• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

FlashRouters Support Portal

Prioritizing Privacy

  • SETUP GUIDES
    • DD-WRT Router Setup Guide
    • AsusWRT-Merlin Router Setup Guide
    • ExpressVPN Router Setup Guide
    • GL.iNet Router Setup Guide
    • Privacy Hero Router Setup Guide
    • Roqos Core Router Setup Guide
  • TROUBLESHOOTING
    • Router Access
    • WiFi Connectivity
    • Internet Connection Issues
    • General VPN Issues
    • FR Privacy App
    • DD-WRT Firmware
    • TeamViewer Remote Support
  • FAQs
    • Router FAQs
    • VPN FAQs
    • Warranty and Returns FAQs
    • Sales FAQs
    • Shipping FAQs
    • Service Plan FAQs
  • Show Search
Hide Search

Search Results for: firmware dd-wrt

Windscribe Manual OpenVPN Setup

TeamFlashRouters · Apr 25, 2019 ·

Preparing for Manual Windscribe Setup

Verify your Windscribe login information

If you are not already an Windscribe user Sign Up Now.

1. Log in to your account on the Windscribe website.

2. Click on the Download link at the top of the page.

3. Scroll down to the Config Generators section and Click on the OpenVPN link.

Windscribe Website - Generate OpenVPN Configuration Files

4. Click on Get Credentials and copy the Username and Password. This information will be used later on in the configuration.

Windscribe Website OpenVPN Specific Username and Password

Windscribe Server Addresses

United States

US East:
us-east.windscribe.com
US West:
us-west.windscribe.com
US Windflix:
wf-us.windscribe.com

Canada

Canada:
ca.windscribe.com
Canada West:
ca-west.windscribe.com

Additional Servers

Australia:
au.windscribe.com
Austria:
at.windscribe.com
Belgium:
be.windscribe.com
Brazil:
br.windscribe.com
Bulgaria:
bg.windscribe.com
Czech Republic:
cz.windscribe.com
Denmark:
dk.windscribe.com
Egypt:
eg.windscribe.com
Finland:
fi.windscribe.com
France:
fr.windscribe.com
Germany:
de.windscribe.com
Hong Kong:
hk.windscribe.com
Hungary:
hu.windscribe.com
India:
in.windscribe.com
Ireland:
ie.windscribe.com
Italy:
it.windscribe.com
Japan:
jp.windscribe.com
Latvia:
lv.windscribe.com
Luxemburg:
lu.windscribe.com
Malaysia:
my.windscribe.com
Mexico:
mx.windscribe.com
Netherlands:
nl.windscribe.com
Norway:
no.windscribe.com
Poland:
pl.windscribe.com
Romania:
ro.windscribe.com
Russia:
ru.windscribe.com
Singapore:
ch.windscribe.com
South Africa:
za.windscribe.com
South Korea:
kr.windscribe.com
Spain:
es.windscribe.com
Sweden:
se.windscribe.com
Switzerland:
ch.windscribe.com
Taiwan:
tw.windscribe.com
Turkey:
tr.windscribe.com
Ukraine:
ua.windscribe.com
United Kingdom:
uk.windscribe.com

DD-WRT Router Setup for Windscribe

Navigate to Services > VPN

Enter Windscribe settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and Paste the server you would like to connect to from the server list above. Be sure there are no extra spaces or characters.

If you wish to change Windscribe connection locations, THIS IS THE ONLY FIELD YOU NEED TO CHANGE.

Port

443

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA512

User Pass Authentication

Enable

Username

Enter your OpenVPN specific Username.

Password

Enter your OpenVPN specific Password.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

TLS Auth Key

-----BEGIN OpenVPN Static key V1-----
5801926a57ac2ce27e3dfd1dd6ef8204
2d82bd4f3f0021296f57734f6f1ea714
a6623845541c4b0c3dea0a050fe6746c
b66dfab14cda27e5ae09d7c155aa554f
399fa4a863f0e8c1af787e5c602a801d
3a2ec41e395a978d56729457fe6102d7
d9e9119aa83643210b33c678f9d4109e
3154ac9c759e490cb309b319cf708cae
83ddadc3060a7a26564d1a24411cd552
fe6620ea16b755697a4fc5e6e9d0cfc0
c5c4a1874685429046a424c026db672e
4c2c492898052ba59128d46200b40f88
0027a8b6610a4d559bdc9346d33a0a6b
08e75c7fd43192b162bfd0aef0c716b3
1584827693f676f9a5047123466f0654
eade34972586b31c6ce7e395f4b478cb
-----END OpenVPN Static key V1-----

Additional Config

tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful VPN connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit WhatIsMyIPAddress to verify your new IP address, virtual location, and status as Protected at the top of the page.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to Windscribe VPN.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the Windscribe server

  1. Copy and paste the server IP Address from the server list above into the Server IP/Name field.
  2. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

IPVanish Manual OpenVPN Setup

TeamFlashRouters · Apr 5, 2019 ·

Preparing for Manual IPVanish Setup

Verify your IPVanish login information

If you are not already an IPVanish user Sign Up Now.

Log in to your account on the IPVanish website.

IPVanish Server Addresses

View a full list of IPVanish servers.

America

Ashburn:
iad-a01.ipvanish.com
through
iad-a78.ipvanish.com

Atlanta:
atl-a01.ipvanish.com
through
atl-a88.ipvanish.com

Boston:
bos-c01.ipvanish.com
through
bos-c27.ipvanish.com

Chicago:
chi-a01.ipvanish.com
through
chi-a58.ivpanish.com

Cleveland:
cle-c01.ipvanish.com
through
cle-c20.ipvanish.com

Dallas:
dal-a01.ipvanish.com
through
dal-a79.ipvanish.com

Denver:
den-c01.ipvanish.com
through
den-c13.ipvanish.com

Jackson:
jan-c01.ipvanish.com
through
jan-c15.ipvanish.com

Las Vegas:
las-c11.ipvanish.com
through
las-c20.ipvanish.com

Los Angeles:
lax-a01.ipvanish.com
through
lax-a60.ipvanish.com

Miami:
mia-a01.ipvanish.com
through
mia-a34.ipvanish.com

Milwaukee:
mke-c01.ipvanish.com
through
mke-c19.ipvanish.com

New York:
nyc-a01.ipvanish.com
through
nyc-a51.ipvanish.com

Phoenix:
phx-a01.ipvanish.com
through
phx-a24.ipvanish.com

Salt Lake City:
slc-c01.ipvanish.com
through
slc-c12.ipvanish.com

San Jose:
sjc-a01.ipvanish.com
through
sjc-a27.ipvanish.com

Seattle:
sea-a01-ipvanish.com
through
sea-a41.ipvanish.com

St. Louis:
stl-c01.ipvanish.com
through
stl-c18.ipvanish.com

United Kingdom

London:
lon-a01.ipvanish.com
through
lon-a69.ipvanish.com

lon-c01.ipvanish.com
through
lon-c58.ipvanish.com

Manchester:
man-c01.ipvanish.com
through
man-c09.ipvanish.com

DD-WRT Router Setup for IPVanish

Navigate to Services > VPN

Enter IPVanish settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you would like to connect to from the server list above. Be sure there are no extra spaces or characters.

If you wish to change IPVanish connection locations, THIS IS THE ONLY FIELD YOU NEED TO CHANGE.

Port

443

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA256

User Pass Authentication

Enable

Username

Enter the Username you successfully logged in to your IPVanish account with.

Password

Enter the Password you successfully logged in to your IPVanish account with.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

Additional Config

persist-key
persist-tun
persist-remote-ip
keysize 256

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful IPVanish connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit IPVanish’s IP Check to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to IPVanish.

Back up your settings

Navigate to Administration > Backup.

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the IPVanish server

  1. Copy the new IPVanish server address from the above server list.
  2. Paste the server into the Server IP/Name field.
  3. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

NordVPN Manual OpenVPN Setup

TeamFlashRouters · Apr 8, 2019 ·

Preparing for Manual NordVPN Setup

Verify your NordVPN login information

If you are not already an NordVPN user Sign Up Now.

Log in to your account on the NordVPN website.

NordVPN Server Addresses

For a NordVPN server recommendation visit their Recommend Server page.

Once you have selected the server you want to connect to, download the UDP .ovpn file containing the Server IP Address, TLS Auth Key, and CA Cert referenced below.

Open the .ovpn file that is downloaded to your computer with NotePad++ for Windows or TextEdit for Apple. You will only need the Server IP Address, TLS Auth Key, and CA Cert from this file. All NordVPN servers and .ovpn files have different IP Addresses, keys, and certificates.

