.

.

PrivateRouter.com's VPN Router Knowledgebase:

What shipping carrier do you use to Ship DDWRT Routers?

We ship exclusively with USPS for our domestic and international orders. TorGuard uses USPS because of extremely competitive shipping rates and affordable shipping anywhere in the world. Our goal is to keep shipping costs as low as possible while still providing fast and safe delivery.

Like Loading... 0 people like this.

Reply

 

Where will you ship a TorGuard flashed DDWRT Router?

TorGuard store ships DDWRT Routers worldwide. Anywhere that USPS will verify shipment, we will send. You can use our online shipping calculator to find out the exact shipping costs for your area.

Like Loading... 0 people like this.

Reply

 

How fast do you process and ship orders?

We process and ship all orders within 24 to 48 hours after payment is approved (M - F). Once an order is approved and processed, we first setup your DDWRT VPN service settings based on the protocol and VPN provider you've chosen. You will receive a tracking number and shipping confirmation email once your router is dispatched. 

Like Loading... 0 people like this.

Reply

 

Who pays for shipping costs?

Currently we require our clients pay full shipping and customs costs for their pre flashed VPN router. We understand shipping can get pricey depending on your location so we do our best to offer the most affordable rates possible. Check back for free shipping promotions from time to time.

Like Loading... 0 people like this.

Reply

 

Do I pay tax when purchasing a PrivateRouter?

Yes, depending on your shipping address and location you may be charged Value Added Tax on checkout. 

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using TorGuard Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Download the TorGuard DD-WRT Startup Scripts from the link below:

http://torguard.net/downloads/TorGuardDDWRT.zip

Unzip the startup scripts and select the VPN server you wish to connect to by opening the file with a text editor.

Copy the entire contents of the selected startup script and paste into the commands window as in below.

Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your TorGuard VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

If you don't see any output in the log you may need to reboot your router, on occasion the status page won’t show your vpn status so its always best to verify your ip over at iplocation.net

DD-WRT Web interface

Congratulations! Now you are ready to use TorGuard using the OpenVPN protocol to encrypt your entire network and any connected devices using your DD-WRT router! Simply visit myip.tg to confirm that your DD-WRT router is connected to TorGuard . If you have any questions Contact our support team. We're available 24/7/365 and will respond quickly.

There are many reasons why a DD-WRT connection may fail to connect correctly. The most common issues are down to little errors like using the wrong TG Service login username or password and server details, even having the incorrect time and date can impact on the connections.


TROUBLESHOOTING DD-WRT

Here is a checklist of common causes and fixes.

1. Try setting 'Use DNSMasq for DNCP', 'Use DNSMasq for DNS' and 'DHCP-Authoritative' to enabled as well as disabled.

2. Ensure the IP of the DD-WRT router is not conflicting with your main router. If your main router is currently 192.168.1.1 DD-WRT has to be in the same subnet, an example of ithis is: 192.168.1.51

3. Ensure the DD-WRT is connected to any other router from its WAN port.

4. You could also try setting the DD-WRT router to a 'Static' connection from the 'Basic Setup' page.

5. Go to your LAN settings and manually change your IP Address, Subnet Mask and Gateway so its pointing to the DD-WRT router. You may also need to change the DNS servers, if you do not want to use your ISPs DNS you can use Google DNS 8.8.8.8 and 8.8.4.4

6. If you have setup a PPTP connection try adding: mppe required,no40,no56,stateless into the 'Additional PPTP Settings' text area.

7. If you have setup a PPTP connection please ensure the PPTP passthrough is enabled from Security -> VPN Passthrough.

8. Try disabling the firewalls on your routers or modems, these can quite often cause connection issues. Once its determined that a firewall is not causing the problem it can always be re-enabled.

9. MTU settings can quite often cause problems, you could try lowering the MTU settings by adding this command on a new line (below verb 3) on your OpenVPN configuration file: tun-mtu 1100

10. Its very important that your router has the correct time and date.

OPENVPN LOGS:

If you are running an OpenVPN Connection you can create a Log which may enable you to see the problem - so you can open a support ticket and send us the details.

1. Add the following after 'verb 3' in your OpenVPN Config startup script:

log /tmp/openvpn.log

2. Reboot you router, wait for about 5 minutes and then run the following command (Run Command) from the command text area in administration (same place as the OpenVPN config file):

ln -s /tmp/openvpn.log /tmp/www/openvpnlog.html

3. Go to the DD-WRT index page and add: /user/openvpnlog.html to it so it looks something like: http://192.168.x.x/user/openvpnlog.html

## If any problems persist please open a support ticket and we will be able to assist you with Your troubleshooting.

Like Loading... 0 people like this.

