Jump to content

Search the Community

Showing results for tags 'router'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • The TorGuard Lounge
    • General Discussion
    • Member Tutorials
  • TorGuard Software Releases
    • TorGuard Client Releases
    • Android Client Releases
    • iOS App Releases
    • Browser Extension Releases
  • TorGuard Community Support
    • VPN Questions and General Support
    • Proxy Questions and General Support

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 14 results

  1. clueless,no 24/7 support that’s a joke it’s all sell sell sell
  2. LEDE - OPENWRT TORGUARD VPN SETUP Regards Mike OK - I decided to put this up on the TorGuard Forum as I could not find a tutorial anywhere with specific step by step instructions for getting Torguard OPENVPN working with OpenWrt/ Lede. In advance, I want to thank the excellent support team at TorGuard ( especially Mike & Andy ) for assisting me with getting my Lede/Openwrt VPN router up and running. I use davidc502 firmware which is described as Moderately Customized LEDE Development Builds found here - https://davidc502sis.dynamic-dns.net/releases/ and here - https://davidc502sis.dynamic-dns.net/snapshots/ -- davidc502's forum found here - https://forum.lede-project.org/t/davidc502-wrt1200ac-wrt1900acx-wrt3200acm-wrt32x-builds/15839/80 - Dave's builds are for Linksys WRT1900AC v1 Linksys WRT1900AC v2 Linksys WRT1900ACS Linksys WRT3200ACM Linksys WRT1200AC models ONLY !!! One of the many benefits of using Dave's custom firmware is that it comes with many pre-installed and configured software packages - including OpenVpn and Dnscrypt - I use both in conjunction on my router. For full list of packages see Dave's configuration seed found here - https://davidc502sis.dynamic-dns.net/releases/config.seed - However, the guide tutorial here will work on any and every OpenWrt/ Lede firmware based router. I also tested this with Lede stable firmware ( current version 17.01.4 ) found here - https://lede-project.org/downloads - Anyway - here we go - this is Mike's detailed original answer to my inquiry concerning my request for assistance in setting up OpenVpn on OpenWrt /Lede. I have added a few edits in order to make this more comprehensible and easier to implement. This guide will work Guaranteed if you follow instructions step by step. Mike // Staff Thank you, can you check if the steps below works ok for you 1) Then in Luci Gui go to System > Software, do update first ( ssh command opkg update ) then search for openvpn and install openvpn-openssl and luci-app-openvpn. ( uci ssh command - opkg install openvpn-openssl luci-app-openvpn ) These are necessary - Luci is GUI frontend for Openwrt - it comes pre-installed with davidc502's firmware. Also installed on Lede stable. 2) Here you Generate OpenVpn config on https://torguard.net/tgconf.php?action=vpn-openvpnconfig choosing openwrt. 3) Login using ftp client like winscp to the router (openwrt) and the config file downloaded from the tool to be uploaded to box and renamed as /etc/config/openvpn To make this simpler - you can copy and paste the newly generated text file to a text file on your desktop and /or download config file to your desktop. Install nano ( preferred text editor ) - opkg install nano - if you need to install nano - ( if not already there / comes pre-installed in davidc502's builds ) to your router. SSH into router then type ( copy and paste ) -" nano /etc/config/openvpn " ( without parenthesis ) - erase all contents of file ( hold Ctrl + k ) and replace ( copy and paste ) with contents of config file you copied and downloaded earlier. Sample of my /etc/config/openvpn config file - adjust yours as you see fit but stick with config from https://torguard.net/tgconf.php?action=vpn-openvpnconfig as your basic guide - config openvpn 'TorGuard_AES256GCM_SHA256' option client '1' option dev 'tun' option proto 'udp' option resolv_retry 'infinite' option nobind '1' option persist_key '1' option persist_tun '1' option ca '/etc/openvpn/torguard/ca.crt' option remote_cert_tls 'server' option tls_auth '/etc/openvpn/torguard/ta.key 1' option cipher 'AES-256-GCM' option comp_lzo 'adaptive' # AS of March 2018 and OpenVpn 2.4.5 use option compress 'lzo' otherwise you