Jump to content
Not connected, Your IP:

Search the Community

Showing results for tags 'dd-wrt'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL







XMPP / Jabber




Found 58 results

  1. Hi AirVPN Forums, Love The Service!. Ok, Well this is my Enquiry, is there a way to Exclude an IP Address on the router, & put it outside the VPN Connection. for example, My laptop is & Thats happily running within VPN. BUT i want To be Outside of this zone & be able to access the internet with 0 VPN Connection.. So it will show the ISP's Provided IP Address.. Sorry if this question is somewhat vague & Badly Formatted. Thanks. Stan464. More INFO Router: Netgear WNR834B DD/FW: DD-WRT OpenVPN Build. GWIP: ISPGW:
  2. Asus RT-N16: DD-WRTBroadcom BCM4716 chip rev 1Clock = 500 MHz (slightly up from factory 480) My bottleneck is at the router while utilizing the DD-WRT OpenVPN Client function. I get a 40% decrease in bandwidth as apposed to using VPN straight from the computer. This is due to limintations of the onboard processor. I use the router because I have just the one VPN account so I have all the computers in the network going through it. I tested the bandwidth with just a single computer connected to assure that it wasn't a network sharing issue. Now I believe my options are: Overclock the hell out of the router. Running some kind of local OpenVPN Server. Purchase a better router. Purchase additional separate monthly VPN accounts I would like to go with 2 because its the cheapest and less risky. Also because I am already running a local tower as SFTP file server and Ubuntu+Debian package archive mirror. Now my knowledge of OpenVPN is limited as is my knowledge of DD-wrt routing functions. Ideally I would like to prevent any and all PlainText traffic. So I think my setup would look roughly like this. Current Configuration: [Computers & Devices] --P--> [Router] --E--> [iSP] --E--> [VPN Provider] --P--> [internet] Proposed Configuration: [Computers & Devices] --P--> [Router] --P--> [Local OpenVPN Server] --E--> [Router] --E--> [iSP] --E--> [VPN Provider] --P--> [internet] P = PlainText E = Encrypted VPN Tunnel
  3. Any one else working on an SSH Tunnelled OpenVPN connection on DD-WRT? I have the SSH Tunnel standing up correctly and the OpenVPN connection connecting correctly. HOWEVER, no port 80 traffic. Only pings, traceroute, etc. Ideas? Suggestions? Once I have it working I will write up a how to. If you are in China you need this info!
  4. Hello ppl, I am new here I am looking for help on a few things. DD-WRT v24-sp2 (05/27/13) (SVN revision 21676) on Netgear WNDR4300 I can connect using OpenVpn Client (gui) after some troubble using this outdated? guide https://airvpn.org/ddwrt/ The guide says "Select TLS Cipher to "AES-256 SHA" " This exact option is not available for me. Any other of the available options for TLS Cipher than the folowing fails: TLS-DHE-RSA-WITH-AES-128-CBC-SHA TLS-RSA-WITH-AES-128-CBC-SHA TLS-RSA-WITH-RC4-128-MD5 Please see this screenshot of the options used. (Green works) Can someone please explain why and if I should or can change anything.
  5. HOW TO FORWARD PORTS TO YOUR DEVICES WITH IPTABLES You need to create a basic DNAT on your router. Remember that the router GUI forwards ports from the WAN to LAN. When connected to the VPN you must forward ports from TUN to LAN. Therefore, it is imperative that you do NOT forward ports in the GUI of the router. Assuming that: destIP is the IP address of the destination deviceport is the port you wish to forward to that devicetun1 is the tun interface of your router (please check! on some routers it can be tun0, on Tomato it can be tun11)you need to forward both TCP and UDP packetsyou need to add the following rules. Please note that the following rules do NOT replace your already existing rules, you just have to add them. iptables -I FORWARD -i tun1 -p udp -d destIP --dport port -j ACCEPT iptables -I FORWARD -i tun1 -p tcp -d destIP --dport port -j ACCEPT iptables -t nat -I PREROUTING -i tun1 -p tcp --dport port -j DNAT --to-destination destIP iptables -t nat -I PREROUTING -i tun1 -p udp --dport port -j DNAT --to-destination destIP Note: if your router firmware iptables supports the multiport module you can use --match option to make your rules set more compact. Please see here, thanks to Mikeyy https://airvpn.org/topic/14991-asuswrt-merlin-multiple-ports/?do=findComment&comment=31221 Kind regards