Reply

 

How to Setup WireGuard and TorGuard VPN on a GLI OpenWRT Router

GLI Mini VPN routers are portable powerhouses, perfect for any digital nomad or working professional. GLI routers run on OpenWRT firmware and come with an easy to use web panel that makes setting up OpenVPN or WireGuard very easy.

In this tutorial, we will show how to configure your GL-MT300N, GL-AR300M (Shadow), or GLI GL-AR750 VPN router for use with TorGuard's WireGuard VPN servers. This tutorial will show how to add settings with GLI's custom web panel using the latest firmware. For OpenWRT luci setup instructions please visit this tutorial.

Step 1.)

First login to the TorGuard members area and click Tools then select Enable WireGuard Access.


Step 2.)

Find the WireGuard VPN server location you wish to connect to and select "Enable WireGuard". Then click "Download Config" and save the WireGuard config file.

 

 

Step 3.)

Open a web browser and navigate to: 192.168.8.1 to access the GLI admin Panel. Enter your Admin password.

 

 

Step 4.)

In the GLI Admin Panel menu select the VPN tab and click WireGuard Client.

 Step 5.)

Click the "Add New Profiles" button to add the WireGuard config file that was downloaded.

 

 Step 6.)

Add a Server Name to the connection then click Next.

 Step 7.)

Use a text editor to open the WireGuard config file that was downloaded in Step 2. Right click and choose select all, then click copy.

 Step 8.)

Back in the GLI Admin panel right click the configuration text area and select paste. Then click the add button to save your new WireGuard VPN profile.

 Step 9.)

Click the Connect button to tunnel through the newly added WireGuard VPN server.

 Step 10.)

You should now see Upload / Download stats showing that the WireGuard VPN tunnel is connected.

 Step 11.)

Open a new browser tab and visit MyIP.tg to verify your IP address matches the VPN IP.

Like Loading... 0 people like this.

Reply

 

How Setup OpenVPN on DDWRT with HideMyAss VPN

Follow these steps to setup OpenVPN with DDWRT when using HideMyASS VPN:

When you enter the DD-WRT Control Panel, click on "Services". Right below it, click on "VPN". Then edit these options to mirror the following:

PPTP Server: disable

PPTP Client Options: disable 

OpenVPN: Enable

Start type: WAN Up

Config as: Daemon

Start OpenVPN® Client: Enable

Server host name: Enter any of the servers that you can find by logging into the VPN Control Panel.

Port: Enter 443

Tunnel Device: Select TUN from the drop-down menu

Tunnel Protocol: Select TCP from the drop-down menu

Encryption Cipher: Select AES 256 from the drop-down menu

Hash Algorithm: Select SHA1 from the drop-down menu

nsCertType verification: Enable

Advanced options: Enable

TLS Cipher: None

LZO Compression: Disabled

NAT: Enable

Firewall Protection: Enable

Tunnel UDP MSS-Fix: Disable

nsCertType Verification: Check

Then in the CA Cert field copy the CA_CRT 

In the Public Client Cert copy the CLIENT_CRT 

In the Private Client Key copy the CLIENT_KEY 

All certificate files can be copied/downloaded from here:

https://www.hidemyass.com/vpn-config/keys/

Double-check the settings you modified and then click on "Apply settings"

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using IPVanish Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh
 
SERVER="phx-a20.ipvanish.com"
PROTOCOL="udp" # You can use tcp or udp, but make sure the letters are lowercase.
PORT="443" # You can select port 443 for either tcp or udp. Port 1194 also works for udp.
USER="MYUSERNAME" # Replace MYUSERNAME with your IPVanish Username.
PASS="MYPASSWORD" # Replace MYPASSWORD with your IPVanish Password.
 
