.

.

PrivateRouter.com's VPN Router Knowledgebase:

What shipping carrier do you use to Ship DDWRT Routers?

We ship exclusively with USPS for our domestic and international orders. TorGuard uses USPS because of extremely competitive shipping rates and affordable shipping anywhere in the world. Our goal is to keep shipping costs as low as possible while still providing fast and safe delivery.

Like Loading... 1 people like this.

Reply

 

Where will you ship a TorGuard flashed DDWRT Router?

TorGuard store ships DDWRT Routers worldwide. Anywhere that USPS will verify shipment, we will send. You can use our online shipping calculator to find out the exact shipping costs for your area.

Like Loading... 0 people like this.

Reply

 

How fast do you process and ship orders?

We process and ship all orders within 24 to 48 hours after payment is approved (M - F). Once an order is approved and processed, we first setup your DDWRT VPN service settings based on the protocol and VPN provider you've chosen. You will receive a tracking number and shipping confirmation email once your router is dispatched. 

Like Loading... 0 people like this.

Reply

 

Who pays for shipping costs?

Currently we require our clients pay full shipping and customs costs for their pre flashed VPN router. We understand shipping can get pricey depending on your location so we do our best to offer the most affordable rates possible. Check back for free shipping promotions from time to time.

Like Loading... 0 people like this.

Reply

 

Do I pay tax when purchasing a PrivateRouter?

Yes, depending on your shipping address and location you may be charged Value Added Tax on checkout. 

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using TorGuard Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Download the TorGuard DD-WRT Startup Scripts from the link below:

http://torguard.net/downloads/TorGuardDDWRT.zip

Unzip the startup scripts and select the VPN server you wish to connect to by opening the file with a text editor.

Copy the entire contents of the selected startup script and paste into the commands window as in below.

Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your TorGuard VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

If you don't see any output in the log you may need to reboot your router, on occasion the status page won’t show your vpn status so its always best to verify your ip over at iplocation.net

DD-WRT Web interface

Congratulations! Now you are ready to use TorGuard using the OpenVPN protocol to encrypt your entire network and any connected devices using your DD-WRT router! Simply visit myip.tg to confirm that your DD-WRT router is connected to TorGuard . If you have any questions Contact our support team. We're available 24/7/365 and will respond quickly.

There are many reasons why a DD-WRT connection may fail to connect correctly. The most common issues are down to little errors like using the wrong TG Service login username or password and server details, even having the incorrect time and date can impact on the connections.


TROUBLESHOOTING DD-WRT

Here is a checklist of common causes and fixes.

1. Try setting 'Use DNSMasq for DNCP', 'Use DNSMasq for DNS' and 'DHCP-Authoritative' to enabled as well as disabled.

2. Ensure the IP of the DD-WRT router is not conflicting with your main router. If your main router is currently 192.168.1.1 DD-WRT has to be in the same subnet, an example of ithis is: 192.168.1.51

3. Ensure the DD-WRT is connected to any other router from its WAN port.

4. You could also try setting the DD-WRT router to a 'Static' connection from the 'Basic Setup' page.

5. Go to your LAN settings and manually change your IP Address, Subnet Mask and Gateway so its pointing to the DD-WRT router. You may also need to change the DNS servers, if you do not want to use your ISPs DNS you can use Google DNS 8.8.8.8 and 8.8.4.4

6. If you have setup a PPTP connection try adding: mppe required,no40,no56,stateless into the 'Additional PPTP Settings' text area.

7. If you have setup a PPTP connection please ensure the PPTP passthrough is enabled from Security -> VPN Passthrough.

8. Try disabling the firewalls on your routers or modems, these can quite often cause connection issues. Once its determined that a firewall is not causing the problem it can always be re-enabled.

9. MTU settings can quite often cause problems, you could try lowering the MTU settings by adding this command on a new line (below verb 3) on your OpenVPN configuration file: tun-mtu 1100

10. Its very important that your router has the correct time and date.

OPENVPN LOGS:

If you are running an OpenVPN Connection you can create a Log which may enable you to see the problem - so you can open a support ticket and send us the details.

