Introducing PureSquare – for security beyond VPNs

Visit our website

Don’t worry about forgetting your passwords ever again with the all-new password manager. Try PureKeep

How to setup OpenVPN on Fresh Tomato

Jun 04, 2020
Aug 11, 2022
0 Comments
Download PDF

Configuring a PureVPN tunnel on your router is a great way to ensure the safety and security of all the devices in your home. This method is especially beneficial if you have devices that don’t have VPN compatibility or you want to protect all the Wi-Fi-connected devices in your home.

This article will guide you through the steps involved in setting up PureVPN OpenVPN on a Tomato firmware router. We have used a Linksys router flashed with the latest Fresh Tomato firmware to prepare this article:

Things to Consider:

  1. You have a working internet connection
  2. VPN Supported Router.
  3. A Premium PureVPN account (If you haven’t bought yet click 👉here to buy)
Find your VPN credentials for manual configuration.

To find your VPN credentials log into the PureVPN member area. Click 👉 here to visit member area.

  • Login to the Member area using your PureVPN registered email address and password.
  • On subscriptions tab scroll down to be able to view your VPN credentials.
  • You will be able to see and copy your VPN credentials.
  • Note down your PureVPN username and click on Eye icon to make your password visible and use it in the manual configuration.
How to connect PureVPN manually on Fresh Tomato Router.
  •  Log in to the router control panel by entering the router’s default IP address 192.168.1.1 to the address bar of your preferred browser. (If you changed your router’s default IP address, enter that into your browser instead). Enter the admin name and password for your router, then click Sign In. The default username for Tomato is the root and the password is admin.
Enter the admin name and password for your router, then click Sign In. The default username for Tomato is the root and the password is admin.
  • In order to configure OpenVPN on FreshTomato, first download the required 👉OpenVPN Files.
  • In the left-hand menu, click on VPN Tunneling. Then click OpenVPN Client.
click on VPN Tunneling.
In the left-hand menu, click on VPN Tunneling. Then click on OpenVPN Client.
  • Now configure your OpenVPN client as shown below:
    1. Start with WAN: Check
    2. Interface Type: TUN.
    3. Protocol: Choose either UDP or TCP and keep it in mind as this will be important later on.
    4. For the first field enter our server hostname. The complete list of servers can be obtained from 👉 here.
    5. Enter port number 80 for TCP or port number 53 for UDP.
    6. Authentication Mode: TLS
    7. Username: Enter your PureVPN username
    8. Password: Enter your PureVPN password
    9. Extra HMAC authorization (tls-auth): Outgoing(1)
    10. Auth Digest: SHA1
    11. Create NAT on tunnel: Check
    12. Click Save
Click Save
  • Under the Advanced Tab:
    1. Accept DNS configuration: Relaxed
    2. Cipher Negotiation: Enabled (with fallback)
    3. Legacy/fallback cipher: Use Default
    4. Compression: LZO Adaptive
    5. Connection retry: 30
    6. Click Save
Accept DNS configuration: Relaxed Cipher Negotiation: Enabled (with fallback) Legacy/fallback cipher: Use Default Compression: LZO Adaptive Connection retry: 30 Click Save
  • Under Keys Tab:
    1. For Static Key: Copy and paste all the content from the Wdc.key file you have downloaded with the OpenVPN configuration files.
    2. For Certificate Authority: Copy and paste all the content from the ca.ca.crt file.
    3. Client Certificate and Client Key: blank
    4. Click Save
Click Save
  • Go to the Status tab and click Start Now to connect with OpenVPN connection.
Go to the “Status” tab and click Start Now to connect with OpenVPN connection.
  • You are connected to VPN now!!!
  • If you want to disconnect your OpenVPN connection, click on Stop Now button/ option.
If you want to disconnect your OpenVPN connection, click on Stop Now button/option.

Was this article helpful? Rate and share your comments below. Your input matters to us and everyone else in the Cyber Security Community.

How helpful did you find this answer?

Comments (0 )