DD-WRT Router Setup for NordVPN

Navigate to Services > VPN

Enter NordVPN settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

At the top of the .ovpn file you downloaded above, there is a line e.g.:
remote 206.226.72.27 1194
206.226.72.27 is your NordVPN server IP address. Enter the IP Address in this field.

Port

1194

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA512

Userpass Authentication

Enable

Username

Enter the Username you successfully logged in to your NordVPN account with.

Password

Enter the Password you successfully logged in to your NordVPN account with.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

TLS Auth Key

In the .ovpn file copy and paste all contents in between the <tls-auth> and </tls-auth> lines from your .ovpn file starting and ending with:
—–BEGIN OpenVPN Static key V1—–
…
—–END OpenVPN Static key V1—–

Additional Config

tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

In the .ovpn file Copy and Paste all contents in between the <ca> and </ca> lines from your .ovpn file starting and ending with:
—–BEGIN CERTIFICATE—–
…
—–END CERTIFICATE—–

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful NordVPN connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit NordVPN’s website to verify your new IP address, virtual location, and status as Protected at the top of the page.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to NordVPN.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the NordVPN server

  1. Download and open a new .ovpn file from NordVPN.
  2. Copy and paste the server IP Address into the Server IP/Name field.
  3. Copy and paste the TLS Auth Key into the TLS Auth Key field.
  4. Copy and paste the CA Cert into the CA Cert field.
  5. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

Windscribe WireGuard Setup

TeamFlashRouters · Oct 13, 2021 ·

Preparing for Windscribe WireGuard Setup

Verify your Windscribe login information

If you are not already a Windscribe user Sign Up Now.

Log in to your account on the Windscribe website.

Windscribe Login

Go to the Windscribe WireGuard config generator page and select the Server location and Port you would like to use. Click Download Config.

Windscribe Wireguard select server location

Open the .conf file that is downloaded using Notepad in Windows or TextEdit in Mac.

DD-WRT Router Setup for Windscribe WireGuard

Navigate to Setup > Tunnels 

Enter Winscribe WireGuard settings

1. Click Add Tunnel.

2. Set Tunnel to Enable.

Setup - Tunnel - Enable Tunnel

3. Select Wireguard from the dropdown.

Setup - Tunnel - Select Wireguard

3. Set CVE-2019-14899 Mitigation to Enable. Set NAT via Tunnel to Enable. Set Local Port to 51820. Set MTU to 1420.

Windscribe Wireguard Basic Settings

4. Check Firewall inbound and Kill Switch.

Windscribe Wireguard enable Firewall and Kill Switch

5. Set Advanced Settings to Enable and copy the PrivateKey from the .conf file and paste it into the Local Private Key field.

Windscribe Wireguard conf file PrivateKey
Windscribe Wireguard Local Private Key

6. Click Add Peer.

Windscribe Wireguard Add Peer

7. Set Peer Tunnel IP to 0.0.0.0. Set Peer Tunnel DNS to the DNS found in the .conf file.

Windscribe Wireguard Peer Tunnel IP and DNS

8. Set Endpoint to Enable. Copy and Paste the Endpoint from the .conf file and paste it into the Endpoint Address field. Enter the same Port that appears next to the Endpoint.

Windscribe Wireguard conf file Endpoint
Windscribe Wireguard paste Endpoint

9. Leave Allowed IPs as 0.0.0.0/0. Set Router Allowed IP’s via tunnel to Enable. Set Persistent Keep Alive to 25.

Windscribe Wireguard settings

10. Copy and Paste the PublicKey from the .conf file and paste it into the Peer Public Key field.

Windscribe Wireguard conf file PublicKey
Windscribe Wireguard Peer Public Key

11. Set Use Pre-shared Key to Enable. Copy and Paste the Presharedkey from the .conf file and paste it into the Pre-Shared Key field.

Windscribe Wireguard conf file PresharedKey
Windscribe Wireguard Pre-shared Key

12. Copy the Address from the .conf file and paste it into the IP Addresses/Netmask(CIDR) field.

Windscribe Wireguard IP Address
Windscribe Wireguard conf file Address

Certain DD-WRT builds will show two separate fields here: IP Address and Subnet Mask. If that is the case set the IP Address field to the Address without the /32 added and set the Subnet Mask to 255.255.255.255

21. At the bottom of the page click Save and then click Apply Settings.

Verify a successful Winscribe connection

Navigate to Setup > Tunnels

  1. You should Endpoint, Latest handshake, and Transfer in the WireGuard status area.
  2. Visit whatismyipaddress.com to verify your status as using Winscribe.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

CyberGhost Manual OpenVPN Setup

TeamFlashRouters · Apr 9, 2019 ·

Preparing for Manual CyberGhost Setup

Obtain your CyberGhost OpenVPN Information

If you are not already a CyberGhost user Sign Up Now.

1. Log in to your account on the CyberGhost website.

CyberGhost Website Login

2. Select My Devices.

3. Select Other and then Configure New Device.

CyberGhost Website OpenVPN Configuration Files Generator Cyberghost - Website Screen CyberGhost Website OpenVPN Configuration Files Generator

4. Set Protocol to OpenVPN. Select the Country you would like to connect to. Select the Server Group. Name the device in the Device Name field. Click Save Configuration.

CyberGhost Website OpenVPN Configuration Files Generator 3

5. Press View configuration.

CyberGhost Website OpenVPN Configuration Files Generator 2

6. Copy the Username, and Password that appear to a notepad, since you will need this information later in the setup process. Click Download Configuration.

CyberGhost Website OpenVPN Configuration Files Generator 1

Open the file that was downloaded with NotePad++ for Windows or TextEdit for Apple. You only need the ca.crt, client.crt, and client.key files. All CyberGhost servers have different keys and certificates.

DD-WRT Router Setup for CyberGhost

Navigate to Services > VPN

Enter CyberGhost settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you selected in your account. Be sure there are no extra spaces or characters.

Port

443

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA256

User Pass Authentication

Enable

Username

Enter the Username you obtained in your CyberGhost account.

Password

Enter the Password you obtained in your CyberGhost account.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

Additional Config

tun-mtu 1500
fragment 1300
mssfix 1300

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

—–BEGIN CERTIFICATE—–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==
—–END CERTIFICATE—–

Public Client Cert

Copy and paste all contents of the client.crt file starting and ending with:
—–BEGIN CERTIFICATE—–
…
—–END CERTIFICATE—–

Private Client Key

Copy and paste all contents of the client.key file starting and ending with:
—–BEGIN PRIVATE KEY—–
…
—–END PRIVATE KEY—–

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful CyberGhost connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit CyberGhost’s website to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to CyberGhost.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the CyberGhost server

  1. Follow the instructions for obtaining the OpenVPN information from above.
  2. Enter the new Server Address in the Server IP/Name field.
  3. Enter the new Username and Password.
  4. Enter the new ca.crt, client.crt, and client.key
  5. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

AirVPN Manual OpenVPN Setup

TeamFlashRouters · Jun 11, 2019 ·

Preparing for Manual AirVPN Setup

Obtain your AirVPN OpenVPN Information

If you are not already a AirVPN user Sign Up Now.

1. Log in to your account on the AirVPN website.

AIRVPN OpenVPN Client Login for FlashRouter DD-WRT VPN Configuration

2. Click on the Client Area tab.

AIRVPN OpenVPN Client Area for FlashRouter DD-WRT VPN Configuration

3. Click on the Config Generator subtab.

AIRVPN OpenVPN Configuration Generator for FlashRouter DD-WRT VPN Configuration

4. Click on the Router icon under Choose your Operating System.

AIRVPN OpenVPN FlashRouter DD-WRT VPN Configuration

5. Select a Protocol under the Protocols section. We recommend UDP.

Select AIRVPN OpenVPN Encryption Protocol for FlashRouter DD-WRT VPN Configuration

6. Select one option under the Choose Servers section. AirVPN sorts these servers by Planet, Continent, Country, and Single servers. Choose whichever best suits your needs.

Sort AIRVPN OpenVPN Specific Certificates for FlashRouter DD-WRT VPN Configuration

7. Scroll down towards the bottom of the page and click on Generate.

Generate AIRVPN OpenVPN Specific Certificates for FlashRouter DD-WRT VPN Configuration

Open the file that was downloaded with NotePad++ for Windows or TextEdit for Apple. You will be copying the Server IP/Name, client.crt and client.key from this file.

Please note, all VPN servers have different keys and certificates. If you wish to change servers in the future, you will have to go through steps 1-7 again.