can not connect option verb '4' option fast_io '1' option auth_user_pass '/etc/openvpn/torguard/userpass.txt' option remote_random '0' option auth 'SHA256' option reneg_sec '0' option port '1195' list remote 'ny.east.usa.torguardvpnaccess.com' option sndbuf '393216' option rcvbuf '393216' option enabled '1' option keepalive '10 120' option auth_nocache '1' option tls_client '1' option setenv 'CLIENT_CERT 0' option tls_version_min '1.2' option tls_cipher 'TLS-DHE-RSA-WITH-AES-256-GCM-SHA384' option ncp_ciphers 'AES-256-GCM:AES-128-GCM' option tun_mtu '1500' option tun_mtu_extra '32' option ncp_disable '1' option engine 'dynamic' option mute_replay_warnings '1' option disable_occ '1' option keysize '256' option mssfix '1450' option script_security '2' option reneg_bytes '1073741824' option mute '20' option pull '1' option log '/tmp/openvpn.log' Then hit Ctrl + o - you will be asked to write file - hit enter to save file - then Ctrl + x to close file and go back into shell 4) create folder /etc/openvpn/torguard and add under it the ca.crt, ta.key from https://torguard.net/downloads/ta.key and https://torguard.net/downloads/ca.crt and create new file userpass.txt where in it put on first line your vpn username and second you vpn password. Create /etc/openvpn/torguard folder ( in ssh session into router - type - " mkdir /etc/openvpn/torguard " ( without parenthesis ) - in order to proceed - opkg install wget ( if you need to install wget ) ssh into router use wget ( install wget if not already there / comes pre-installed in davidc502's builds ) to issue following commands in order to install necessary files to /etc/openvpn/torguard folder which you just created : type the following commands in shell A - " wget -P /etc/openvpn/torguard https://torguard.net/downloads/ta.key " ( without parenthesis ) - copy and paste - ( ta.key is downloaded to /etc/openvpn/torguard folder ) B - " wget -P /etc/openvpn/torguard https://torguard.net/downloads/ca.crt " ( without parenthesis ) - copy and paste - ( ca.crt is downloaded to /etc/openvpn/torguard folder ) C - type ( copy and paste ) " nano /etc/openvpn/torguard/userpass.txt " ( without parenthesis ) - in new text file type ( copy and paste ) in first line your TorGuard Vpn username and on second line your TorGuard Vpn password - Then hit ( Ctrl + o ) - you will be asked to write file - hit enter to save file - then ( Ctrl + x ) to close file and go back into shell - userpass.txt is now added under /etc/openvpn/torguard/ folder as well Now - these commands are required from my past experience - still in SSH type ( copy and paste ) chmod 0777 /etc/openvpn/torguard/ta.key chmod 0777 /etc/openvpn/torguard/ca.crt chmod 0400 /etc/openvpn/torguard/userpass.txt There are two alternative methods available in order to create the necessary openvpn network interface and complimentary firewall rules. The first one I will feature is through the command line shell - using uci commands. The second is simply done through the Luci Web GUI. Personally, I use the uci command line approach as I feel the firewall rules for the vpn connection are more secure in nature using this method. For the sake of this tutorial, consider command line - uci - Scenario A - and Luci Web Gui method - Scenario B. Both will create an interface and working firewall rules and in the end - and leave you with a working TorGuard OpenVpn configuration and subsequent connection. GUARANTEED ! Remember this is either A or B - not A AND B !!! - you can not use both. It is one or the other. Scenario A - TorGuard OpenVpn Network Interface Creation and Setup via command line - uci uci set network.myvpnc=interface uci set network.myvpnc.proto=none uci set network.myvpnc.ifname=tun0 uci commit network TorGuard OpenVpn Firewall Rules Setup via command line - uci uci add firewall zone uci set [email protected][-1]=zone uci set [email protected][-1].name=myvpnc_fw uci set [email protected][-1].network=myvpnc uci set [email protected][-1].input=REJECT uci set [email protected][-1].output=ACCEPT uci set [email protected][-1].forward=REJECT uci set [email protected][-1].masq=1 uci set [email protected][-1].mtu_fix=1 uci add firewall forwarding uci set [email protected][-1]=forwarding uci set [email protected][-1].src=lan uci set [email protected][-1].dest=myvpnc_fw uci commit firewall reboot Scenario B - TorGuard OpenVpn - Luci ( Web Gui ) Network Interface Creation and Setup and Firewall Rules Setup 1 ) Back on Luci ( Lede/OpenWrt Gui ). Go to Network > Interfaces and add new interface name the interface " MYVPN " - make sure the " Protocol of the new interface " at top of page is set to " Unmanaged " and at bottom of page select " Custom " and enter " tun0 " ( tun number zero ) in the field next to custom radio button. Click On Submit then Save and Save and Apply Settings 2 ) Go to Network > Firewall section, click add " new zone " and make it to " "accept " ( all three up top - accept all options ) input/output/forward/masquarde, ( check " masquerade " box under where you accepting all . Then choose - enter check mark in box next to interface VPN ( Covered networks ). Then in bottom box " Inter-Zone Forwarding " ( Allow forward to destination zones: ) = LAN and then ( Allow forward from source zones: ) = LAN This means click both radio buttons next to lan in last section on firewall " newzone " you just created. Lastly, Click On Save and Save and Apply Settings - 3 ) Go to Services > Openvpn and start the VPN service. All should be up and running after this. Support said they would post this in tutorials for Openwrt/Lede firmware. As I said, I just put this up to save folks time if they run TorGuard VPN. By the way, it is an excellent VPN service. Easier setup than PIA VPN - specifically on Lede/Openwrt. Again - thanks to TorGuard Support. Bonus Feature- For Adding DNS-Over-TLS support to OpenWRT (LEDE) with Unbound see here: https://torguard.net/forums/index.php?/topic/1374-adding-dns-over-tls-support-to-openwrt-lede-with-unbound/ or here: https://forum.lede-project.org/t/adding-dns-over-tls-support-to-openwrt-lede-with-unbound/13765
  3. I'm having minor difficulties setting up TorGuard VPN to my TP-Link Archer A2300 router. The connection I'm trying to use is L2TP. Do I use OpenVPN? Is there certain certificates I need? Can someone please help me out. I'm following the basic setup/manual/instructions but It's just not working for me, I don't know what I'm doing wrong. 😢
  4. Hi, I have wireguard on my router as client and also via the wireguard app on my android cell. The download speed is awesome, the same as my ISP is. But the upload is about 0 to 1 mbps instead of 15. Idea? Thanks
  5. Got instructions to setup my router to use VPN but being totally computer-ignorant can not make the connection. Is there a simple way to get my router to use Torguard?
  6. So I see TorGuard now provides 'residential streaming IPs'. Sounds very promising. However, if I just need streaming, and because most browsing is now over TLS, I don't need any VPN encryption at all (which coincidentally is the bottleneck with 99% of routers). So ideally I'd pay for, say, an NYC residential IP address, and use my Ubiquity EdgeRouter-Lite (which is not speedy at all when used with OpenVPN and can't use hardware for L2TP encryption), so I'd get the maximum possible speed. My question: Is it possible to configure some sort of PPTP-client for TorGuard with no encryption whatsoever?
  7. Hi, is it possible to use a dedicated IP with torguard installed on a tomato router ? If yes, what is the procedure ? Thank you, Benjamin
  8. Dear Support, I submitted a ticket before regarding setting up Torguard in any compatible router using Stealth port. I was told by the tech this is only supported on DD-WRT firmware versions r24xx to r29xx. (Don’t know why) I read through the official documentations about the related instructions, none of which mentioned enabling stealth feature. In the OpenVPN configuration generator tool, stealth port is not an option. Also, as far as I know the stealth feature uses direct IP of the server rather than the domain name. What is Torguard's plan and progress about this issue? Will Torguard develop or update the instruction document for the clients, which is easy to read and operate. By the way, I am currently in China and has been happy with Torguard for the price and the product. It is not urgent; I just want to know how I can make Torguard more effective and efficient. Thank you for your support and attention.
