VPN

VPN types

If you need a refresher on the different types of VPNs, see below.

PPTP / L2TP/IPSec / OpenVPN
Pro /  Available in most operating systems by default /  Available in most operating systems by default
 More secure than PPTP
 No known security flaws /  Very configurable
 Uses open source software
 More secure than PPTP
 No known security flaws
 Can use any port, setting to TCP 443 makes it almost indistinguishable from HTTPS traffic
Con /  Uses IP protocol 47 (GRE) and UDP port 1723, making it easily detectable and blockable by a firewall
 Encryption is not strong
 First on NSA's "to-hack" list /  Uses UDP ports 50, 500, 1701, and 4500, making it easily detectable and blockable by a firewall
 Slightly more overhead than OpenVPN, since traffic is passing through the tunnel and encryption in two separate steps /  Not available in most operating systems by default, requires a third-party application

Split-tunnel vs full-tunnel

When setting up a VPN, you’ll have to choose whether to use split-tunnel or full-tunnel for the clients.

  • Split-tunnel – Allows your local client to access resources on the remote server network (e.g., network shares, file servers, email servers, etc…). Regular internet traffic does not flow through the tunnel and is not encrypted.
  • Full-tunnel – Allows your local client to access resources on the remote server network (e.g., network shares, file servers, email servers, etc…). Regular internet traffic does flow through the tunnel and is encrypted. However, this might cut your client off from local resources. Typically, clients will have to connect/disconnect based on which group of resources they want to access (local or remote).

I usually choose to go full-tunnel, since I’m usually trying to get access to resources at home and I’m not concerned about local resources. This is easy enough to change on each client by adding or removing one option.

Hardware acceleration

A big advantage of the ERL is that it allows you to offload some functions to hardware. One of these is the IPSec VPN, which greatly improves the throughput. Expect to get about 10Mbps (with one CPU at 100%) while using OpenVPN, and expect up to 150Mbps while using IPSec/L2TP with hardware offload enabled.

I’m choosing to use OpenVPN because it’s what I’m more familiar with. If the performance is really bad, I’ll switch to IPSec/L2TP.

OpenVPN security

By default, OpenVPN developers tend to favor compatibility and speed over security. That’s not necessarily a bad thing, but in this case, I’m going to be changing a few default options. OpenVPN defaults to the following:

  • cipher – Blowfish in Cipher Block Chaining mode (BF-CBC)
  • authentication digest – SHA1

OpenVPN themselves recommend AES-256 for more security. In addition, SHA1 is outdated, and shouldn’t be used if SHA2 is available. I’m going to be using the following:

  • cipher – AES-256-CBC
  • authentication digest – SHA256

For more security reading, check out the resources here, here, and here.

OpenVPN setup

We’re basically going to create our own Certificate Authority (CA) on the router and use it to sign certificates for authentication. This isn’t best-practice, since the CA should be on its own machine, but it will do for this situation.

Create CA

First, you’ll need to become root.

sudo su -

Next, move into the necessary directory and create a new CA certificate.

cd /usr/lib/ssl/misc/

./CA.sh -newca

Once this completes, you’ll have a new directory called demoCA. The two most important files in here are as follows:

  • private/cakey.pem – This is the private key for your CA (keep this secret)
  • cacert.pem – This the public key for your CA (you’ll be giving this out to your clients)

Create server certificate

Next, we’ll generate a public/private key for the server. The Common Name (CN) of your server certificate should be something unique (I used my dynamic DNS name).

./CA.sh -newreq

Once this completes, you’ll have two new files, as follows:

  • newkey.pem – This is the private key for your server (keep this secret)
  • newreq.pem – This is the unsigned public key of the server (this needs to be signed by your CA)

Now, sign the request.

./CA.sh -sign

You’ll have one more file, shown below.