DD-WRT Router Setup for AirVPN

Navigate to Services > VPN

Enter AirVPN settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you selected in your account. Be sure there are no extra spaces or characters.

Port

443

Tunnel Device

TUN

Tunnel Protocol

UDP or TCP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA1

User Pass Authentication

Disable

Advanced Options

Enable

TLS Cipher

None

LZO Compression

No

NAT

Enable

Firewall Protection

Enable

nsCertType verification

Checked

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

TLS Auth Key

—–BEGIN OpenVPN Static key V1—–
7bb7a23a0f5f28d01e792df68f1764ab
f2688719288808bf58e8a2d4f9354ecf
132625dfb895fc3f6330ae1e868e4dfa
c164c0931593d7f9a7da9595cf353433
8896e1d0a987a0d19838944af8fea4e5
215a3a0c76f4c67d5a4aee6a53be66a4
c88b84f850030840fb30f8550ed8068f
35c1ef34ee8f40a0ea5862dfb6f8d3c5
7ab5e27ac2799cf93e8765ff63cd8cd8
6b391b813925cd373bb202796f64d16f
003d042ca828d1b07f18ba1d0cb0323d
df3ee9287e9e084e655699efb3cffa92
3626946fa372e7beee245e7a95b4c1d8
7d16cae685218d4b8afc019b22e41083
476ee9883fe666d236301e55b2062551
4d91c8a69467a758293994df1e6fa7ae
—–END OpenVPN Static key V1—–

CA Cert

—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

Public Client Cert

Copy and paste all contents between <cert> and </cert> make sure to also include the following lines when copying and pasting:
—–BEGIN CERTIFICATE—–
…
—–END CERTIFICATE—–

Private Client Key

Copy and paste all contents between <key> and </key> make sure to also include the following lines when copying and pasting:
—–BEGIN PRIVATE KEY—–
…
—–END PRIVATE KEY—–

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful AirVPN connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit whatismyipaddress.com to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to AirVPN.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the AirVPN server

  1. Follow the instructions for obtaining the OpenVPN information from above.
  2. Enter the new Server Address in the Server IP/Name field.
  3. Enter the new client.key and private.key
  4. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

My 5.0GHz network is not showing up

TeamFlashRouters · May 2, 2019 ·

Verify the device supports 5GHz

5.0GHz networks are not compatible with all devices so first make sure that you device’s wireless adapter supports 5GHz wireless frequencies.

If you are not sure, find out if your device support 5 GHz via Google search or by looking in the wireless hardware details in the device’s network settings. If you see Wireless a/b/g/n support then you have a compatible device. If you are missing the Wireless a then this means there is no 5 GHz support.

Enter the recommended wireless settings

Our team has tested the wireless functionality for each FlashRouter that we offer and shared our recommended wireless settings in our Wifi Setup area. Replicate the settings for your FlashRouter model found on that page.

Lower the wireless channel

Some devices do support 5.0GHz connections but not the higher channels that DD-WRT firmware offers.

Navigate to Wireless > Basic Settings

Lower the wireless channel setting for the 5.0GHz band that is not showing. Based on our tests the most broadly compatible channels are 36, 48 and 161.

CLICK APPLY SETTINGS

Refresh your device's network adapter

The easiest way to accomplish this is by rebooting your device as the settings to reset your adapter may vary on all types of internet connected devices.

Review wireless Status

Navigate to Status > Wireless

The readouts on this page can help tell if there are errors with the FlashRouter’s wireless. View our article on how to read the Wireless Status page for more information.

PureVPN Merlin WireGuard Setup

TeamFlashRouters · Jul 20, 2023 ·

Preparing for PureVPN Merlin Setup

Download your PureVPN .conf file

If you are not already an PureVPN user Sign Up Now.

1. Log in to your account on the PureVPN website.

PureVPN Login

2. Select Manual Configuration.

PureVPN Manual Configuration

3. Select the Server Location you want to connect to and then click Download.

PureVPN select server location

4. In the Select Protocol dropdown choose WireGuard.

PureVPN WireGuard

5. In the Select Device dropdown choose DD-WRT. Then click Generate Configuration. This will save a .conf file to your computer.

PureVPN Generate Config

Merlin Router Setup for PureVPN

Login to Asus Merlin firmware settings in a browser on any computer or smart device connected to the Merlin FlashRouter’s network.

1. Navigate to the VPN tab.

Merlin VPN Tab

2. Navigate to the VPN Client tab.

Merlin VPN Client Tab

3. Select WireGuard as the VPN Protocol.

Merlin VPN Client WireGuard

4. Click Choose file and select the .conf file you downloaded earlier. Then click Upload.

Merlin WireGuard Choose File Upload

5. In the Description field enter in the name you’d like to use for this WireGuard Client profile. We typically advise entering in the location here.

Merlin WireGuard ProtonVPN Description

6. Set Enable WireGuard to Yes.

Merlin Enable WireGuard

7. Click Apply at the bottom of the page and you should then see a Connected message appear.

Merlin WireGuard Connected

8. By default no devices are assigned to the new active WireGuard connection profile. Click the VPN Director tab to assign specific devices to the new WireGuard profile. Your IP will not be changed on your devices yet.

WireGuard select VPN Director

9. On the VPN Director page click the + symbol next to Add new rule.

WireGuard VPN Director Add new rule

10. Select the new WireGuard profile in the Interface dropdown.

WireGuard VPN Director select Interface

11. In the Local IP field enter in 192.168.50.0/24 if you want ALL devices connected to the FlashRouter’s network to use the WireGuard VPN connection. Click OK.

If you only want certain devices to connect to the WireGuard Client profile you have setting up instead of all the devices connected to the FlashRouter’s network please complete the instructions on our VPN Director guide.

12. Then click Apply at the bottom of the page.

Verify a successful PureVPN connection

Visit PureVPN’s IP Check to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to PureVPN.

How to change the PureVPN server

  1. Follow the steps at the top of the page to obtain a new .conf file.
  2. Then proceed with the settings same as initial setup.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

How do I boost my Wireless Transmission power?

Dave · Apr 29, 2019 ·

Boost the wireless transmission power if you need to increase the wireless range of the FlashRouter.

Important Information

We recommend reading the entry in the DD-WRT Wiki to familiarize yourself with what TX Power values represent.

Broadcom routers

  • Netgear R8500
  • Netgear R7000
  • Netgear R6400 V2
  • Netgear R6300 V2
  • Asus RT-AC5300
  • Asus RT-AC66U
  • Asus RT-AC56U

Navigate to Wireless > WL# or ath# Advanced

  1. Set the TX Power to the desired value.
  2. Click Apply Settings.
Boost TX Power in DD-WRT Advanced Wireless Settings page to Increase Wireless Transmission

Atheros routers

  • Netgear R9000
  • Netgear R7800
  • Linksys WRT3200ACM
  • LinksysWRT32X
  • Linksys WRT1900AC/v2/ACS
  • LinksysWRT1200AC

Navigate to Wireless > Basic Settings

  1. Check Advanced Settings under the wireless interface you would like to boost.
  2. Set the TX Power to the desired value.
  3. Click Apply Settings.
Boost TX Power in DD-WRT Advanced Wireless Settings page to Increase Wireless Transmission

We advise to proceed with caution when setting the TX Power. This has been known to negatively effect the hardware if set too high.

Wireless Guest Network Setup – Bridged (Advanced)

TeamFlashRouters · Jun 12, 2019 ·

If you would like to prevent visitors from connecting to your main WiFi network then you can create a Bridged Guest Network that will prevent access to the main router. This setup also allows you to create different rules for different WiFi SSID’s in your home ranging from QoS controls, access restrictions, VPN network segmentation, and more.

Preparing for Wireless Guest Network Setup

If you have a Dual-band or Tri-Band router you can setup a WiFi Guest Network, creating a separate VLAN (virtual local area network) for your visitors, or in order to segment your VPN networks on any band you like. We recommend using the 2.4GHz network for your DD-WRT Guest Wireless Network so it is compatible with the most possible WiFi devices. Setting up a guest network for visitors in your home allows you to keep them off of your main WiFi network.

We recommend performing this setup while connected to the FlashRouter via ethernet cable. If your computer does not have an ethernet port and you must proceed via wireless connection to the FlashRouter pay attention to the wireless connection as you may need to rejoin the FlashRouter’s network after making changes.

