How to Setup OpenVPN on a TRENDnet Router
TRENDnet is a security solutions supplier for homes, businesses and offices. It has a high-speed Internet connection and wired and wireless routers for sharing your connection with other devices.
TRENDnet’s wired and wireless routers are ideal because they keep you connected to high-speed Internet, no matter what device you connect with.
Installing ExtremeVPN on your TRENDnet router is an excellent approach to secure any network-connected devices. This solution is helpful if you have gadgets that can connect to the Internet but cannot install a VPN.
ExtremeVPN provides clients maximum security against dangerous internet threats and the ability to install in a router. This post will show how to configure ExtremeVPN on your router’s OpenVPN server settings.
To provide authentication and encryption of its communications, OpenVPN employs the SSL and TLS protocols. Its server enables clients to establish an encrypted private connection over the Internet to access shared local network resources like documents, media, and other connected devices.
Also, remember that some TrendNet router models do not support the OpenVPN SSL/TLS protocol. As a result, such versions will necessitate a DD-WRT firmware upgrade before configuration.
Think of the Following
- A constant Internet connection: Before you begin, be sure you have a strong Internet connection. Because the ExtremeVPN and TRENDnet networks will interact, you will need a robust Internet connection, as only a reliable network will allow this to work. Most TRENDnet routers include VPN, which consists of an SSL VPN client protocol that supports Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP).
- ExtremeVPN Premium Account: There are various VPN services, many of which are harmful malwares in disguise. Many VPN services, particularly free ones, are unreliable; consequently, we recommend using an ExtremeVPN premium (paid membership) account for this setup.
- Obtain your ExtremeVPN credentials; use your registered login details to enter the membership panel of your ExtremeVPN account. Go to the subscription tab on the dashboard, then scroll down to see your login and password, which you should copy and save for manual configuration.
- Download the DD-WRT firmware files for your TRENDnet router, then login to your router and choose Tools. Select Firmware Upgrade, File, then upload the DD-WRT firmware file you’ve downloaded before clicking Upgrade.
- After upgrading your firmware to DD-WRT, download and extract all OpenVPN files.
Select Services from your DD-WRT Control Panel, then move to the VPN tab and turn on the OpenVPN Client and configure client parameters as follows:
- OpenVPN Client: Click Enable
- CVE Mitigation: Click Disable
- Server IP/Name: Choose your desired server from the list
- Port: For TCP (Select 80) / For UDP (Select 53)
- Tunnel Device: Choose TUN
- Tunnel Protocol: Select TCP/UDP
- Encryption Cipher: Choose AES-256-CBC
- Hash Algorithm: SHA-1
- Inbound Firewall on TUN: Mark it uncheck
- User Pass Authentication: Check mark it
- Enter the ExtremeVPN username and password that you recovered in Step 1 and choose the following options:
- Advanced Options: Turn it on
- TLS Cipher: Choose None
- Compression: Select Adaptive
- NAT: Turn it on (Enable)
- Firewall Protection: Turn it off (Disable)
- Tunnel UDP MSS-Fix: Disable it
- Verify Server Cert.: Check mark it
- TLS Key Choice: Choose TLS Auth
- TLS Key: From the key file you have extracted with the OpenVPN configuration files, copy and paste all the contents.
- Additional Config:
persist-key
persist-tun - CA Cert: From the crt file you got from the OpenVPN configuration files, copy and paste all.
- To use the ExtremeVPN features on your TRENDnet router, press Save button and then hit Apply Settings. You can check the Status tab and OpenVPN to see if your router is on and operational. A simple Google search should indicate whether or not your setup was successful.
How helpful was this guide? Share your thoughts below. Your recommendations matter to us and everyone else in the entire cyber security community.
Comments
No comments.