  6. I've been looking at pre-configured DD-WRT dual band routers on flashrouters[dot]com. They set up OpenVPN on a list of VPN services, but AirVPN isn't listed. They also offer to install/configure for other OpenVPN providers if there's a install manual provided by the VPN provider. Will there be any problem with sharing the install information to them? Is it against the rules to run connections from 2 computers through the router to your service?
  7. Hello, This post is to everyone that have openvpn configured in a dd-wrt router and wants to block all connections through the ISP if the VPN connection fails, avoiding leaking our real ISP IP. I setup the connection to AIRVPN servers using the tutorial in https://airvpn.org/ddwrt and then insert following line to the firewall rules: "iptables -I FORWARD -i br0 -o vlan2 -j DROP" - br0 is the bridge with my lan ports & wireless - vlan2 is my WAN port connected to the modem ISP So if there is any connection starting from my lan or wifi to the wan port the firewall of the router blocks the connection. My firewall rules are like this: iptables -I FORWARD -i br0 -o tun0 -j ACCEPT iptables -I FORWARD -i tun0 -o br0 -j ACCEPT iptables -I FORWARD -i br0 -o vlan2 -j DROP iptables -I INPUT -i tun0 -j REJECT iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE [sTAFF EDIT] In case you apply Policy Based Routing, please see here as well: http://www.dd-wrt.com/phpBB2/viewtopic.php?p=777788 Check the interface names and make sure to enter the correct names (in your firmware the tun interface might be tun1 or tun0, etc.).
  8. Well the things in THIS (https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=2353&limit=6&limitstart=6&Itemid=142) posting did not work as far as I can tell. So I did some more work and: FIRST THIS APPLIES to an OpenVPN client on a DD_WRT router NOT to the client on a PC. It is helpful to be able to telnet to the router and issue commands in this way. The notes below are done by telnet. EDIT: Please note if you use the last entry above in the firewall (iptables -I OUTPUT -o br0 ! --dst a.b.c.d -j DROP) you will lose access to the router. Thus if the tunnel goes down ...well you know. So you may want to leave this entry off the GUI and if/when you are set up properly and then run it from the telnet prompt. That way if you need router access you can reboot and be OK. First determine the router interface(s). the command is netstat -r On the far right of the output interfaces are listed. In my case I was using iptables for the tun0 interface .... the interface on the router is tun1 .. !! so the firewall commands needed to look like this: iptables -I FORWARD -i br0 -o tun1 -j ACCEPT iptables -I FORWARD -i tun1 -o br0 -j ACCEPT iptables -I INPUT -i tun1 -j REJECT iptables -t nat -A POSTROUTING -o tun1 -j MASQUERADE iptables -I OUTPUT -o br0 ! --dst a.b.c.d -j DROP # if destination for outgoing packet on eth+ is NOT a.b.c.d, drop the packet, so that nothing leaks if VPN disconnects # the above line can be duplicated for as many Air servers as you wish to connect to, just insert the appropriate Air server entry-IP Fill a.b.c.d with the remote server ip in your air.ovpn file After running these (you may want to run iptables -F first to flush previous) with YOUR interfaces determined from above, save the firewall and REBOOT. Then after reboot telnet again and run the command ps This will tell if Openvpn started .. in my case the start is unreliable. If OpenVPN is not running try this command (sleep 30 && (ps | grep openvpn | grep -v grep || openvpn --config /tmp/openvpncl/openvpn.conf --route-up /tmp/openvpncl/route-up.sh --down /tmp/openvpncl/route-down.sh --daemon))& This will check if it is running and if not will start the client. Now you can use the ps command to check and after then check your connection to AirVPN. You can also check the iptables with the command netstat -vnL. Hope this is helpful to some and saves some work/head scratching. Comments on the above very welcome, Cheers EDIT: Please note if you use the last entry above in the firewall (iptables -I OUTPUT -o br0 ! --dst a.b.c.d -j DROP) you will lose access to the router. Thus if the tunnel goes down ...well you know. So you may want to leave this entry off the GUI and if/when you are set up properly and then run it from the telnet prompt. That way if you need router access you can reboot and be OK. Also this start-up command (enter in Admin>Command window and save start-up) seems to insure the client runs .. sleep 60 (sleep 30 && (ps | grep openvpn | grep -v grep || openvpn --config /tmp/openvpncl/openvpn.conf --route-up /tmp/openvpncl/route-up.sh --down /tmp/openvpncl/route-down.sh --daemon))& It takes longer to connect but seems to do so each time correctly.
  • Create New...