DD-WRT Router Setup for Wireless Guest Network

Enter Wireless settings

Navigate to Wireless > Basic Settings

Bridged Wireless Guest Network Setup on DD-WRT FlashRouter – Setting SSID for Guest Network
  1. Under the 2.4GHz or 5GHz Interface click the Add button.
  2. In the Wireless Network Name (SSID) field enter the unique network name of the guest network.
  3. Click Save.

Enter Wireless Security settings

Navigate to Wireless > Wireless Security

Bridged Wireless Guest Network Setup on DD-WRT FlashRouter – Setting Guest Network Wireless Password
  1. Duplicate the wireless security settings that are set for the other bands for the newly created virtual interface.
  2. Click Apply Settings.
  3. Reboot your router.

Create Bridge

Navigate to Setup > Networking

Bridged Wireless Guest Network Setup on DD-WRT FlashRouter – Create Bridge
  1. Under Create Bridge click Add. Name the newly created bridge br1.
  2. Click Apply Settings

Assign to Bridge

Bridged Wireless Guest Network Setup on DD-WRT FlashRouter – Assign Bridge
  1. Under Assign to Bridge select br1 from the Assignment dropdown. Select wl1.1 or ath1.1 depending on your router model.
  2. Click Apply Settings.

Depending on the router model and WiFi band you are using, the wireless interfaces will be labelled differently.

This setting can be labelled wl1.1, ath0.1, wl2.1, and so on. Make sure when you get up to the bridge assignment section that you are using the correct guest network Virtual Interface.

Network Configuration br1

Bridged Wireless Guest Network Setup on DD-WRT FlashRouter – Configure Bridge DNS Redirection
  1. Under Network Configuration br1 select Enable for Forced DNS Redirection.
  2. Set Optional DNS Target to 208.67.220.220
  3. Set IP Address to 192.168.12.1
  4. Set Subnet Mask to 255.255.255.0
  5. Click Apply Settings.

Multiple DHCP Server

Bridged Wireless Guest Network Setup on DD-WRT FlashRouter – Configure DHCP Server Settings
  1. Under Multiple DHCP Server click Add.
  2. Set the first dropdown to br1.
  3. Click Apply Settings.
  4. Reboot your router.

Firewall Rules

Navigate to Administration > Commands

  1. Copy the fire script from below and paste into the empty Commands shell
  2. Click Save Firewall.
  3. Wait one minute and then reboot your router.

iptables -I FORWARD -i br1 -o br0 -m state –state NEW -j DROP
iptables -I FORWARD -i br0 -o br1 -m state –state NEW -j DROP
iptables -I INPUT -i br1 -p tcp –dport telnet -j REJECT –reject-with tcp-reset
iptables -I INPUT -i br1 -p tcp –dport ssh -j REJECT –reject-with tcp-reset
iptables -I INPUT -i br1 -p tcp –dport www -j REJECT –reject-with tcp-reset
iptables -I INPUT -i br1 -p tcp –dport https -j REJECT –reject-with tcp-reset

You will now have a working Bridged Guest Network on the FlashRouter. By inputting the firewall rules, this will also prevent any guests on your network from gaining access to your router settings.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

TROUBLESHOOTING

Still having issues? Visit our Troubleshooting section to diagnose common problems here.

Troubleshoot Here

Wireless Guest Network Setup – Unbridged (Recommended)

TeamFlashRouters · Jun 12, 2019 ·

If you would like to prevent visitors from connecting to your main WiFi network then you can create a separate Guest Network that will prevent access to the main router. This setup also allows you to create different rules for different WiFi SSID’s in your home ranging from QoS controls, access restrictions, VPN network segmentation, and more.

Preparing for Wireless Guest Network Setup

If you have a Dual-band or Tri-Band router you can setup a WiFi Guest Network, creating a separate VLAN (virtual local area network) for your visitors, or in order to segment your VPN networks on any band you like. We recommend using the 2.4GHz network for your DD-WRT Guest Wireless Network so it is compatible with the most possible WiFi devices. Setting up a guest network for visitors in your home allows you to keep them off of your main WiFi network.

We recommend performing this setup while connected to the FlashRouter via ethernet cable. If your computer does not have an ethernet port and you must proceed via wireless connection to the FlashRouter. Be sure to pay attention to the wireless connection as you may need to rejoin the FlashRouter’s network after making changes.

DD-WRT Router Setup for Wireless Guest Network

Enter Wireless settings

Navigate to Wireless > Basic Settings

FlashRouter DD-WRT Wireless Guest Network Settings Unbridged

Under the 2.4GHz or 5GHz Interface click the Add button.

Wireless Network Name (SSID)

Enter the a unique network name for the guest network.

Network Configuration

Unbridged

Force DNS Redirection

Enable

Optional DNS Target

208.67.220.220

IP Address

192.168.12.1

Subnet Mask

255.255.255.0

CLICK SAVE

Enter Wireless Security settings

Navigate to Wireless > Wireless Security

Wireless Guest Network Setup on DD-WRT FlashRouter Unbridged
  1. Duplicate the wireless security settings that are set for the other bands for the newly created virtual interface.
  2. Click Apply Settings.
  3. Reboot your router.

Enable DHCP for Guest Network

Navigate to Setup > Networking

Wireless Guest Network Setup on DD-WRT FlashRouter Unbridged Setting DHCP Server
  1. Scroll to the very bottom of the page and under DHCPD click Add.
  2. Select wl0.1 or ath1.1 depending on your router model.
  3. Click Apply Settings.
  4. Reboot your router.

Depending on the router model and WiFi band you are using, the wireless interfaces will be labelled differently.

This setting can be labelled wl1.1, ath0.1, wl2.1, and so on. Make sure when you get up to the bridge assignment section that you are using the correct guest network Virtual Interface.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

TROUBLESHOOTING

Still having issues? Visit our Troubleshooting section to diagnose common problems here.

Troubleshoot Here

Getting Started With Your FlashRouter

Getting Started With Your FlashRouter

  1. Connect FlashRouter to Internet
  2. Access FlashRouter DD-WRT firmware settings
  3. Connect FlashRouter to VPN 
VIEW ALL SETUP GUIDES
TROUBLESHOOTING
FAQS

Setting Up Your VPN Service

Select your operating system below to setup the FlashRouters Privacy App on your router, the easiest way to connect to the best VPN services.  For ExpressVPN FlashRouter users, please view the following section for setting up the ExpressVPN app.

Windows

Mac

Android

iPhone

ExpressVPN NETGEAR ROUTERS
ExpressVPN LINKSYS ROUTERS

More Ways to Get Help

Can’t find the answer you are looking for? Open a support ticket and our support team will be there to assist you.

HMA VPN Manual OpenVPN Setup

TeamFlashRouters · Apr 11, 2019 ·

Please note: HMA no longer allows router based integration, please visit our top recommended VPNs.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

IVPN Manual OpenVPN Setup

TeamFlashRouters · Apr 16, 2019 ·

Preparing for Manual IVPN Setup

Verify your IVPN login information

If you are not already an IVPN user Sign Up Now.

Log in to your account on the IVPN website.

FlashRouter Privacy App - IVPN Login

Locate and Copy the Username displayed on the VPN Accounts page.

FlashRouters DD-WRT Privacy APP IVPN OpenVPN Specific Username and Password

IVPN Server Addresses

View a full list of IVPN servers.

United States

Atlanta:
us-ga.gw.ivpn.net

Dallas:
us-tx.gw.ivpn.net

Los Angeles
:
us-ca.gw.ivpn.net

Miami
:
us-fl.gw.ivpn.net

New Jersey
:
us-nj.gw.ivpn.net

Salt Lake City
:
us-ut.gw.ivpn.net

DD-WRT Router Setup for IVPN

Navigate to Services > VPN

Enter IVPN settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you would like to connect to from the server list above. Be sure there are no extra spaces or characters.

If you wish to change PureVPN connection locations, THIS IS THE ONLY FIELD YOU NEED TO CHANGE.