# This script will cause the entire router startup sequence to be about 2 minutes.
 
ntpclient pool.ntp.org
stopservice process_monitor
startservice process_monitor
sleep 30
 
mkdir /tmp/openvpncl
 
echo client > /tmp/openvpncl/openvpn.conf &&
echo dev tun >> /tmp/openvpncl/openvpn.conf &&
echo proto "$PROTOCOL" >> /tmp/openvpncl/openvpn.conf &&
echo remote "$SERVER" "$PORT" >> /tmp/openvpncl/openvpn.conf &&
echo resolv-retry infinite >> /tmp/openvpncl/openvpn.conf  &&
echo nobind >> /tmp/openvpncl/openvpn.conf &&
echo persist-key >> /tmp/openvpncl/openvpn.conf &&
echo persist-tun >> /tmp/openvpncl/openvpn.conf &&
echo persist-remote-ip >> /tmp/openvpncl/openvpn.conf &&
echo tun-mtu 1500 >> /tmp/openvpncl/openvpn.conf &&
echo ca /tmp/openvpncl/ca.crt >> /tmp/openvpncl/openvpn.conf &&
echo remote-cert-tls server >> /tmp/openvpncl/openvpn.conf &&
echo auth-user-pass /tmp/auth.conf >> /tmp/openvpncl/openvpn.conf &&
echo comp-lzo >> /tmp/openvpncl/openvpn.conf &&
echo verb 4 >> /tmp/openvpncl/openvpn.conf &&
echo auth SHA256 >> /tmp/openvpncl/openvpn.conf &&
echo cipher AES-256-CBC >> /tmp/openvpncl/openvpn.conf &&
echo keysize 256 >> /tmp/openvpncl/openvpn.conf &&
echo tls-cipher DHE-RSA-AES256-SHA >> /tmp/openvpncl/openvpn.conf &&
echo script-security 3 system >> /tmp/openvpncl/openvpn.conf
echo log /tmp/openvpncl/openvpn.log >> /tmp/openvpncl/openvpn.conf
echo daemon >> /tmp/openvpncl/openvpn.conf
echo status-version 3 >> /tmp/openvpncl/openvpn.conf
echo status /tmp/openvpncl/status.log 5 >> /tmp/openvpncl/openvpn.conf
echo -e "$USERn$PASS" > /tmp/auth.conf
 
chmod 600 /tmp/auth.conf
 
echo -----BEGIN CERTIFICATE----- > /tmp/openvpncl/ca.crt
echo MIIErTCCA5WgAwIBAgIJAMYKzSS8uPKDMA0GCSqGSIb3DQEBDQUAMIGVMQswCQYD >> /tmp/openvpncl/ca.crt
echo VQQGEwJVUzELMAkGA1UECBMCRkwxFDASBgNVBAcTC1dpbnRlciBQYXJrMREwDwYD >> /tmp/openvpncl/ca.crt
echo VQQKEwhJUFZhbmlzaDEVMBMGA1UECxMMSVBWYW5pc2ggVlBOMRQwEgYDVQQDEwtJ >> /tmp/openvpncl/ca.crt
echo UFZhbmlzaCBDQTEjMCEGCSqGSIb3DQEJARYUc3VwcG9ydEBpcHZhbmlzaC5jb20w >> /tmp/openvpncl/ca.crt
echo HhcNMTIwMTExMTkzMjIwWhcNMjgxMTAyMTkzMjIwWjCBlTELMAkGA1UEBhMCVVMx >> /tmp/openvpncl/ca.crt