1. Add the following after 'verb 3' in your OpenVPN Config startup script:

log /tmp/openvpn.log

2. Reboot you router, wait for about 5 minutes and then run the following command (Run Command) from the command text area in administration (same place as the OpenVPN config file):

ln -s /tmp/openvpn.log /tmp/www/openvpnlog.html

3. Go to the DD-WRT index page and add: /user/openvpnlog.html to it so it looks something like: http://192.168.x.x/user/openvpnlog.html

## If any problems persist please open a support ticket and we will be able to assist you with Your troubleshooting.

Like Loading... 0 people like this.

Reply

 

How to Setup WireGuard and TorGuard VPN on a GLI OpenWRT Router

GLI Mini VPN routers are portable powerhouses, perfect for any digital nomad or working professional. GLI routers run on OpenWRT firmware and come with an easy to use web panel that makes setting up OpenVPN or WireGuard very easy.

In this tutorial, we will show how to configure your GL-MT300N, GL-AR300M (Shadow), or GLI GL-AR750 VPN router for use with TorGuard's WireGuard VPN servers. This tutorial will show how to add settings with GLI's custom web panel using the latest firmware. For OpenWRT luci setup instructions please visit this tutorial.

Step 1.)

First login to the TorGuard members area and click Tools then select Enable WireGuard Access.


Step 2.)

Find the WireGuard VPN server location you wish to connect to and select "Enable WireGuard". Then click "Download Config" and save the WireGuard config file.

 

 

Step 3.)

Open a web browser and navigate to: 192.168.8.1 to access the GLI admin Panel. Enter your Admin password.

 

 

Step 4.)

In the GLI Admin Panel menu select the VPN tab and click WireGuard Client.

 Step 5.)

Click the "Add New Profiles" button to add the WireGuard config file that was downloaded.

 

 Step 6.)

Add a Server Name to the connection then click Next.

 Step 7.)

Use a text editor to open the WireGuard config file that was downloaded in Step 2. Right click and choose select all, then click copy.

 Step 8.)

Back in the GLI Admin panel right click the configuration text area and select paste. Then click the add button to save your new WireGuard VPN profile.

 Step 9.)

Click the Connect button to tunnel through the newly added WireGuard VPN server.

 Step 10.)

You should now see Upload / Download stats showing that the WireGuard VPN tunnel is connected.

 Step 11.)

Open a new browser tab and visit MyIP.tg to verify your IP address matches the VPN IP.

Like Loading... 0 people like this.

Reply

 

How Setup OpenVPN on DDWRT with HideMyAss VPN

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh

USERNAME="MyUsername"
PASSWORD="MyPassword" # Your HMA_USER_PASSWORD not PPTP password
PROTOCOL="udp" # udp / tcp MUST BE lower case

# Add - delete - edit servers between ##BB## and ##EE##
REMOTE_SERVERS="
##BB##
remote 173.234.157.210 443
##EE##
"

#### DO NOT CHANGE below this line ####

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

CLIENT_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

CLIENT_KEY='-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----'

OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'`

if [ "$OPVPNENABLE" != 0 ]; then
nvram set openvpncl_enable=0
nvram commit
fi

sleep 30
mkdir /tmp/hma; cd /tmp/hma
echo -e "$USERNAMEn$PASSWORD" > userpass.conf
echo "$CA_CRT" > ca.crt; echo "$CLIENT_CRT" > client.crt; echo "$CLIENT_KEY" > client.key
echo "#!/bin/sh
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE" > route-up.sh
echo "#!/bin/sh
iptables -t nat -D POSTROUTING -o tun0 -j MASQUERADE" > route-down.sh
chmod 644 ca.crt client.crt; chmod 600 client.key userpass.conf; chmod 700 route-up.sh route-down.sh
sleep 30
echo "client
management 127.0.0.1 5001
management-log-cache 100
dev tun
proto $PROTOCOL
script-security 2
hand-window 60
verb 3
mute 5
mtu-disc yes
cipher bf-cbc
auth sha1
tun-mtu 1500
resolv-retry infinite
nobind
persist-key
persist-tun
ns-cert-type server
keepalive 20 120
reneg-sec 0
log hmavpn.log
ca ca.crt
cert client.crt
key client.key
status-version 3
status status
daemon
auth-user-pass /tmp/hma/userpass.conf
remote-random
$REMOTE_SERVERS" > hma.conf
ln -s /tmp/hma/hmavpn.log /tmp/hmavpn.log
ln -s /tmp/hma/status /tmp/status
(killall openvpn; openvpn --config /tmp/hma/hma.conf --route-up /tmp/hma/route-up.sh --down /tmp/hma/route-down.sh) &
[ -f /tmp/custom.sh ] && /tmp/custom.sh
exit 0


Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your HideMyAss VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using IPVanish Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh
 
SERVER="phx-a20.ipvanish.com"
PROTOCOL="udp" # You can use tcp or udp, but make sure the letters are lowercase.
PORT="443" # You can select port 443 for either tcp or udp. Port 1194 also works for udp.
USER="MYUSERNAME" # Replace MYUSERNAME with your IPVanish Username.
PASS="MYPASSWORD" # Replace MYPASSWORD with your IPVanish Password.
 
# This script will cause the entire router startup sequence to be about 2 minutes.
 
ntpclient pool.ntp.org
stopservice process_monitor
startservice process_monitor
sleep 30
 
mkdir /tmp/openvpncl
 
echo client > /tmp/openvpncl/openvpn.conf &&
echo dev tun >> /tmp/openvpncl/openvpn.conf &&
echo proto "$PROTOCOL" >> /tmp/openvpncl/openvpn.conf &&
echo remote "$SERVER" "$PORT" >> /tmp/openvpncl/openvpn.conf &&
echo resolv-retry infinite >> /tmp/openvpncl/openvpn.conf  &&
echo nobind >> /tmp/openvpncl/openvpn.conf &&
echo persist-key >> /tmp/openvpncl/openvpn.conf &&
echo persist-tun >> /tmp/openvpncl/openvpn.conf &&
echo persist-remote-ip >> /tmp/openvpncl/openvpn.conf &&
echo tun-mtu 1500 >> /tmp/openvpncl/openvpn.conf &&
echo ca /tmp/openvpncl/ca.crt >> /tmp/openvpncl/openvpn.conf &&
echo remote-cert-tls server >> /tmp/openvpncl/openvpn.conf &&
echo auth-user-pass /tmp/auth.conf >> /tmp/openvpncl/openvpn.conf &&
echo comp-lzo >> /tmp/openvpncl/openvpn.conf &&
echo verb 4 >> /tmp/openvpncl/openvpn.conf &&
echo auth SHA256 >> /tmp/openvpncl/openvpn.conf &&
echo cipher AES-256-CBC >> /tmp/openvpncl/openvpn.conf &&
echo keysize 256 >> /tmp/openvpncl/openvpn.conf &&
echo tls-cipher DHE-RSA-AES256-SHA >> /tmp/openvpncl/openvpn.conf &&
echo script-security 3 system >> /tmp/openvpncl/openvpn.conf
echo log /tmp/openvpncl/openvpn.log >> /tmp/openvpncl/openvpn.conf
echo daemon >> /tmp/openvpncl/openvpn.conf
echo status-version 3 >> /tmp/openvpncl/openvpn.conf
echo status /tmp/openvpncl/status.log 5 >> /tmp/openvpncl/openvpn.conf
echo -e "$USERn$PASS" > /tmp/auth.conf
 