Port

443 for TCP
2049 for UDP

Tunnel Device

TUN

Tunnel Protocol

TCP or UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA1

User Pass Authentication

Enable

Username

Enter the Username you noted from the Home page above.
eg. ivpn1234567

Password

Enter the Password you successfully logged in to your IVPN account with.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

TLS Auth Key

-----BEGIN OpenVPN Static key V1-----
ac470c93ff9f5602a8aab37dee84a528
14d10f20490ad23c47d5d82120c1bf85
9e93d0696b455d4a1b8d55d40c2685c4
1ca1d0aef29a3efd27274c4ef09020a3
978fe45784b335da6df2d12db97bbb83
8416515f2a96f04715fd28949c6fe296
a925cfada3f8b8928ed7fc963c156327
2f5cf46e5e1d9c845d7703ca881497b7
e6564a9d1dea9358adffd435295479f4
7d5298fabf5359613ff5992cb57ff081
a04dfb81a26513a6b44a9b5490ad265f
8a02384832a59cc3e075ad545461060b
7bcab49bac815163cb80983dd51d5b1f
d76170ffd904d8291071e96efc3fb777
856c717b148d08a510f5687b8a8285dc
ffe737b98916dd15ef6235dee4266d3b
-----END OpenVPN Static key V1-----

Additional Config

tls-client
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA
resolv-retry infinite
keepalive 10 60
nobind
persist-key
persist-tun
persist-remote-ip
verb 3

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

-----BEGIN CERTIFICATE-----
MIIGoDCCBIigAwIBAgIJAJjvUclXmxtnMA0GCSqGSIb3DQEBCwUAMIGMMQswCQYD
VQQGEwJDSDEPMA0GA1UECAwGWnVyaWNoMQ8wDQYDVQQHDAZadXJpY2gxETAPBgNV
BAoMCElWUE4ubmV0MQ0wCwYDVQQLDARJVlBOMRgwFgYDVQQDDA9JVlBOIFJvb3Qg
Q0EgdjIxHzAdBgkqhkiG9w0BCQEWEHN1cHBvcnRAaXZwbi5uZXQwHhcNMjAwMjI2
MTA1MjI5WhcNNDAwMjIxMTA1MjI5WjCBjDELMAkGA1UEBhMCQ0gxDzANBgNVBAgM
Blp1cmljaDEPMA0GA1UEBwwGWnVyaWNoMREwDwYDVQQKDAhJVlBOLm5ldDENMAsG
A1UECwwESVZQTjEYMBYGA1UEAwwPSVZQTiBSb290IENBIHYyMR8wHQYJKoZIhvcN
AQkBFhBzdXBwb3J0QGl2cG4ubmV0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
CgKCAgEAxHVeaQN3nYCLnGoEg6cY44AExbQ3W6XGKYwC9vI+HJbb1o0tAv56ryvc
6eS6BdG5q9M8fHaHEE/jw9rtznioiXPwIEmqMqFPA9k1oRIQTGX73m+zHGtRpt9P
4tGYhkvbqnN0OGI0H+j9R6cwKi7KpWIoTVibtyI7uuwgzC2nvDzVkLi63uvnCKRX
cGy3VWC06uWFbqI9+QDrHHgdJA1F0wRfg0Iac7TE75yXItBMvNLbdZpge9SmplYW
FQ2rVPG+n75KepJ+KW7PYfTP4Mh3R8A7h3/WRm03o3spf2aYw71t44voZ6agvslv
wqGyczDytsLUny0U2zR7/mfEAyVbL8jqcWr2Df0m3TA0WxwdWvA51/RflVk9G96L
ncUkoxuBT56QSMtdjbMSqRgLfz1iPsglQEaCzUSqHfQExvONhXtNgy+Pr2+wGrEu
SlLMee7aUEMTFEX/vHPZanCrUVYf5Vs8vDOirZjQSHJfgZfwj3nL5VLtIq6ekDhS
AdrqCTILP3V2HbgdZGWPVQxl4YmQPKo0IJpse5Kb6TF2o0i90KhORcKg7qZA40sE
bYLEwqTM7VBs1FahTXsOPAoMa7xZWV1TnigF5pdVS1l51dy5S8L4ErHFEnAp242B
DuTClSLVnWDdofW0EZ0OkK7V9zKyVl75dlBgxMIS0y5MsK7IWicCAwEAAaOCAQEw
gf4wHQYDVR0OBBYEFHUDcMOMo35yg2A/v0uYfkDE11CXMIHBBgNVHSMEgbkwgbaA
FHUDcMOMo35yg2A/v0uYfkDE11CXoYGSpIGPMIGMMQswCQYDVQQGEwJDSDEPMA0G
A1UECAwGWnVyaWNoMQ8wDQYDVQQHDAZadXJpY2gxETAPBgNVBAoMCElWUE4ubmV0
MQ0wCwYDVQQLDARJVlBOMRgwFgYDVQQDDA9JVlBOIFJvb3QgQ0EgdjIxHzAdBgkq
hkiG9w0BCQEWEHN1cHBvcnRAaXZwbi5uZXSCCQCY71HJV5sbZzAMBgNVHRMEBTAD
AQH/MAsGA1UdDwQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAABAjRMJy+mXFLezA
Z8iUgxOjNtSqkCv1aU78K1XkYUzbwNNrSIVGKfP9cqOEiComXY6nniws7QEV2IWi
lcdPKm0x57recrr9TExGGOTVGB/WdmsFfn0g/HgmxNvXypzG3qulBk4qQTymICds
l9vIPb1l9FSjKw1KgUVuCPaYq7xiXbZ/kZdZX49xeKtoDBrXKKhXVYoWus/S+k2I
S8iCxvcp599y7LQJg5DOGlbaxFhsW4R+kfGOaegyhPvpaznguv02i7NLd99XqJhp
v2jTUF5F3T23Z4KkL/wTo4zxz09DKOlELrE4ai++ilCt/mXWECXNOSNXzgszpe6W
As0h9R++sH+AzJyhBfIGgPUTxHHHvxBVLj3k6VCgF7mRP2Y+rTWa6d8AGI2+Raey
V9DVVH9UeSoU0Hv2JHiZL6dRERnyg8dyzKeTCke8poLIjXF+gyvI+22/xsL8jcNH
i9Kji3Vpc3i0Mxzx3gu2N+PL71CwJilgqBgxj0firr3k8sFcWVSGos6RJ3IvFvTh
xYx0p255WrWM01fR9TktPYEfjDT9qpIJ8OrGlNOhWhYj+a45qibXDpaDdb/uBEmf
2sSXNifjSeUyqu6cKfZvMqB7pS3l/AhuAOTT80E4sXLEoDxkFD4C78swZ8wyWRKw
sWGIGABGAHwXEAoDiZ/jjFrEZT0=
-----END CERTIFICATE-----

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful IVPN connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit WhatIsMyIPAddress to verify your new IP address, virtual location, and status as Protected at the top of the page.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to IVPN.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the IVPN server

  1. Copy the new IVPN server address from the above server list.
  2. Paste the server into the Server IP/Name field.
  3. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

Wireless Client Bridge Setup

TeamFlashRouters · Apr 22, 2019 ·

If you need to extend your wired connection capabilities and you are not able to wire directly into your main router, you can setup a FlashRouter as a Wireless Client Bridge. In Wireless Client Bridge mode the FlashRouter connects to your main router via WiFi, and then transmits your internet signal via the FlashRouter LAN ports for wired internet access anywhere in your home or office.

Preparing for Wireless Client Bridge Setup

Verify your wireless information

In order to setup your FlashRouter as a Wireless Client Bridge, you will need the exact SSID and password of your existing wireless network. Make sure you have this information before proceeding.

We recommend using a 2.4GHz network to repeat as this network will have more range.

Locate the Local IP Address of the existing wireless network

Locate the Local IP Address of the existing router that the FlashRouter will be bridged to.

DD-WRT Router Setup for Wireless Client Bridge

Disable Firewall

Navigate to Security > Firewall

Wireless Repeater Bridge Setup on FlashRouter DD-WRT - Disable Firewall and Enable Filter Multicast
  1. Set SPI Firewall to Disable.
  2. Uncheck all boxes except for Filter Multicast.
  3. Click Save.

Disable DNSmasq

Navigate to Services > Services

Wireless Repeater Bridge Setup on FlashRouter DD-WRT - Disable DNSMasqButton
  1. Set DNSmasq to Disable.
  2. Click Save.

Enter Wireless settings

Navigate to Wireless > Basic Settings

Wireless Client Bridge Setup on FlashRouter DD-WRT - Set Wireless Mode to Client Bridge
  1. In the Wireless Physical Interface settings for the 2.4GHz network set the Wireless Mode to Client Bridge.
  2. Change the Wireless Network Name (SSID) to match exactly with the Wireless Network Name of the network that you will bridge to.
  3. Click Save.

Enter Wireless Security settings

Navigate to Wireless > Wireless Security

Wireless Client Bridge Setup on FlashRouter DD-WRT - Set Wireless Password
  1. Change the WPA Shared Key to match exactly with the Wireless Password of the network that you will bridge to.
  2. Click Save.