echo CzAJBgNVBAgTAkZMMRQwEgYDVQQHEwtXaW50ZXIgUGFyazERMA8GA1UEChMISVBW >> /tmp/openvpncl/ca.crt
echo YW5pc2gxFTATBgNVBAsTDElQVmFuaXNoIFZQTjEUMBIGA1UEAxMLSVBWYW5pc2gg >> /tmp/openvpncl/ca.crt
echo Q0ExIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAaXB2YW5pc2guY29tMIIBIjANBgkq >> /tmp/openvpncl/ca.crt
echo hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt9DBWNr/IKOuY3TmDP5x7vYZR0DGxLbX >> /tmp/openvpncl/ca.crt
echo U8TyAzBbjUtFFMbhxlHiXVQrZHmgzih94x7BgXM7tWpmMKYVb+gNaqMdWE680Qm3 >> /tmp/openvpncl/ca.crt
echo nOwmhy/dulXDkEHAwD05i/iTx4ZaUdtV2vsKBxRg1vdC4AEiwD7bqV4HOi13xcG9 >> /tmp/openvpncl/ca.crt
echo 71aQ55Mj1KeCdA0aNvpat1LWx2jjWxsfI8s2Lv5Fkoi1HO1+vTnnaEsJZrBgAkLX >> /tmp/openvpncl/ca.crt
echo pItqP29Lik3/OBIvkBIxlKrhiVPixE5qNiD+eSPirsmROvsyIonoJtuY4Dw5K6pc >> /tmp/openvpncl/ca.crt
echo NlKyYiwo1IOFYU3YxffwFJk+bSW4WVBhsdf5dGxq/uOHmuz5gdwxCwIDAQABo4H9 >> /tmp/openvpncl/ca.crt
echo MIH6MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFEv9FCWJHefBcIPX9p8RHCVOGe6u >> /tmp/openvpncl/ca.crt
echo MIHKBgNVHSMEgcIwgb+AFEv9FCWJHefBcIPX9p8RHCVOGe6uoYGbpIGYMIGVMQsw >> /tmp/openvpncl/ca.crt
echo CQYDVQQGEwJVUzELMAkGA1UECBMCRkwxFDASBgNVBAcTC1dpbnRlciBQYXJrMREw >> /tmp/openvpncl/ca.crt
echo DwYDVQQKEwhJUFZhbmlzaDEVMBMGA1UECxMMSVBWYW5pc2ggVlBOMRQwEgYDVQQD >> /tmp/openvpncl/ca.crt
echo EwtJUFZhbmlzaCBDQTEjMCEGCSqGSIb3DQEJARYUc3VwcG9ydEBpcHZhbmlzaC5j >> /tmp/openvpncl/ca.crt
echo b22CCQDGCs0kvLjygzANBgkqhkiG9w0BAQ0FAAOCAQEAI2dkh/43ksV2fdYpVGhY >> /tmp/openvpncl/ca.crt
echo aFZPVqCJoToCez0IvOmLeLGzow+EOSrY508oyjYeNP4VJEjApqo0NrMbKl8g/8bp >> /tmp/openvpncl/ca.crt
echo LBcotOCF1c1HZ+y9v7648uumh01SMjsbBeHOuQcLb+7gX6c0pEmxWv8qj5JiW3/1 >> /tmp/openvpncl/ca.crt
echo L1bktnjW5Yp5oFkFSMXjOnIoYKHyKLjN2jtwH6XowUNYpg4qVtKU0CXPdOznWcd9 >> /tmp/openvpncl/ca.crt
echo /zSfa393HwJPeeVLbKYaFMC4IEbIUmKYtWyoJ9pJ58smU3pWsHZUg9Zc0LZZNjkN >> /tmp/openvpncl/ca.crt
echo lBdQSLmUHAJ33Bd7pJS0JQeiWviC+4UTmzEWRKa7pDGnYRYNu2cUo0/voStphv8E >> /tmp/openvpncl/ca.crt
echo VA== >> /tmp/openvpncl/ca.crt
echo -----END CERTIFICATE----- >> /tmp/openvpncl/ca.crt
 