chmod 600 /tmp/auth.conf
 
echo -----BEGIN CERTIFICATE----- > /tmp/openvpncl/ca.crt
echo MIIErTCCA5WgAwIBAgIJAMYKzSS8uPKDMA0GCSqGSIb3DQEBDQUAMIGVMQswCQYD >> /tmp/openvpncl/ca.crt
echo VQQGEwJVUzELMAkGA1UECBMCRkwxFDASBgNVBAcTC1dpbnRlciBQYXJrMREwDwYD >> /tmp/openvpncl/ca.crt
echo VQQKEwhJUFZhbmlzaDEVMBMGA1UECxMMSVBWYW5pc2ggVlBOMRQwEgYDVQQDEwtJ >> /tmp/openvpncl/ca.crt
echo UFZhbmlzaCBDQTEjMCEGCSqGSIb3DQEJARYUc3VwcG9ydEBpcHZhbmlzaC5jb20w >> /tmp/openvpncl/ca.crt
echo HhcNMTIwMTExMTkzMjIwWhcNMjgxMTAyMTkzMjIwWjCBlTELMAkGA1UEBhMCVVMx >> /tmp/openvpncl/ca.crt
echo CzAJBgNVBAgTAkZMMRQwEgYDVQQHEwtXaW50ZXIgUGFyazERMA8GA1UEChMISVBW >> /tmp/openvpncl/ca.crt
echo YW5pc2gxFTATBgNVBAsTDElQVmFuaXNoIFZQTjEUMBIGA1UEAxMLSVBWYW5pc2gg >> /tmp/openvpncl/ca.crt
echo Q0ExIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAaXB2YW5pc2guY29tMIIBIjANBgkq >> /tmp/openvpncl/ca.crt
echo hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt9DBWNr/IKOuY3TmDP5x7vYZR0DGxLbX >> /tmp/openvpncl/ca.crt
echo U8TyAzBbjUtFFMbhxlHiXVQrZHmgzih94x7BgXM7tWpmMKYVb+gNaqMdWE680Qm3 >> /tmp/openvpncl/ca.crt
echo nOwmhy/dulXDkEHAwD05i/iTx4ZaUdtV2vsKBxRg1vdC4AEiwD7bqV4HOi13xcG9 >> /tmp/openvpncl/ca.crt
echo 71aQ55Mj1KeCdA0aNvpat1LWx2jjWxsfI8s2Lv5Fkoi1HO1+vTnnaEsJZrBgAkLX >> /tmp/openvpncl/ca.crt
echo pItqP29Lik3/OBIvkBIxlKrhiVPixE5qNiD+eSPirsmROvsyIonoJtuY4Dw5K6pc >> /tmp/openvpncl/ca.crt
echo NlKyYiwo1IOFYU3YxffwFJk+bSW4WVBhsdf5dGxq/uOHmuz5gdwxCwIDAQABo4H9 >> /tmp/openvpncl/ca.crt
echo MIH6MAwGA1UdEwQFMAMBAf8wHQYDVR0OBBYEFEv9FCWJHefBcIPX9p8RHCVOGe6u >> /tmp/openvpncl/ca.crt
echo MIHKBgNVHSMEgcIwgb+AFEv9FCWJHefBcIPX9p8RHCVOGe6uoYGbpIGYMIGVMQsw >> /tmp/openvpncl/ca.crt
echo CQYDVQQGEwJVUzELMAkGA1UECBMCRkwxFDASBgNVBAcTC1dpbnRlciBQYXJrMREw >> /tmp/openvpncl/ca.crt
echo DwYDVQQKEwhJUFZhbmlzaDEVMBMGA1UECxMMSVBWYW5pc2ggVlBOMRQwEgYDVQQD >> /tmp/openvpncl/ca.crt
echo EwtJUFZhbmlzaCBDQTEjMCEGCSqGSIb3DQEJARYUc3VwcG9ydEBpcHZhbmlzaC5j >> /tmp/openvpncl/ca.crt
echo b22CCQDGCs0kvLjygzANBgkqhkiG9w0BAQ0FAAOCAQEAI2dkh/43ksV2fdYpVGhY >> /tmp/openvpncl/ca.crt
echo aFZPVqCJoToCez0IvOmLeLGzow+EOSrY508oyjYeNP4VJEjApqo0NrMbKl8g/8bp >> /tmp/openvpncl/ca.crt
echo LBcotOCF1c1HZ+y9v7648uumh01SMjsbBeHOuQcLb+7gX6c0pEmxWv8qj5JiW3/1 >> /tmp/openvpncl/ca.crt
echo L1bktnjW5Yp5oFkFSMXjOnIoYKHyKLjN2jtwH6XowUNYpg4qVtKU0CXPdOznWcd9 >> /tmp/openvpncl/ca.crt
echo /zSfa393HwJPeeVLbKYaFMC4IEbIUmKYtWyoJ9pJ58smU3pWsHZUg9Zc0LZZNjkN >> /tmp/openvpncl/ca.crt
echo lBdQSLmUHAJ33Bd7pJS0JQeiWviC+4UTmzEWRKa7pDGnYRYNu2cUo0/voStphv8E >> /tmp/openvpncl/ca.crt
echo VA== >> /tmp/openvpncl/ca.crt
echo -----END CERTIFICATE----- >> /tmp/openvpncl/ca.crt
 