Change the FlashRouter's Local IP Address

Navigate to Setup > Basic Setup

  1. Set the Local IP Address to a different address on the same subnet as the existing network that you noted early. (example: if the existing network is 192.168.1.1 then set the Local IP Address to 192.168.1.2)
  2. Set the Gateway to the Local IP Address of the existing network. (example: 192.168.1.1)
  3. Set the Local DNS to the Local IP Address of the existing network. (example: 192.168.1.1)
  4. Click Apply Settings.

Reboot your FlashRouter

Power off the FlashRouter for 30 seconds and then power it back on. When it boots back up you will be able to access the FlashRouter’s settings at the new Local IP Address that you set. Your existing network and the FlashRouter’s network will now be bridged wirelessly.

Your FlashRouter is now providing wired connection access to your main router network. Wireless connections to the FlashRouter are disabled in this setup.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

TROUBLESHOOTING

Still having issues? Visit our Troubleshooting section to diagnose common problems here.

Troubleshoot Here

Wireless Access Point Setup

TeamFlashRouters · Apr 23, 2019 ·

A Wireless Access Point is a setup that has the FlashRouter using an existing network’s DHCP instead of assigning its own. The FlashRouter’s WAN/Internet port should be not be connected to your modem or other router while performing this setup.

Preparing for Wireless Access Point Setup

Locate the Local IP Address of the existing wireless network

Locate the Local IP Address of the existing router that the FlashRouter will be bridged to.

DD-WRT Router Setup for Wireless Access Point

Disable Firewall

Navigate to Security > Firewall

Wireless Client Bridge Setup on FlashRouter DD-WRT - Disable Firewall
  1. Set SPI Firewall to Disable.
  2. Click Save.

Disable DNSmasq

Navigate to Services > Services

Wireless Repeater Bridge Setup on FlashRouter DD-WRT - Disable DNSMasqButton
  1. Set DNSmasq to Disable.
  2. Click Save.

Change the FlashRouter's Local IP Address

Navigate to Setup > Basic Setup

Wireless Client Bridge Setup on FlashRouter DD-WRT - Set Local IP
  1. Set the Local IP Address to a different address on the same subnet as the existing network that you noted early. (example: if the existing network is 192.168.1.1 then set the Local IP Address to 192.168.1.2)
  2. Set the Gateway to the Local IP Address of the existing network. (example: 192.168.1.1)
  3. Set the Local DNS to the Local IP Address of the existing network. (example: 192.168.1.1)
  4. Click Save.

Change the FlashRouter's DHCP settings

DHCP Forwarder Setup for DD-WRT
  1. Set the DHCP Type to DHCP Forwarder.
  2. Click Save.

Change the FlashRouter's Operating Mode

Navigate to Setup > Advanced Routing

DHCP Forwarder Setup for DD-WRT
  1. Set the Operating Mode to Router.
  2. Click Apply Settings.

Reboot your FlashRouter

  • Power off the FlashRouter for 30 seconds and connect from the other router’s LAN port to one of the FlashRouter’s LAN port then power it back on.  When it boots back up you will be able to access the FlashRouter’s settings at the new Local IP Address that you set.

Back up your settings

Navigate to the Administration > Backup page.

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

TROUBLESHOOTING

Still having issues? Visit our Troubleshooting section to diagnose common problems here.

Troubleshoot Here

PrivateInternetAccess (PIA) Manual OpenVPN Setup

TeamFlashRouters · Apr 5, 2019 ·

Preparing for Manual PIA Setup

Verify your PIA login information

If you are not already a PIA user Sign Up Now.

Log in to your account on the PIA website.

FlashRouters Privacy App - PIA Login

PIA Server Addresses

The below servers are the only servers compatible with PIA router connections. Dedicated IP Addresses are not able to connect via routers.

United States

us-california.privacy.network
us-newjersey.privacy.network
us-chicago.privacy.network
us-texas.privacy.network
us-florida.privacy.network
us-seattle.privacy.network
us3.privacy.network
us-siliconvalley.privacy.network
us-newyorkcity.privacy.network
us-washingtondc.privacy.network
us-atlanta.privacy.network
us-houston.privacy.network
us-denver.privacy.network

United Kingdom

uk-london.privacy.network
uk-manchester.privacy.network

Canada

ca-toronto.privacy.network
ca-montreal.privacy.network

Australia

au-sydney.privacy.network
aus-melbourne.privacy.network
aus-perth.privacy.network

Germany

de-berlin.privacy.network
de-frankfurt.privacy.network

Rest of the World

ae.privacy.network
austria.privacy.network
dz.privacy.network
ad.privacy.network
ar.privacy.network
yerevan.privacy.network
bahamas.privacy.network
bangladesh.privacy.network
brussels.privacy.network
sofia.privacy.network
cambodia.privacy.network
china.privacy.network
cyprus.privacy.network
czech.privacy.network
denmark.privacy.network
egypt.privacy.network
fi.privacy.network
france.privacy.network
georgia.privacy.network
greenland.privacy.network
hungary.privacy.network
is.privacy.network
in.privacy.network
iran.privacy.network
ireland.privacy.network
man.privacy.network
israel.privacy.network
italy.privacy.network
japan.privacy.network
kazakhstan.privacy.network
liechtenstein.privacy.network
lu.privacy.network
macau.privacy.network
malta.privacy.network
mexico.privacy.network
md.privacy.network
monaco.privacy.network
mongolia.privacy.network
montenegro.privacy.network
morocco.privacy.network
nl-amsterdam.privacy.network
nz.privacy.network
nigeria.privacy.network
no.privacy.network
panama.privacy.network
philippines.privacy.network
poland.privacy.network
qatar.privacy.network
ro.privacy.network
rs.privacy.network
saudiarabia.privacy.network
spain.privacy.network
srilanka.privacy.network
sweden.privacy.network
swiss.privacy.network
sg.privacy.network
tr.privacy.network
taiwan.privacy.network
ua.privacy.network
venezuela.privacy.network
vietnam.privacy.network
za.privacy.network

DD-WRT Router Setup for PIA

Navigate to Services > VPN

PIA offers two different Encryption levels.
Default Encryption (AES-128) typically provides faster speeds.
Strong Encryption (AES-256) provides stronger encryption.
Follow the table below of the one that fits your needs.

Enter PIA settings (Default Encryption)

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you would like to connect to from the server list above. Be sure there are no extra spaces or characters.

If you wish to change PIA connection locations, THIS IS THE ONLY FIELD YOU NEED TO CHANGE.

Port

1198

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-128-CBC

Hash Algorithm

SHA1

First Data Cipher

Not set

Second Data Cipher

Not set

Third Data Cipher

Not set

Userpass Authentication

Enable

Username

Enter the Username you successfully logged in to your PIA account with.

Password

Enter the Password you successfully logged in to your PIA account with.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Disabled

NAT

Enable

Firewall Protection

Enable

Additional Config

persist-key
persist-tun

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Enter PIA settings (Strong Encryption)

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you would like to connect to from the server list above. Be sure there are no extra spaces or characters.

If you wish to change PIA connection locations, THIS IS THE ONLY FIELD YOU NEED TO CHANGE.

Port

1197

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA256

First Data Cipher

Not set

Second Data Cipher

Not set

Third Data Cipher

Not set

Userpass Authentication

Enable

Username

Enter the Username you successfully logged in to your PIA account with.

Password

Enter the Password you successfully logged in to your PIA account with.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

Additional Config

persist-key
persist-tun

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful PIA connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit PIA’s IP Check to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to PIA.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the PIA server

  1. Copy the new PIA server address from the above server list.
  2. Paste the server into the Server IP/Name field.
  3. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

ExpressVPN Manual OpenVPN Setup

admin · Feb 19, 2019 ·

Preparing for Manual ExpressVPN Setup

Obtain your ExpressVPN OpenVPN Information

If you are not already an ExpressVPN user Sign Up Now.

1. Log in to your account on the ExpressVPN website.

ExpressVPN login page

2. Successfully log in with your account information. Select More.

3. Select Manual Configuration and copy the Username and Password that are displayed on the right hand side of the screen.