chmod 644 /tmp/openvpncl/ca.crt
 
touch /tmp/openvpncl/openvpn.log
chmod 664 /tmp/openvpncl/openvpn.log
 
echo "#!/bin/sh" > /tmp/openvpncl/route-up.sh
echo "iptables -I POSTROUTING -t nat -o tun0 -j MASQUERADE" >> /tmp/openvpncl/route-up.sh
echo "iptables -I INPUT -t filter -i tun0 -j ACCEPT" >> /tmp/openvpncl/route-up.sh
echo -e "#!/bin/shnsleep 2" > /tmp/openvpncl/route-down.sh
echo "iptables -D POSTROUTING -t nat -o tun0 -j MASQUERADE" >> /tmp/openvpncl/route-down.sh
echo "iptables -D INPUT -t filter -i tun0 -j ACCEPT" >> /tmp/openvpncl/route-down.sh
 
chmod 700 /tmp/openvpncl/route-up.sh
chmod 700 /tmp/openvpncl/route-down.sh
 
(openvpn --config /tmp/openvpncl/openvpn.conf --ca /tmp/openvpncl/ca.crt --route-up /tmp/openvpncl/route-up.sh --down-pre /tmp/openvpncl/route-down.sh &)
 
sleep 480
echo "*** SYSTEM REPORT ***" > /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * OpenVPN Information * <------------" >> /tmp/openvpncl/report.txt
echo "Command: openvpn --version" >> /tmp/openvpncl/report.txt
echo "Command: cat /tmp/openvpncl/status.log" >> /tmp/openvpncl/report.txt
echo "Command: cat /tmp/openvpncl/openvpn.log" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
openvpn --version >> /tmp/openvpncl/report.txt
cat /tmp/openvpncl/status.log >> /tmp/openvpncl/report.txt
cat /tmp/openvpncl/openvpn.log >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * System Log * <------------" >> /tmp/openvpncl/report.txt
echo "Command: cat /var/log/messages" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
sleep 120
cat /var/log/messages >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * Current Adapters * <------------" >> /tmp/openvpncl/report.txt
echo "Command: ifconfig" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
ifconfig >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * IP Tables * <------------" >> /tmp/openvpncl/report.txt
echo "Command: iptables -nvxL" >> /tmp/openvpncl/report.txt
echo "Command: iptables -nvxL nat" >> /tmp/openvpncl/report.txt
echo "Command: ip ro" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
iptables -nvxL >> /tmp/openvpncl/report.txt
iptables -nvxL nat >> /tmp/openvpncl/report.txt
ip ro >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * Processes * <------------" >> /tmp/openvpncl/report.txt
echo "Command: ps" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
ps >> /tmp/openvpncl/report.txt
 
exit 0


Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using NordVPN Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh
USERNAME=""
PASSWORD=""

PROTO="udp"
TUN="tun1"
REMOTE="remote 38.132.111.190 1194"

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

TLS_AUTH='-----BEGIN OpenVPN Static key V1-----
3f0caf14b74143b1f704cf87c160b27c
6214d16c712c66f1c387e888176f50c4
8afdee9386ce38a87825ddf9a7eea2dc
f36572969bc1c37e6b9d4c279e69da96
3cc3c606dd70b83f78e34e7bd66b86e6
755a88a4fc3c129d018bfe704c9d387b
69eb293f150aa0a7ad69bc328099ce76
43bf4df8c8586ddcdb639e7fe301ac6a
b13f6a9558f5482ab50b4493b1739e7d
4512e0adedca74254baf5ae8023e70b6
dba8929dfd9ed288aba1114f13014696
8c268df506a3977b6d8db067a54592ba
e7c54eea57d0a001f01b4f479677369e
7da3bcf8bd6a14a35a85960fee0b8d90
a2d7402b3fd798bd79cf33b4c2bfb34f
4ea5ef59a2a0771ac909fa37b0e5357d
-----END OpenVPN Static key V1-----'

#### Don't modify below here, except the "auth sha512" line ####

#### Ensure gui client disabled ####
if [ `nvram get openvpncl_enable` != 0 ]; then
nvram set openvpncl_enable=0
nvram commit
sleep 10
fi

mkdir /tmp/vpncl; cd /tmp/vpncl

echo -e "$USERNAMEn$PASSWORD" > userpass.txt

echo "#!/bin/sh
iptables -t nat -I POSTROUTING -o $TUN -j MASQUERADE" > route-up.sh

echo "#!/bin/sh
iptables -t nat -D POSTROUTING -o $TUN -j MASQUERADE" > route-down.sh

echo "$CA_CRT" > ca.crt
echo "$TLS_AUTH" > tls-auth.key
sleep 10

echo "client
dev $TUN
proto $PROTO

$REMOTE
resolv-retry infinite
nobind

tun-mtu 1500
tun-mtu-extra 32
mssfix 1450

persist-key
persist-tun
keepalive 5 30

mute 20
verb 3
log-append /tmp/vpn.log
log /tmp/nord.log
fast-io

auth-user-pass userpass.txt
script-security 2
remote-cert-tls server
cipher AES-256-CBC
#some of our servers are using sha1 and in this case you should comment the line below

auth sha512

ca ca.crt
tls-auth tls-auth.key 1

daemon" > openvpn.conf

chmod 600 ca.crt tls-auth.key userpass.txt openvpn.conf; chmod 700 route-up.sh route-down.sh

(killall openvpn ; openvpn --config openvpn.conf --route-up /tmp/vpncl/route-up.sh --down-pre /tmp/vpncl/route-down.sh) &

exit 0


Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your NordVPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using Private Internet Access Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh

USERNAME="Your_PIA_Username"
PASSWORD="Your_PIA_Password"
PROTOCOL="udp"
# Add - delete - edit servers between ##BB## and ##EE##
REMOTE_SERVERS="
##BB##
# US - WEST
remote us-west.privateinternetaccess.com 1194
##EE##
"

