING -o tun0 -j MASQUERADE" > route-down.sh chmod 644 ca.crt; chmod 600 userpass.conf; chmod 700 route-up.sh route-down.sh sleep 10 echo "client auth-user-pass /tmp/pia/userpass.conf management 127.0.0.1 5001 management-log-cache 50 dev tun0 proto $PROTOCOL comp-lzo adaptive fast-io script-security 2 mtu-disc yes verb 4 mute 5 cipher bf-cbc auth sha1 tun-mtu 1500 resolv-retry infinite nobind persist-key persist-tun tls-client remote-cert-tls server log-append piavpn.log ca ca.crt status-version 3 status status daemon $REMOTE_SERVERS" > pia.conf ln -s /tmp/pia/piavpn.log /tmp/piavpn.log ln -s /tmp/pia/status /tmp/status (killall openvpn; openvpn --config /tmp/pia/pia.conf --route-up /tmp/pia/route-up.sh --down /tmp/pia/route-down.sh) & exit 0
Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.
Click "Save Startup" then reboot your router.
That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....
You can see the current status of OpenVPN under the Log area -
In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.
How to setup OpenVPN on DD-WRT using PureVPN Startup Scripts
Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).
note: If you are running more than one router on your network, you need to change the DDWRT router
to a different address, such as 192.168.2.1 to avoid IP conflict.
After logging into the DD-WRT router web interface, please click on the 'Services' tab
.
Click on the 'VPN' tab within the 'Services' tab.
Next, under OpenVPN Server/Daemon click "enable".
This is needed to enable the OpenVPN status page. Click Apply Settings..
Next, access the administration tab >> then select commands.
Copy paste the following startup script in the commands box:
#!/bin/sh USERNAME="username" # Replace "username" with PureVPN username provided by PureVPN like "purevpn0s123456" PASSWORD="password" # Replace "password" with PureVPN password provided by PureVPN # United Kingdom REMOTE_SERVERS=" remote xxx.purevpn.net 53 # Replace xxx.purevpn.net with desired server address. You can get the server address from .ovpn files you downloaded " #### DO NOT CHANGE below this line #### CA_CRT='-----BEGIN CERTIFICATE----- MIIEoTCCA4mgAwIBAgIJANysBdFD6U2oMA0GCSqGSIb3DQEBBQUAMIGRMQswCQYD VQQGEwJISzELMAkGA1UECBMCSEsxETAPBgNVBAcTCEhvbmdLb25nMRAwDgYDVQQK EwdQdXJlVlBOMQswCQYDVQQLEwJJVDEQMA4GA1UEAxMHUHVyZVZQTjEQMA4GA1UE KRMHUHVyZVZQTjEfMB0GCSqGSIb3DQEJARYQbWFpbEBob3N0LmRvbWFpbjAeFw0x NDA0MTAwNzI5NDlaFw0yNDA0MDcwNzI5NDlaMIGRMQswCQYDVQQGEwJISzELMAkG A1UECBMCSEsxETAPBgNVBAcTCEhvbmdLb25nMRAwDgYDVQQKEwdQdXJlVlBOMQsw CQYDVQQLEwJJVDEQMA4GA1UEAxMHUHVyZVZQTjEQMA4GA1UEKRMHUHVyZVZQTjEf MB0GCSqGSIb3DQEJARYQbWFpbEBob3N0LmRvbWFpbjCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBAJYqtUkQTlf/pHcGXuuII8S3pfI0fwFbs7l/1RP3nX3n v1vyuvLi7h0jWsgJU0XM7LJywiRFJ8zsMLH7KZnIg7bscb50GY75WIq7C2NnWnnS 7zzyCCm2XD/2xZPym2lVRytpnWJbpemSS6Hdz7xI3q2FmixuBa1t5FeKsXfeaGGg +ohwLvamnGHJYUYu3Nu0EWVzzy5wgT0c2C5jleGxl3kxRimD8FpnlAVdqyt0ib/f