ExpressVPN Manual Configuration
ExpressVPN username and password

ExpressVPN Server Addresses

Americas

usa-atlanta-ca-version-2.expressnetw.com
usa-boston-ca-version-2.expressnetw.com
usa-chicago-ca-version-2.expressnetw.com
usa-dallas-ca-version-2.expressnetw.com
usa-dallas-2-ca-version-2.expressnetw.com
usa-denver-ca-version-2.expressnetw.com
usa-kansascity-ca-version-2.expressnetw.com
usa-losangeles-ca-version-2.expressnetw.com
usa-losangeles-1-ca-version-2.expressnetw.com
usa-losangeles-2-ca-version-2.expressnetw.com
usa-losangeles-3-ca-version-2.expressnetw.com
usa-los-angeles-4-ca-version-2.expressnetw.com
usa-miami-ca-version-2.expressnetw.com
usa-miami-2-ca-version-2.expressnetw.com
usa-minneapolis-ca-version-2.expressnetw.com
usa-newjersey-1-ca-version-2.expressnetw.com
usa-newjersey-3-ca-version-2.expressnetw.com
usa-newyork-ca-version-2.expressnetw.com
us-new-york-2-ca-version-2.expressnetw.com
usa-phoenix-ca-version-2.expressnetw.com
usa-saltlakecity-ca-version-2.expressnetw.com
usa-sanfrancisco-ca-version-2.expressnetw.com
usa-sanjose-ca-version-2.expressnetw.com
usa-seattle-ca-version-2.expressnetw.com
usa-tampa-1-ca-version-2.expressnetw.com
usa-virginia-ca-version-2.expressnetw.com
usa-washingtondc-ca-version-2.expressnetw.com
usa-washingtondc-2-ca-version-2.expressnetw.com
canada-montreal-ca-version-2.expressnetw.com
canada-toronto-ca-version-2.expressnetw.com
canada-toronto-2-ca-version-2.expressnetw.com
canada-vancouver-ca-version-2.expressnetw.com
mexico-ca-version-2.expressnetw.com
argentina-ca-version-2.expressnetw.com
brazil-ca-version-2.expressnetw.com
brazil-2-ca-version-2.expressnetw.com
chile-ca-version-2.expressnetw.com
colombia-ca-version-2.expressnetw.com
costarica-ca-version-2.expressnetw.com
ecuador-ca-version-2.expressnetw.com
guatemala-ca-version-2.expressnetw.com
panama-ca-version-2.expressnetw.com
peru-ca-version-2.expressnetw.com
uruguay-ca-version-2.expressnetw.com
venezuela-ca-version-2.expressnetw.com

Europe

uk-berkshire-ca-version-2.expressnetw.com
uk-berkshire-2-ca-version-2.expressnetw.com
uk-docklands-ca-version-2.expressnetw.com
uk-east-london-ca-version-2.expressnetw.com
uk-kent-ca-version-2.expressnetw.com
uk-london-ca-version-2.expressnetw.com
france-paris-1-ca-version-2.expressnetw.com
france-paris-2-ca-version-2.expressnetw.com
france-strasbourg-ca-version-2.expressnetw.com
germany-darmstadt-ca-version-2.expressnetw.com
germany-frankfurt-1-ca-version-2.expressnetw.com
germany-frankfurt-2-ca-version-2.expressnetw.com
germany-nuremberg-ca-version-2.expressnetw.com
italy-cosenza-ca-version-2.expressnetw.com
italy-milan-ca-version-2.expressnetw.com
netherlands-amsterdam-ca-version-2.expressnetw.com
netherlands-rotterdam-ca-version-2.expressnetw.com
netherlands-thehague-ca-version-2.expressnetw.com
spain-barcelona-ca-version-2.expressnetw.com
spain-ca-version-2.expressnetw.com
sweden-ca-version-2.expressnetw.com
sweden-2-ca-version-2.expressnetw.com
switzerland-ca-version-2.expressnetw.com
switzerland-2-ca-version-2.expressnetw.com
albania-ca-version-2.expressnetw.com
andorra-ca-version-2.expressnetw.com
armenia-ca-version-2.expressnetw.com
austria-ca-version-2.expressnetw.com
azerbaijan-ca-version-2.expressnetw.com
belarus-ca-version-2.expressnetw.com
belgium-ca-version-2.expressnetw.com
bosniaandherzegovina-ca-version-2.expressnetw.com
bulgaria-ca-version-2.expressnetw.com
croatia-ca-version-2.expressnetw.com
cyprus-ca-version-2.expressnetw.com
czechrepublic-ca-version-2.expressnetw.com
denmark-ca-version-2.expressnetw.com
estonia-ca-version-2.expressnetw.com
finland-ca-version-2.expressnetw.com
georgia-ca-version-2.expressnetw.com
greece-ca-version-2.expressnetw.com
hungary-ca-version-2.expressnetw.com
iceland-ca-version-2.expressnetw.com
ireland-ca-version-2.expressnetw.com
isleofman-ca-version-2.expressnetw.com
jersey-ca-version-2.expressnetw.com
latvia-ca-version-2.expressnetw.com
liechtenstein-ca-version-2.expressnetw.com
lithuania-ca-version-2.expressnetw.com
luxembourg-ca-version-2.expressnetw.com
macedonia-ca-version-2.expressnetw.com
malta-ca-version-2.expressnetw.com
moldova-ca-version-2.expressnetw.com
monaco-ca-version-2.expressnetw.com
montenegro-ca-version-2.expressnetw.com
norway-ca-version-2.expressnetw.com
poland-ca-version-2.expressnetw.com
portugal-ca-version-2.expressnetw.com
romania-ca-version-2.expressnetw.com
serbia-ca-version-2.expressnetw.com
slovakia-ca-version-2.expressnetw.com
slovenia-ca-version-2.expressnetw.com
ukraine-ca-version-2.expressnetw.com

Asia Pacific

australia-brisbane-ca-version-2.expressnetw.com
australia-melbourne-ca-version-2.expressnetw.com
australia-perth-ca-version-2.expressnetw.com
australia-sydney-ca-version-2.expressnetw.com
australia-sydney-2-ca-version-2.expressnetw.com
australia-sydney-3-ca-version-2.expressnetw.com
hongkong-2-ca-version-2.expressnetw.com
hongkong4-ca-version-2.expressnetw.com
hongkong-1-ca-version-2.expressnetw.com
japan-tokyo-1-ca-version-2.expressnetw.com
japan-tokyo-2-ca-version-2.expressnetw.com
india-chennai-ca-version-2.expressnetw.com
india-mumbai-1-ca-version-2.expressnetw.com
singapore-cbd-ca-version-2.expressnetw.com
singapore-jurong-ca-version-2.expressnetw.com
southkorea-ca-version-2.expressnetw.com
southkorea2-ca-version-2.expressnetw.com
bangladesh-ca-version-2.expressnetw.com
bhutan-ca-version-2.expressnetw.com
brunei-ca-version-2.expressnetw.com
cambodia-ca-version-2.expressnetw.com
indonesia-ca-version-2.expressnetw.com
kazakhstan-ca-version-2.expressnetw.com
kyrgyzstan-ca-version-2.expressnetw.com
laos-ca-version-2.expressnetw.com
macau-ca-version-2.expressnetw.com
malaysia-ca-version-2.expressnetw.com
mongolia-ca-version-2.expressnetw.com
myanmar-ca-version-2.expressnetw.com
nepal-ca-version-2.expressnetw.com
newzealand-ca-version-2.expressnetw.com
pakistan-ca-version-2.expressnetw.com
ph-via-sing-ca-version-2.expressnetw.com
srilanka-ca-version-2.expressnetw.com
taiwan-3-ca-version-2.expressnetw.com
thailand-ca-version-2.expressnetw.com
vietnam-ca-version-2.expressnetw.com

Middle East and Africa

algeria-ca-version-2.expressnetw.com
israel-ca-version-2.expressnetw.com
kenya-ca-version-2.expressnetw.com
southafrica-ca-version-2.expressnetw.com

DD-WRT Router Setup for ExpressVPN

Navigate to Services > VPN

Enter ExpressVPN settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

Copy and paste the server you would like to connect to from the server list above. Be sure there are no extra spaces or characters.

If you wish to change ExpressVPN connection locations, THE ONLY SETTING YOU NEED TO CHANGE IS THE EXPRESSVPN SERVER ADDRESS.*

Port

1195

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-256-CBC

Hash Algorithm

SHA512

User Pass Authentication

Enable

Username

Enter the Username you found in the Manual Config section.