chmod 644 /tmp/openvpncl/ca.crt
 
touch /tmp/openvpncl/openvpn.log
chmod 664 /tmp/openvpncl/openvpn.log
 
echo "#!/bin/sh" > /tmp/openvpncl/route-up.sh
echo "iptables -I POSTROUTING -t nat -o tun0 -j MASQUERADE" >> /tmp/openvpncl/route-up.sh
echo "iptables -I INPUT -t filter -i tun0 -j ACCEPT" >> /tmp/openvpncl/route-up.sh
echo -e "#!/bin/shnsleep 2" > /tmp/openvpncl/route-down.sh
echo "iptables -D POSTROUTING -t nat -o tun0 -j MASQUERADE" >> /tmp/openvpncl/route-down.sh
echo "iptables -D INPUT -t filter -i tun0 -j ACCEPT" >> /tmp/openvpncl/route-down.sh
 
chmod 700 /tmp/openvpncl/route-up.sh
chmod 700 /tmp/openvpncl/route-down.sh
 
(openvpn --config /tmp/openvpncl/openvpn.conf --ca /tmp/openvpncl/ca.crt --route-up /tmp/openvpncl/route-up.sh --down-pre /tmp/openvpncl/route-down.sh &)
 
sleep 480
echo "*** SYSTEM REPORT ***" > /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * OpenVPN Information * <------------" >> /tmp/openvpncl/report.txt
echo "Command: openvpn --version" >> /tmp/openvpncl/report.txt
echo "Command: cat /tmp/openvpncl/status.log" >> /tmp/openvpncl/report.txt
echo "Command: cat /tmp/openvpncl/openvpn.log" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
openvpn --version >> /tmp/openvpncl/report.txt
cat /tmp/openvpncl/status.log >> /tmp/openvpncl/report.txt
cat /tmp/openvpncl/openvpn.log >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * System Log * <------------" >> /tmp/openvpncl/report.txt
echo "Command: cat /var/log/messages" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
sleep 120
cat /var/log/messages >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * Current Adapters * <------------" >> /tmp/openvpncl/report.txt
echo "Command: ifconfig" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
ifconfig >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * IP Tables * <------------" >> /tmp/openvpncl/report.txt
echo "Command: iptables -nvxL" >> /tmp/openvpncl/report.txt
echo "Command: iptables -nvxL nat" >> /tmp/openvpncl/report.txt
echo "Command: ip ro" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
iptables -nvxL >> /tmp/openvpncl/report.txt
iptables -nvxL nat >> /tmp/openvpncl/report.txt
ip ro >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
echo "------------> * Processes * <------------" >> /tmp/openvpncl/report.txt
echo "Command: ps" >> /tmp/openvpncl/report.txt
echo >> /tmp/openvpncl/report.txt
ps >> /tmp/openvpncl/report.txt
 
exit 0


Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using NordVPN Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh
USERNAME=""
PASSWORD=""

PROTO="udp"
TUN="tun1"
REMOTE="remote 38.132.111.190 1194"

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

TLS_AUTH='-----BEGIN OpenVPN Static key V1-----
3f0caf14b74143b1f704cf87c160b27c
6214d16c712c66f1c387e888176f50c4
8afdee9386ce38a87825ddf9a7eea2dc
f36572969bc1c37e6b9d4c279e69da96
3cc3c606dd70b83f78e34e7bd66b86e6
755a88a4fc3c129d018bfe704c9d387b
69eb293f150aa0a7ad69bc328099ce76
43bf4df8c8586ddcdb639e7fe301ac6a
b13f6a9558f5482ab50b4493b1739e7d
4512e0adedca74254baf5ae8023e70b6
dba8929dfd9ed288aba1114f13014696
8c268df506a3977b6d8db067a54592ba
e7c54eea57d0a001f01b4f479677369e
7da3bcf8bd6a14a35a85960fee0b8d90
a2d7402b3fd798bd79cf33b4c2bfb34f
4ea5ef59a2a0771ac909fa37b0e5357d
-----END OpenVPN Static key V1-----'