#### DO NOT CHANGE below this line unless you know exactly what you're doing ####

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'`

if [ "$OPVPNENABLE" != 0 ]; then
   nvram set openvpncl_enable=0
   nvram commit
fi

sleep 10
mkdir /tmp/pia; cd /tmp/pia
echo -e "$USERNAMEn$PASSWORD" > userpass.conf
echo "$CA_CRT" > ca.crt
echo "#!/bin/sh
iptables -t nat -I POSTROUTING -o tun0 -j MASQUERADE" > route-up.sh
echo "#!/bin/sh
iptables -t nat -D POSTROUTING -o tun0 -j MASQUERADE" > route-down.sh
chmod 644 ca.crt; chmod 600 userpass.conf; chmod 700 route-up.sh route-down.sh
sleep 10
echo "client
auth-user-pass /tmp/pia/userpass.conf
management 127.0.0.1 5001
management-log-cache 50
dev tun0
proto $PROTOCOL
comp-lzo adaptive
fast-io
script-security 2
mtu-disc yes
verb 4
mute 5
cipher bf-cbc
auth sha1
tun-mtu 1500
resolv-retry infinite
nobind
persist-key
persist-tun
tls-client
remote-cert-tls server
log-append piavpn.log
ca ca.crt
status-version 3
status status
daemon
$REMOTE_SERVERS" > pia.conf
ln -s /tmp/pia/piavpn.log /tmp/piavpn.log
ln -s /tmp/pia/status /tmp/status
(killall openvpn; openvpn --config /tmp/pia/pia.conf --route-up /tmp/pia/route-up.sh --down /tmp/pia/route-down.sh) &
exit 0

Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using PureVPN Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh

USERNAME="username"		# Replace "username" with PureVPN username provided by PureVPN like "purevpn0s123456"
PASSWORD="password"		# Replace "password" with PureVPN password provided by PureVPN

# United Kingdom
REMOTE_SERVERS="
remote xxx.purevpn.net 53		# Replace xxx.purevpn.net with desired server address. You can get the server address from .ovpn files you downloaded
"


#### DO NOT CHANGE below this line ####

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

AUTH_KEY='-----BEGIN OpenVPN Static key V1-----
e30af995f56d07426d9ba1f824730521
d4283db4b4d0cdda9c6e8759a3799dcb
7939b6a5989160c9660de0f6125cbb1f
585b41c074b2fe88ecfcf17eab9a33be
1352379cdf74952b588fb161a93e13df
9135b2b29038231e02d657a6225705e6
868ccb0c384ed11614690a1894bfbeb2
74cebf1fe9c2329bdd5c8a40fe882062
4d2ea7540cd79ab76892db51fc371a3a
c5fc9573afecb3fffe3281e61d72e915
79d9b03d8cbf7909b3aebf4d90850321
ee6b7d0a7846d15c27d8290e031e951e
19438a4654663cad975e138f5bc5af89
c737ad822f27e19057731f41e1e254cc
9c95b7175c622422cde9f1f2cfd3510a
dd94498b4d7133d3729dd214a16b27fb
-----END OpenVPN Static key V1-----'

OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'`

if [ "$OPVPNENABLE" != 0 ]
then
	nvram set openvpncl_enable=0
	nvram commit
fi

sleep 30
mkdir /tmp/purevpncl; cd /tmp/purevpncl
echo -e "$USERNAMEn$PASSWORD" > userpass.conf
echo "$CA_CRT" > ca.crt; echo "$AUTH_KEY" > auth.key
echo "#!/bin/sh" > route-up.sh; echo -e "#!/bin/shnsleep 2" > route-down.sh
echo "#!/bin/sh
iptables -I FORWARD -i br0 -o tun0 -j ACCEPT
iptables -I FORWARD -i tun0 -o br0 -j ACCEPT
iptables -I INPUT -i tun0 -j REJECT
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE" > /tmp/.rc_firewall
chmod 644 ca.crt; chmod 600 auth.key userpass.conf; chmod 700 route-up.sh route-down.sh
chmod 700 /tmp/.rc_firewall
sleep 30
echo "client
dev tun
proto udp
script-security 2
hand-window 60
verb 3
mute 5
mtu-disc yes
cipher aes-256-cbc
auth sha1
comp-lzo adaptive
tun-mtu 1500
resolv-retry infinite
nobind
persist-key
persist-tun
keepalive 20 120
reneg-sec 0
log purevpn.log
ca ca.crt
tls-auth auth.key 1
daemon
auth-user-pass userpass.conf
remote-random
$REMOTE_SERVERS" > openvpn.conf
ln -s /tmp/purevpncl/purevpn.log /tmp/purevpn.log
/tmp/.rc_firewall
(killall openvpn; openvpn --config /tmp/purevpncl/openvpn.conf --route-up /tmp/purevpncl/route-up.sh --down-pre /tmp/purevpncl/route-down.sh) &

exit 0

Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 
0