Password

Enter the Password you found in the Manual Config section.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

Adaptive

NAT

Enable

Firewall Protection

Enable

nsCertType verification

Checked

TLS Auth Key

-----BEGIN OpenVPN Static key V1-----
48d9999bd71095b10649c7cb471c1051
b1afdece597cea06909b99303a18c674
01597b12c04a787e98cdb619ee960d90
a0165529dc650f3a5c6fbe77c91c137d
cf55d863fcbe314df5f0b45dbe974d9b
de33ef5b4803c3985531c6c23ca6906d
6cd028efc8585d1b9e71003566bd7891
b9cc9212bcba510109922eed87f5c8e6
6d8e59cbd82575261f02777372b2cd4c
a5214c4a6513ff26dd568f574fd40d6c
d450fc788160ff68434ce2bf6afb00e7
10a3198538f14c4d45d84ab42637872e
778a6b35a124e700920879f1d003ba93
dccdb953cdf32bea03f365760b0ed800
2098d4ce20d045b45a83a8432cc73767
7aed27125592a7148d25c87fdbe0a3f6
-----END OpenVPN Static key V1-----

Additional Config

persist-key
persist-tun
fragment 1300
mssfix 1450
keysize 256

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Public Client Cert

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

Private Client Key

-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful ExpressVPN connection

Navigate to Status > OpenVPN.

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit ExpressVPN’s IP Check to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to ExpressVPN.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the ExpressVPN server

  1. Copy the new ExpressVPN server address from the above server list.
  2. Paste the server into the Server IP/Name field.
  3. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

How do I schedule a reboot of my FlashRouter?

TeamFlashRouters · May 30, 2019 ·

Schedule a reboot of the FlashRouter to restart your connection. A reboot of your network can help with stability and prevent the connection from slowing down over time.

Navigate to Administration > Keep Alive

Schedule a Reboot in FlashRouter DD-WRT Settings
  1. Enable Schedule Reboot.
  2. Select At a Set Time, and select the time of the day and day of the week you wish to schedule your reboot.
  3. Click Apply Settings.

How do I change the DHCP range of my FlashRouter?

TeamFlashRouters · May 30, 2019 ·

Whenever a device joins the FlashRouter network via wired or WiFi connection the DHCP server on the router gives out a local IP address to each device so all these devices can interact on your local network.

Increase the DHCP range to allow more users to automatically be assigned an IP address or decrease the DHCP range to limit the users that are automatically assigned an IP address.

Navigate to Setup > Basic Setup

Change DHCP Range in FlashRouter DD-WRT Settings
  1. Under Network Address Server Settings (DHCP) change the Maximum DHCP Users to your preferred value.
  2. You can edit the Start IP Address to 2 and Maximum DHCP Users to 254 for the most available slots.
  3. Click Apply Settings.

Hotspot Shield Manual OpenVPN Setup

TeamFlashRouters · Jul 15, 2020 ·

Preparing for Manual Hotspot Shield Setup

Obtain your Hotspot Shield OpenVPN Information

If you are not already a Hotspot Shield user Sign Up Now.

1. Log in to your account on the Hotspot Shield website.

2. Click Hotspot Shield on the left side navigation.

Hotspot Shield - Website Admin

3. Under Choose your device click Router.

Hotspot Shield - Select Router

4. In the Set up your router section Select your desired virtual location and then click Download file.

Open the file that was downloaded with NotePad++ for Windows or TextEdit for Apple. You only need the <cert> and <key> from the .ovpn file. All Hotspot Shield servers have different keys and certificates.

Hotspot Shield - Download Configuration File

5. Copy the VPN Username, and Password that appear under Step 2 to a notepad, you will need this information later in the setup process.

Hotspot Shield - OpenVPN username and password

DD-WRT Router Setup for Hotspot Shield

Navigate to Services > VPN

Enter Hotspot Shield settings

OpenVPN Client

Start OpenVPN Client

If you wish to disable your VPN connection simply set this to Disable at any time and click Apply Settings.

Server IP/Name

At the top of the .ovpn file you downloaded above, there is a line e.g.:
remote universitycalendar.us 8041
universitycalendar.us is your Hotspot Shield server name. Enter the server name in this field.

Port

8041

Tunnel Device

TUN

Tunnel Protocol

UDP

Encryption cipher

AES-128-CBC

Hash Algorithm

SHA256

User Pass Authentication

Enable

Username

Enter the Username you obtained in your Hotspot Shield account.

Password

Enter the Password you obtained in your Hotspot Shield account.

Advanced Options

Enable

TLS Cipher

None

LZO Compression

No

NAT

Enable

Firewall Protection

Enable

Additional Config

resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
reneg-sec 0
remote-cert-tls server

Policy Based Routing

This field can be used for split VPN and Dual Gateway routing.

CA Cert

—–BEGIN CERTIFICATE—–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=
—–END CERTIFICATE—–
—–BEGIN CERTIFICATE—–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—–END CERTIFICATE—–

Public Client Cert

In the .ovpn file Copy and Paste all contents in between the <cert> and </cert> lines from your .ovpn file starting and ending with:
—–BEGIN CERTIFICATE—–
…
—–END CERTIFICATE—–

Private Client Key

In the .ovpn file Copy and Paste all contents in between the <key> and </key> lines from your .ovpn file starting and ending with:
—–BEGIN PRIVATE KEY—–
…
—–END PRIVATE KEY—–

CLICK APPLY SETTINGS

Leave all settings not mentioned above as their default setting.

Verify a successful Hotspot Shield connection

Navigate to Status > OpenVPN

  1. You should now see a CONNECTED SUCCESS message.
  2. Visit Hotspot Shield’s website to verify your new IP address and virtual location.

In some cases you may notice that the location is not showing the same location as the server you have input in your router settings; this is because geo tracking tools are often tricked by VPN connections. As long as you see an IP address that is not the same as your normal Internet IP address then you are indeed connected to Hotspot Shield.

Back up your settings

Navigate to Administration > Backup

  1. Click the Backup button.
  2. A file named nvrambak.bin will be saved to your computer.
  3. You can load nvrambak.bin to restore your settings in the event of a reset.

How to change the Hotspot Shield server

  1. Follow the instructions for obtaining the OpenVPN information from above.
  2. Enter the new Server Address in the Server IP/Name field.
  3. Enter the new Username and Password.
  4. Enter the new Public Client Cert and Private Client Key.
  5. Click Apply Settings.

TROUBLESHOOTING

Still having issues? Visit the VPN Troubleshooting section.

Troubleshoot Here

How do I change my Wireless Password?

Dave · Apr 29, 2019 ·

Change the FlashRouter’s wireless network password to any password you like.

Navigate to Wireless > Wireless Security

Changing Wireless password in DD-WRT Wireless Security Settings
  1. Click Unmask next to the Shared Key field to see what you are typing and enter in the new wireless password you would like to use.
  2. Click Apply Settings.
  3. Reconnect to the wireless network using your new password.

IPv6 Internet Setup

TeamFlashRouters · Apr 3, 2019 ·

Most ISPs only support IPv4. Unless your ISP supports IPv6 then enabling it on the FlashRouter will not enable it across your network.

For most VPN users IPv6 should remain disabled as the VPN connection was designed to operate under IPv4 addresses only. Enabling IPv6 in this instance may compromise the security of the VPN tunnel.

We typically only recommend enabling IPv6 if you are not using VPN or if your VPN provider requires that IPv6 be enabled.

Enable IPv6

Navigate to Setup > IPv6

Access FlashRouters DD-WRT Admin Settings and Disable Remote Access
  1. Set IPv6 to Enable.
  2. Select Native IPv6 from ISP in the dropdown.
  3. If you have specific IPv6 DNS servers you would like to add you can add them in the Static DNS fields or leave those fields blank.
  4. Click Apply Settings.

Power cycle your FlashRouter

Power your FlashRouter off and then power it back on by unplugging and then plugging it back in or using the button on the back of the FlashRouter.

Verify a successful IPv6 connection

Once the FlashRouter is finished powering back up, connect one of your devices to the FlashRouter via Ethernet or Wireless.

Visit  http://ipv6-test.com/ where you should see Supported under IPv6 connectivity if your ISP supports IPv6 and your modem is setup to passthrough IPv6.

Please be aware that we can not replicate ISP specific IPv6 issues, which makes them challenging to troubleshoot. We recommend contacting your ISP as the first step of troubleshooting.

How do I change my Wireless Network Name (SSID)?

TeamFlashRouters · May 1, 2019 ·

Change the FlashRouter’s wireless network name to any name you like.

Navigate to Wireless > Basic Settings

Changing SSID in DD-WRT Wireless Basic Settings page
  1. Click into the Wireless Network Name (SSID) field and enter in the new wireless name you would like to use.
  2. Click Apply Settings.
  3. Reconnect to the wireless network using your new wireless network name.
« Previous Page

Primary Sidebar

  • Troubleshooting
  • Router Access
  • Internet Connection Issues
  • WiFi Connectivity
  • FR Privacy App
  • General VPN Issues
  • TeamViewer Remote Support
  • DD-WRT Firmware
  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • YouTube

Footer