#### Don't modify below here, except the "auth sha512" line ####

#### Ensure gui client disabled ####
if [ `nvram get openvpncl_enable` != 0 ]; then
nvram set openvpncl_enable=0
nvram commit
sleep 10
fi

mkdir /tmp/vpncl; cd /tmp/vpncl

echo -e "$USERNAMEn$PASSWORD" > userpass.txt

echo "#!/bin/sh
iptables -t nat -I POSTROUTING -o $TUN -j MASQUERADE" > route-up.sh

echo "#!/bin/sh
iptables -t nat -D POSTROUTING -o $TUN -j MASQUERADE" > route-down.sh

echo "$CA_CRT" > ca.crt
echo "$TLS_AUTH" > tls-auth.key
sleep 10

echo "client
dev $TUN
proto $PROTO

$REMOTE
resolv-retry infinite
nobind

tun-mtu 1500
tun-mtu-extra 32
mssfix 1450

persist-key
persist-tun
keepalive 5 30

mute 20
verb 3
log-append /tmp/vpn.log
log /tmp/nord.log
fast-io

auth-user-pass userpass.txt
script-security 2
remote-cert-tls server
cipher AES-256-CBC
#some of our servers are using sha1 and in this case you should comment the line below

auth sha512

ca ca.crt
tls-auth tls-auth.key 1

daemon" > openvpn.conf

chmod 600 ca.crt tls-auth.key userpass.txt openvpn.conf; chmod 700 route-up.sh route-down.sh

(killall openvpn ; openvpn --config openvpn.conf --route-up /tmp/vpncl/route-up.sh --down-pre /tmp/vpncl/route-down.sh) &

exit 0


Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your NordVPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using Private Internet Access Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh

USERNAME="Your_PIA_Username"
PASSWORD="Your_PIA_Password"
PROTOCOL="udp"
# Add - delete - edit servers between ##BB## and ##EE##
REMOTE_SERVERS="
##BB##
# US - WEST
remote us-west.privateinternetaccess.com 1194
##EE##
"

#### DO NOT CHANGE below this line unless you know exactly what you're doing ####

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'`

if [ "$OPVPNENABLE" != 0 ]; then
   nvram set openvpncl_enable=0
   nvram commit
fi

sleep 10
mkdir /tmp/pia; cd /tmp/pia
echo -e "$USERNAMEn$PASSWORD" > userpass.conf
echo "$CA_CRT" > ca.crt
echo "#!/bin/sh
iptables -t nat -I POSTROUTING -o tun0 -j MASQUERADE" > route-up.sh
echo "#!/bin/sh
iptables -t nat -D POSTROUTING -o tun0 -j MASQUERADE" > route-down.sh
chmod 644 ca.crt; chmod 600 userpass.conf; chmod 700 route-up.sh route-down.sh
sleep 10
echo "client
auth-user-pass /tmp/pia/userpass.conf
management 127.0.0.1 5001
management-log-cache 50
dev tun0
proto $PROTOCOL
comp-lzo adaptive
fast-io
script-security 2
mtu-disc yes
verb 4
mute 5
cipher bf-cbc
auth sha1
tun-mtu 1500
resolv-retry infinite
nobind
persist-key
persist-tun
tls-client
remote-cert-tls server
log-append piavpn.log
ca ca.crt
status-version 3
status status
daemon
$REMOTE_SERVERS" > pia.conf
ln -s /tmp/pia/piavpn.log /tmp/piavpn.log
ln -s /tmp/pia/status /tmp/status
(killall openvpn; openvpn --config /tmp/pia/pia.conf --route-up /tmp/pia/route-up.sh --down /tmp/pia/route-down.sh) &
exit 0

Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 

How to setup OpenVPN on DD-WRT using PureVPN Startup Scripts

Type the router's local IP address into your web browser's URL bar and login into your router. By default, this is typically 192.168.1.1 (if you specified a different local IP address, please use that IP address).

note: If you are running more than one router on your network, you need to change the DDWRT router

to a different address, such as 192.168.2.1 to avoid IP conflict.

Enter the router's local IP address into your browser's address bar

 

After logging into the DD-WRT router web interface, please click on the 'Services' tab

.
DD-WRT Web interface

 Click on the 'VPN' tab within the 'Services' tab.