  • newcert.pem – This is the public key for your server

Move files

I recommend moving the important files to a directory where they won’t be wiped out during a firmware upgrade. In addition to moving the files, we’re also renaming them.

cp /usr/lib/ssl/misc/demoCA/cacert.pem /config/auth/

cp /usr/lib/ssl/misc/demoCA/private/cakey.pem /config/auth/

mv /usr/lib/ssl/misc/newcert.pem /config/auth/host.pem

mv /usr/lib/ssl/misc/newkey.pem /config/auth/host.key

DH parameters

Next, generate Diffie-Hellman (DH) parameters to ensure Perfect Forward Secrecy (PFS). Expect this to take 5-10 minutes with one CPU at 100%.

openssl dhparam -out /config/auth/dh2048.pem -2 2048

A good explanation of DH parameters and why you need them is located here.

Create user certificate(s)

Next, generate a request and sign it for a new user certificate. The Common Name (CN) of your user certificate should be something unique (I used my client’s host name).

./CA.sh -newreq

./CA.sh -sign

Move the new files into your preserved directory while renaming them.

mv newcert.pem /config/auth/client1.pem

mv newkey.pem /config/auth/client1.key

Repeat this as necessary for each client.

Decrypt keys

You’ll need to remove the password from the host and client(s) keys so that OpenVPN can run in interactive mode.

openssl rsa -in /config/auth/host.key -out /config/auth/host-decrypted.key

openssl rsa -in /config/auth/client1.key -out /config/auth/client1-decrypted.key

Repeat this as necessary for each client(s).

EdgeRouter setup

First, I would recommend exiting back to the normal ubnt user.

exit

whoami

The following steps were pretty straight-forward, since I’ve already setup an OpenVPN server on my Archer C7.

Create interface

Now, we’ll need to create a new interface for the VPN and set a few settings.

configure

set interfaces openvpn vtun0

set interfaces openvpn vtun0 description "OpenVPN server"

set interfaces openvpn vtun0 mode server

set interfaces openvpn vtun0 encryption aes256

set interfaces openvpn vtun0 hash sha256

set interfaces openvpn vtun0 server subnet 10.10.10.0/24

set interfaces openvpn vtun0 server push-route 10.10.2.0/24

set interfaces openvpn vtun0 server name-server 10.10.2.1

set interfaces openvpn vtun0 tls ca-cert-file /config/auth/cacert.pem

set interfaces openvpn vtun0 tls cert-file /config/auth/host.pem

set interfaces openvpn vtun0 tls key-file /config/auth/host-decrypted.key

set interfaces openvpn vtun0 tls dh-file /config/auth/dh2048.pem

set interfaces openvpn vtun0 openvpn-option "--port 1194"

set interfaces openvpn vtun0 openvpn-option --tls-server

set interfaces openvpn vtun0 openvpn-option "--comp-lzo yes"

set interfaces openvpn vtun0 openvpn-option --persist-key

set interfaces openvpn vtun0 openvpn-option --persist-tun

set interfaces openvpn vtun0 openvpn-option "--keepalive 10 120"

set interfaces openvpn vtun0 openvpn-option "--user nobody"

set interfaces openvpn vtun0 openvpn-option "--group nogroup"

commit

save

A few notes on these settings:

  • The VPN subnet can’t be the same as your LAN subnet. In my case, my VPN subnet is 10.10.10.0/24 and my LAN subnet is 10.10.2.0/24.
  • You’ll need to push a route from the VPN subnet to your LAN subnet.
  • You’ll need to set a name server for the VPN subnet (I’m using my router, but you can use a public DNS server).
  • The standard OpenVPN port is 1194, but setting it to 443 would make it almost indistinguishable from HTTPS traffic
  • The rest of the settings are explained in the OpenVPN manuals.