  9. Hi Guys, I want to be in VPN no matter what device is connected to my router so, seems like my ASUS RT-AC88U can connect as a client to VPN services by PPTP, L2TP and OpenVPN. Question is, how can I do it? If I opt in for OpenVPN, seems like I need a .ovpn file to import. Any ideas? Thanks
  10. If you are lucky to have pfsense box, then use this hack to create full proof kill switch: Firewall > Rules, Floating tab Action: Pass Disabled: unchecked Quick: checked Interface: WAN Direction: out TCP/IP Version: IPv4 Protocol: UDP Source: any Destination: TorGuard's IP ADDRESS Destination port range: VPN X port of TorGuard's VPN server Then below that rule: Action: Reject Disabled: unchecked Quick: checked Interface: WAN Direction: out TCP/IP Version: IPv4 Protocol: any Source: any Destination: any Destination port range: any That will allow outbound connections to only 1 IP on UDP X and block everything else. x = port
  11. I would like to configure my RT-AC68U router with torguard. I'd like one specific server to be connected to automatically, and if possible have another application automatically under a different server (two simultaneous if possible). This is a private IP that I do not see in the openVPN setup guide. Is this doable? If not, is there a way to switch to the new one upon the application starting? Lastly, is there a way I can set default DNS servers, but have torguard take over them when connected, and have them returned when it disconnects?
  12. For a couple of months now I have been using the Synology 1900 to run Torguard VPN. I have it setup to run through the router to my entire house. I had a bit of a time setting it up, but now have the hang of getting what I need through Torguard's config tool. I have run into some problems I hope that others who have this router may help me with. What type of speed drop should I expect when using VPN? My normal speed is about 70mbps, and with Tor on, it drops to a high of around 20mbps. Average about 12mbps. Is that roughly what I can expect? Even at that drop off I am OK with it, if that was the only issue...but it isn't. The bigger issue is that the connections don't seem stable. I mean I will get a call at work from my family saying that the internet is not working. I dial into the modem and turn off the VPN connection and of course everything is OK again. Most of the time I can then tell it to re-connect to the same exact TOR portal and everything will work as usual. Then time goes by(day or two at most) and the same thing will happen again. Is this the same experience that other Synology owners have, and is this the norm for all VPN companies? Or is it time to call TOR customer service to troubleshoot, find another VPN service, or a better router? I would love to hear your experience. Thanks
  13. Hello, I am struggling with my different configuration to get a decent download rate with torrents. I have followed the different guides and faqs provided by Torguard, but my dl speed rarely goes above 100ko/s (Without Torguard, I usual dl at 2Mb/s) On Deluge network settings, I have set port 50799 to be used On Proxy settings, I have selected SocksV5+Auth for each proxy, using host proxy.torguard.org and port 1090 On my physical router, I have set a route for port 50799 and 1090 (internal + external) on both protocol TCP & UDP to be redirected to the IP Address of my computer (private IP Does anyone have an idea what setting could be wrong or missing ? Thanks !
  14. Ok, I am not sure if this question should be in general VPN or the router section ... but it's sort of a two-level question, so I figured I would post it here. I have a Netgear Nighthawk R7000 router, which offers built-in VPN. But it seems that, at least on the stock firmware, I still have to have an instance of OpenVPN running on a computer at all times for the router to be able to use the VPN for all other connected devices, is this correct? Mostly what I would like to do is have all devices in my home use my TorGuard VPN without having to open up a client on all of them, and would definitely prefer it if I didn't have to have an instance running on a computer at all times. Most of my time is spent on various laptops and devices around the house, and my super-power-hungry PC (which is, seemingly, the best place to keep OpenVPN running) stays off for a good portion of the day. Any insight or ideas? Thanks.
  • Create New...