f9XanaotSopIHUZmpYjT+udRC2+harlNKvOXYgDRl1mpimCvlzEWpZAo8dyBCxWl xlBIT8OA8rimGi1XviknuOlWu2cGi13Ug8mCG0MjOQ0CAwEAAaOB+TCB9jAdBgNV HQ4EFgQUt+1vJ2X2ho12PUDhdo2CsSHYXbYwgcYGA1UdIwSBvjCBu4AUt+1vJ2X2 ho12PUDhdo2CsSHYXbahgZekgZQwgZExCzAJBgNVBAYTAkhLMQswCQYDVQQIEwJI SzERMA8GA1UEBxMISG9uZ0tvbmcxEDAOBgNVBAoTB1B1cmVWUE4xCzAJBgNVBAsT AklUMRAwDgYDVQQDEwdQdXJlVlBOMRAwDgYDVQQpEwdQdXJlVlBOMR8wHQYJKoZI hvcNAQkBFhBtYWlsQGhvc3QuZG9tYWluggkA3KwF0UPpTagwDAYDVR0TBAUwAwEB /zANBgkqhkiG9w0BAQUFAAOCAQEAAhLQQmkKWJdyGqgMSKOWXSKN2WXTDjIdb9bK Q8uHeq0LYCcPoRh8VYJg2X4UWR/KO9pKaG+iZJw4Jqz4GQJjjJLKHfsWwj790ay0 7U5KT08qmxFaxZUYn663H9b0+Zud1spTsTJjVe1eoRk6IDbbB4OMUzN9zyWEn6er xi6llIAjQX1qtlBQasmTAbRtbSsCsZAxL2kXysULIdLrQP0iTgMQqqkv5zvpdEKN 3ciKCd8OHEhHOlAwA0/DNy3dg3Et0F2hNMDJhqMpxXsbKtGJ/rzGXQF2geEVzLZA o42I1wBOSZLTX1fO1gl3gAGS9aYg5o31rrpBKzQewitJgIuc+Q== -----END CERTIFICATE-----' AUTH_KEY='-----BEGIN OpenVPN Static key V1----- e30af995f56d07426d9ba1f824730521 d4283db4b4d0cdda9c6e8759a3799dcb 7939b6a5989160c9660de0f6125cbb1f 585b41c074b2fe88ecfcf17eab9a33be 1352379cdf74952b588fb161a93e13df 9135b2b29038231e02d657a6225705e6 868ccb0c384ed11614690a1894bfbeb2 74cebf1fe9c2329bdd5c8a40fe882062 4d2ea7540cd79ab76892db51fc371a3a c5fc9573afecb3fffe3281e61d72e915 79d9b03d8cbf7909b3aebf4d90850321 ee6b7d0a7846d15c27d8290e031e951e 19438a4654663cad975e138f5bc5af89 c737ad822f27e19057731f41e1e254cc 9c95b7175c622422cde9f1f2cfd3510a dd94498b4d7133d3729dd214a16b27fb -----END OpenVPN Static key V1-----' OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'` if [ "$OPVPNENABLE" != 0 ] then nvram set openvpncl_enable=0 nvram commit fi sleep 30 mkdir /tmp/purevpncl; cd /tmp/purevpncl echo -e "$USERNAMEn$PASSWORD" > userpass.conf echo "$CA_CRT" > ca.crt; echo "$AUTH_KEY" > auth.key echo "#!/bin/sh" > route-up.sh; echo -e "#!/bin/shnsleep 2" > route-down.sh echo "#!/bin/sh iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT iptables -I INPUT -i tun0 -j REJECT iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE" > /tmp/.rc_firewall chmod 644 ca.crt; chmod 600 auth.key userpass.conf; chmod 700 route-up.sh route-down.sh chmod 700 /tmp/.rc_firewall sleep 30 echo "client dev tun proto udp script-security 2 hand-window 60 verb 3 mute 5 mtu-disc yes cipher aes-256-cbc auth sha1 comp-lzo adaptive tun-mtu 1500 resolv-retry infinite nobind persist-key persist-tun keepalive 20 120 reneg-sec 0 log purevpn.log ca ca.crt tls-auth auth.key 1 daemon auth-user-pass userpass.conf remote-random $REMOTE_SERVERS" > openvpn.conf ln -s /tmp/purevpncl/purevpn.log /tmp/purevpn.log /tmp/.rc_firewall (killall openvpn; openvpn --config /tmp/purevpncl/openvpn.conf --route-up /tmp/purevpncl/route-up.sh --down-pre /tmp/purevpncl/route-down.sh) & exit 0
Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.
Click "Save Startup" then reboot your router.
That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....
You can see the current status of OpenVPN under the Log area -
In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.