Shibby also has built in TOR but I haven't gotten it to work fully. The most expensive ones were less than $100 US and I found a used Linksys A/G/N router with enough memory and storage for less than $20. When I upgraded, I just looked at the list of compatible routers for the build of Shibby I wanted to use. Exporting the configuration, or parts of it, in plain text format would require more custom scripting according to a forum I checked so it looks like there has been some thought put into securing user configuration files.Įven the most complicated router is a much simpler device than anything capable of running PFsense. I looked at the backup and nothing in it is in plain text. The user configuration file is only around 16kb. When the router boots up, the working directories with the user configuration are copied into the /tmp directory which is where all the action happens and any changes made there won't survive reboot. Encrypting the whole file system doesn't make that much sense because it consists of around 10mbs, at most, of Linux firmware which is stored in non volatile ram that is always going to be the same. ![]() The security is centered on administrative access when they are on and that can be locked down so that only one authorized computer can access the configuration page from a wired ethernet connection and telnet an SSH can be disabled when not needed as well. Changing the servers stored in the router is a simple copy and paste of the server IP.Ĭlick to expand.No way to do that. The TomatoUSB firmware lets me have two different VPN client connections stored in the router that I can switch on the fly. I can also turn on the wifi on the main router anytime I want to and have two wifi channels with one VPNed and one not. This is a great setup for anyone who has teenagers or house guests using the wifi. I can have wifi completely shutoff on the main router so all wifi connections are automatically VPNed and the only way to connect with my real IP is through an ethernet cable. I wasn't expecting it to be that easy.Īnd now that I've got it working, I have to say this really rocks. I started the VPN and without any hangups it started working. I first tested it for basic internet connectivity and the LAN to WAN connection worked and I couldn't access the setup page of the main router from the second which was one of the things I wanted. I set its local IP to a different IP from the first router and set it on a different wifi channel, set it up for a DHCP WAN connection and connected one of the LAN ports of the main router to the LAN port of the VPNed router. The second router was set up with the VPN following the instructions on the Torguard website. After just a couple of hours of putting things together I got it working. There are several VPNs that support router connections with DDWRT and Tomato and I ended up choosing Torguard, mainly because I didn't have to put up much money for and experiment that I wasn't sure would work that well. ![]() I downloaded a version with VPN support from and flashed it into my spare router. I've been using Tomato as my preferred firmware in my home router and had a couple of spare Linksys WRT54G routers that support Tomato lying around so I just had to find a version of Tomato with OpenVpn support and a VPN provider that supported Tomato. After reading up about it a bit, the simplest solution that came to me was to cascade two routers with the second one connected to a VPN and the first connected to my ISP. The main problem is that there are a lot of instances where I want to use my real IP, mainly for business purposes. The advantages are pretty obvious: Everything connected to the router is automatically VPNed without installing any client software on individual computers. I've been thinking lot about the best way to use a VPN and was intrigued by the idea of setting up a VPN connection in a router.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |