Monday, April 29, 2013

How to Setup Tomato PPTP

flashing instructions with ASUS RT-N16

There is an official tutorial for installing Tomato firmware on Asus routers: http://tomatousb.org/tut:installing-on-asus-rt-n16
And below you'll find usermade instructions for this purpose:
  • At this point you still have the original firmware on your router installed.
  • First you need to install the DD-WRT firmware to be able to flash Tomato firmware later.
  • E.g. install dd-wrt.v24-15778_NEWD-2_K2.6_mini_RT-N16.trx using the webconfiguration of the router.
  • Now your router is flashed with DD-WRT firmware.
  • Now do a hard reset (30-30-30).
  • Change the .trx suffix [tomato-K26USB-1.28.9054MIPSR2-beta-vpn3.6.trx] to .bin [tomato-K26USB-1.28.9054MIPSR2-beta-vpn3.6.bin].
  • Use the DD-WRT webconfiguration to flash the Tomato Firmware onto the router.
  • Do a hard reset (30-30-30)
  • Perform a thorough NVRAM erase (Administration > Configuration: Restore Default Configuration) by selecting [Erase all data in NVRAM memory (thorough)]. Make sure to click OK.
  • Set the routers IP address similar to your gateway router/DSL modem (e.g. if gateway is 192.168.0.1, set the router to 192.168.0.2 or 192.168.1.1) (Basic > Network: LAN)
  • Set the IP Address Range accordingly.
  • Click Save.
  • Click Reboot.
Note: You must first install DD-WRT firmware before you can flash Tomato firmware. Flashing Tomato firmware over a router original firmware will most likely not work.




Tomato related links:
 


Tomato OpenVPN Setup


  • Please open Tomato WebConfig by navigating to http://192.168.1.1/ in your browser.
  • Please proceed to Administration > Scripts and enter the following command:

echo USERNAME > /tmp/userpass.conf
echo PASSWORD >> /tmp/userpass.conf
chmod 600 /tmp/userpass.conf

  • Replace the “USERNAME” and “PASSWORD” with your account details. (the same that you use to login to the VPN control panel @ http://vpn.hidemyass.com )
  • Press “Save





  • Please proceed to VPN Tunneling > Client > Basic
  • In the basic settings do the following:

Start with WAN: Check
Interface Type: TUN
Protocol: Choose between TCP and UDP
Server IP address/Port: Enter the IP address of the server you wish to connect to
(e.g. you can use the IPs from the bottom of the config files at http://hidemyass.com/vpn-config/ -
or use the "PPTP servers" list from the VPN control panel, they're the same servers.)

Port:
For UDP enter 53 and for TCP 443
Firewall: Automatic
Authentication mode: TSL
Extra HMAC Authorisation: Disabled
Create NAT on tunnel: check

  • Press “Save






  • You may proceed to VPN Tunneling > Client > Advanced
  • Use the following settings:

Poll interval: 0
Redirect traffic: Uncheck
Accept DNS configuration: Disabled
Encryption cipher: BF-CBC
Compression: Disabled
TSL Regeneration Time: -1
Connection retry: 30 (or you may set -1 for infinite)

  • In Custom Configuration please enter the following:

ns-cert-type server
auth-user-pass /tmp/userpass.conf

  • Press “Save





  • You may proceed to VPN Tunneling > Client > Keys
  • In Certificate Authority please enter the content of “ca.crt
  • In Client Certificate please enter the content of “hmauser.crt
  • In Client Key please enter the content of “hmauser.key
    (you can get all those files from http://hidemyass.com/vpn-config/keys/ )
  • Press “Save






  • Your router is configured for OpenVPN.
  • You may proceed to VPN Tunneling > Client > Status
  • Simply press the “Start Now” button to connect.







  • If you are successfully connected you should see something like this:




Well done, you have configured your router for OpenVPN.

No comments:

Post a Comment