Setup firewall

We’ll need to open a port in the firewall for OpenVPN. If you’re not using the standard port (1194), change it appropriately.

configure

set firewall name WAN_LOCAL rule 50 action accept

set firewall name WAN_LOCAL rule 50 description "OpenVPN"

set firewall name WAN_LOCAL rule 50 destination port 1194

set firewall name WAN_LOCAL rule 50 log enable

set firewall name WAN_LOCAL rule 50 protocol udp

commit

save

Set DNS

Tell DNS to listen for requests on the new vtun0 interface.

configure

set service dns forwarding listen-on vtun0

commit

save

Setup client configuration

The client configuration will vary from client-to-client, but the configuration below should work for Android phones or Linux clients. If you’re using Windows, you’re going to have a tougher time, because it needs some extra options.

echo "client" > /config/auth/client1.ovpn

echo "dev tun" > /config/auth/client1.ovpn

echo "proto udp" > /config/auth/client1.ovpn

echo "remote yourhostname.dyndns.com 1194" > /config/auth/client1.ovpn

echo "cipher AES-256-CBC" > /config/auth/client1.ovpn

echo "auth SHA256" > /config/auth/client1.ovpn

echo "resolv-retry infinite" > /config/auth/client1.ovpn

echo "redirect-gateway def1" > /config/auth/client1.ovpn

echo "nobind" > /config/auth/client1.ovpn

echo "comp-lzo yes" > /config/auth/client1.ovpn

echo "persist-key" > /config/auth/client1.ovpn

echo "persist-tun" > /config/auth/client1.ovpn

echo "user nobody" > /config/auth/client1.ovpn

echo "group nogroup" > /config/auth/client1.ovpn

echo "verb 3" > /config/auth/client1.ovpn

echo "ca cacert.pem" > /config/auth/client1.ovpn

echo "cert client1.pem" > /config/auth/client1.ovpn

echo "key client1-decrypted.key" > /config/auth/client1.ovpn

A few notes on these settings:

  • Obviously, subsititue your dynamic DNS hostname and port as needed.
  • To use full-tunnel, include the option redirect-gateway def1. To use split tunnel, leave it out.
  • The rest of the settings are explained in the OpenVPN manuals.

Distribute keys

You’ll need to move the following files from the router, to your client(s). All four files should be saved in the same folder/location on your client.

  • cacert.pem (CA certificate)
  • client1.pem (client1 certificate)
  • client1-decrypted.key (client1 key)
  • client1.ovpn (client1 configuration)

You should use SFTP, SSH, or SCP to move the files to your client(s). DO NOT EMAIL THESE FILES TO YOURSELF!

Client setup

Android

In this case, I’m going to be using the official OpenVPN Android app.

Once installed, tap on the Option button, then tap on Import, then tap on Import Profile from SD Card.

Browse to the client1.ovpn file and import it into the OpenVPN Connect app.

The profile should be imported successfully, and you should be able to see your server’s name. Click Connect to establish a connection.

Verify your connection on the next screen.

iOS

In this case, I’m going to be using the official OpenVPN iOS app.

You should use iTunes to move the files to your iOS device, since emailing them is not secure. An example of how to transfer files with iTunes is shown here.

Windows 10

If you’re using a Windows client, check out Randy’s .ovpn file!

Commenter Chris was nice enough to email me a configuration for Windows 10, shown below. For certificate/key generation he used this guide instead of the built-in scripts.

Server

​xxxxx@​xxxxx# show interfaces openvpn vtun0

description "OpenVPN Server"

encryption aes256

hash sha256

mode server

openvpn-option "--port ​xxxx"

openvpn-option --tls-server

openvpn-option "--comp-lzo yes"

openvpn-option --persist-key

openvpn-option --persist-tun

openvpn-option "--keepalive 10 120"

openvpn-option "--user nobody"

openvpn-option "--group nogroup"

openvpn-option "--tls-auth /config/auth/ta.key 0"

openvpn-option "--tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA"

server {

name-server 10.10.0.1

push-route 10.10.0.0/24

push-route 0.0.0.0/0

subnet 10.10.10.0/24

}

tls {

ca-cert-file /config/auth/ca-chain.cert.pem

cert-file /config/auth/openvpn.host.cert.pem

dh-file /config/auth/dh2048.pem

key-file /config/auth/openvpn.host.key.pem

}​

Client (Win10)

pull

tls-client

dev tun

proto udp

remote ​xxx.xxx.xxx.xxx ​xxxx

cipher AES-256-CBC

tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA

auth SHA256

resolv-retry infinite

redirect-gateway def1

nobind

comp-lzo yes

persist-key

persist-tun

verb 3

ca ca-chain.cert.pem

cert openvpn.client01.cert.pem

key openvpn.client01.key.pem

tls-auth ta.key 1​

Verify connection

Try to browse a public site (e.g., then try to browse to your router’s IP (e.g., 10.10.2.1). If everything is setup correctly, both should load. You can also check your IP with an external tool, such as WhatIsMyIP, and you should see your router’s public IP. I’d also advise to check for DNS leaks (your DNS should be set to the DNS servers we set on the router).