Next, under OpenVPN Server/Daemon click "enable".

This is needed to enable the OpenVPN status page. Click Apply Settings..

Click on the 'VPN' tab within the Services' tab.

Next, access the administration tab >> then select commands.

Copy paste the following startup script in the commands box:

#!/bin/sh

USERNAME="username"		# Replace "username" with PureVPN username provided by PureVPN like "purevpn0s123456"
PASSWORD="password"		# Replace "password" with PureVPN password provided by PureVPN

# United Kingdom
REMOTE_SERVERS="
remote xxx.purevpn.net 53		# Replace xxx.purevpn.net with desired server address. You can get the server address from .ovpn files you downloaded
"


#### DO NOT CHANGE below this line ####

CA_CRT='-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----'

AUTH_KEY='-----BEGIN OpenVPN Static key V1-----
e30af995f56d07426d9ba1f824730521
d4283db4b4d0cdda9c6e8759a3799dcb
7939b6a5989160c9660de0f6125cbb1f
585b41c074b2fe88ecfcf17eab9a33be
1352379cdf74952b588fb161a93e13df
9135b2b29038231e02d657a6225705e6
868ccb0c384ed11614690a1894bfbeb2
74cebf1fe9c2329bdd5c8a40fe882062
4d2ea7540cd79ab76892db51fc371a3a
c5fc9573afecb3fffe3281e61d72e915
79d9b03d8cbf7909b3aebf4d90850321
ee6b7d0a7846d15c27d8290e031e951e
19438a4654663cad975e138f5bc5af89
c737ad822f27e19057731f41e1e254cc
9c95b7175c622422cde9f1f2cfd3510a
dd94498b4d7133d3729dd214a16b27fb
-----END OpenVPN Static key V1-----'

OPVPNENABLE=`nvram get openvpncl_enable | awk '$1 == "0" {print $1}'`

if [ "$OPVPNENABLE" != 0 ]
then
	nvram set openvpncl_enable=0
	nvram commit
fi

sleep 30
mkdir /tmp/purevpncl; cd /tmp/purevpncl
echo -e "$USERNAMEn$PASSWORD" > userpass.conf
echo "$CA_CRT" > ca.crt; echo "$AUTH_KEY" > auth.key
echo "#!/bin/sh" > route-up.sh; echo -e "#!/bin/shnsleep 2" > route-down.sh
echo "#!/bin/sh
iptables -I FORWARD -i br0 -o tun0 -j ACCEPT
iptables -I FORWARD -i tun0 -o br0 -j ACCEPT
iptables -I INPUT -i tun0 -j REJECT
iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE" > /tmp/.rc_firewall
chmod 644 ca.crt; chmod 600 auth.key userpass.conf; chmod 700 route-up.sh route-down.sh
chmod 700 /tmp/.rc_firewall
sleep 30
echo "client
dev tun
proto udp
script-security 2
hand-window 60
verb 3
mute 5
mtu-disc yes
cipher aes-256-cbc
auth sha1
comp-lzo adaptive
tun-mtu 1500
resolv-retry infinite
nobind
persist-key
persist-tun
keepalive 20 120
reneg-sec 0
log purevpn.log
ca ca.crt
tls-auth auth.key 1
daemon
auth-user-pass userpass.conf
remote-random
$REMOTE_SERVERS" > openvpn.conf
ln -s /tmp/purevpncl/purevpn.log /tmp/purevpn.log
/tmp/.rc_firewall
(killall openvpn; openvpn --config /tmp/purevpncl/openvpn.conf --route-up /tmp/purevpncl/route-up.sh --down-pre /tmp/purevpncl/route-down.sh) &

exit 0

Remember to replace "USERNAME-HERE" and "PASSWORD-HERE" with your IPVanish VPN service login.

Click "Save Startup" then reboot your router.

That's it! Next we need to verify the OpenVPN connection by clicking the "status" then "OpenVPN" tab....

You can see the current status of OpenVPN under the Log area -

In our example, we can see the connection is valid by looking under "state" - CONNECTED:SUCCESS.

Like Loading... 0 people like this.

Reply

 
0