Jump to content

Search the Community

Showing results for tags 'ddwrt'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • The TorGuard Lounge
    • General Discussion
    • Member Tutorials
  • TorGuard Software Releases
    • TorGuard Client Releases
    • Android Client Releases
    • iOS App Releases
    • Browser Extension Releases
  • TorGuard Community Support
    • VPN Questions and General Support
    • Proxy Questions and General Support

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 6 results

  1. I've been looking around, and I know it's still relatively new and all, but I haven't been able to find a whole-home torguard dd-wrt wireguard guide/set-up... I have seen the excellent OpenVPN write ups like this one on how to set up OpenVPN on newer DD-WRT setups: https://torguard.net/knowledgebase.php?action=displayarticle&id=262 I'm looking for that article, just with wireguard instructions instead. If someone can write one up, I'm sure it would be beneficial to a lot of people. On the other hand, I may be a lousy searcher and it may already have been written. If this is the case, please remind me that search is my friend and be a pal and throw in the link for me too please ;x -cheers
  2. I've recently installed a Netgear Orbi RBR50 and placed a Netgear R7800 w/ DD-WRT inside the network. My DD-WRT router is not running the TorGuard startup command so the R7800 w/ DD-WRT is not connecting to the VPN. I've patched the Orbi with V2.5.1.8 and I've flashed the R7800 with DD-WRT v3.0-r42819 std (03/30/20). The Orbi LAN is subnet and is checked as the DHCP server. I've added a fixed IP for the R7800 w/ DD-WRT ( and set the Advanced > Setup > WAN > Default DMZ Server to I can connect clients to the R7800 w/ DD-WRT and browse the internet with a non-VPN conneciton. The R7800 with DD-WRT is setup as follows: The R7800 w/ DD-WRT is setup as and assigning ip addresses and is allowing the connected devices using 192.168.2.XX IPs to access the internet. In DD-WRT > Services > VPN > OpenVPN Server/Daemon i've checked OpenVPN > Enable In DD-WRT > Administration > Commands > Startup I've added the file with my credentials (redacted) After rebooting the Router the OpenVPN log is empty The SysLog shows the following (DDWRT_setup04.png) As a side note on startup DD-WRT was not able to resolve 0.north-america.pool.ntp.org so I needed to use (Google) (DDWRT_setup05.png). Although once the router is Up DNS to outside websites is working just fine. Are my DNS settings bad? Its as if the Startup Command is not even being run. Have I missed something? Thanks!
  3. I am having trouble setting up the vpn client using dd-wrt firmware router. I've followed this guide. It looks like I got a connection, but I don't have Internet access on any devices connected to the router. Router: Linksys E4200 DDwrt Firmware: K2.6 (30880) Setup: Connection: Log:
  4. I think there is no need to write a guide for this project, they documented it well. Python is available on openwrt and you can use this directly on your router. Can anybody try this on their ddwrt routers?
  5. I have posted already how to prevent hijacking of your DNS by your IP. There are some ISP's like Verizon, T-Mobile, ... which do send all traffic over port 53 (yes, they hijack your DNS), regardless of which DNS servers you use. Here is how to get rid of that and redirect it to some another address with help of iptables instead editing dnsmasq in WebIF (which is still my preferable solution for most tasks), in this example I'll redirect all dns requests to my custom dns server, to lan1 in this case, which is my local DNS Server Openwrt (I think ddwrt should work too, but I did not test it on ddwrt but basicly it should be the same, just check the names of devices) iptables -t nat -A PREROUTING -i br-lan -p udp --dport 53 -j DNAT --to On openwrt and other releases, switch on masquerading, it is required. Now a question to TorGuard, do you/can you offer alternative ports for those who maybe can't use first method described, neither this second solution. To find out what is going on through your DNS port, read here.
  6. forget about software kill switches, as you can't trust them in firewall, in ddwrt, put this line iptables -I FORWARD -s -o $(nvram get wan_iface) -j DROP this will include from to no single machine with those internal IPs will be access the net, if VPN is not up. this is the real deal, tried and tested, works like a charm ——————— i - insert FORWARD - for packets being forwarded through the router s - source o - defining interface physical name $(nvram get wan_iface) - gets the wan interface name j - jumps to drop - packets are dropped
  • Create New...