Speedtest

On a Nexus 5 on AT&T LTE, I get 25.61Mbps down, and 23.37Mbps up.

When connected to the VPN while on the same LTE, I get 11.52Mbps down and 5.35Mbps up. Not great, but certainly not bad.

Backup CA

Thanks to Axel for pointing this out. You should backup the entire /usr/lib/ssl/misc directory because it is wiped on a firmware upgrade, and you won’t be able to create any new certificates without creating a new CA from scratch.

cp -r /usr/lib/ssl/misc /config/

Then, after an upgrade, you can restore the misc directory from /config back to /usr/lib/ssl.

Let me know how you setup OpenVPN!

Logan

Post navigation

Ubiquiti EdgeRouter Lite setup

EdgeRouter Lite software upgrade

103 thoughts on “EdgeRouter Lite OpenVPN setup”

  1. NR

2016/07/27 at 2:24 pm | Reply

This was extremely helpful, thanks. Worked without a hitch the first time.

  1. JP

2016/08/06 at 1:07 am | Reply

Logan thanks for a great guide!

There are some other features also documented here:

What are your thoughts on enabling TLS auth?

  • Logan

2016/08/07 at 8:49 pm | Reply

Glad to help!

I’ve never used it, but it seems like a good idea! It seems like there is a configuration for it (shared-secret-key-file). You’d have to find a way to get it to your clients in a secure manner.
shared-secret-key-file
File containing the secret key shared with remote end of tunnel

  1. Karen

2016/08/08 at 1:11 am | Reply

Thanks for the great directions! You rock. Really.

One small error:

“client1.conf (client1 configuration)” –> I assume you mean client1.ovpn

Also, do you know how to bundle the keys and all into a single OVPN file? This makes it easier to import into OpenVPN.

  • Logan

2016/08/08 at 8:39 am | Reply

Updated, thank you!

What you’re referring to is unified format. Check out this page, about 1/3 of the way down. Just a heads up, some clients may not like that format and may require separate files.

  1. David

2016/08/25 at 3:09 pm | Reply

Hi Logan,

Great guide! Thanks for explaining each step – helps me know what I’m doing as I’m going along.

Question:
Do you know configuration changes I would need to make in order to make this setup a split tunnel configuration? E.g. internet connectivity goes through my local connection, and then the VPN traffic(e.g. access a file server) goes through the the VPN?

  • Logan

2016/08/25 at 3:18 pm | Reply

Thanks! Unfortunately, I don’t know how to do that. I would recommend asking on the forums or Reddit page.

  1. David

2016/08/30 at 1:08 pm | Reply

Hey logan,
I stuffed up on the first step when putting in,

cd /usr/lib/ssl/misc/
./CA.sh -newca

I stuffed up when I entered the password the second time and it looks like it failed creating the /usr/lib/ssl/misc/demoCA/cacert.pem File is there a way I can restart the process?
I did try but its just not creating the missing file?

  • Logan

2016/08/30 at 1:47 pm | Reply

If you do a ls -la, what do you see? I’m assuming you can delete the files and start over, right?

  • David

2016/08/31 at 4:18 am | Reply

I am very much a noob when it comes to the CLI,
I did run it and it shows.
root@ubnt:~# ls -la
total 13
drwxr-xr-x 1 root root 4096 Aug 30 16:38 .
drwxr-xr-x 1 root vyattacf 4096 Aug 30 16:38 ..
-rw-r–r– 1 root root 206 May 28 16:01 .bashrc
-rw-r–r– 1 root root 140 Nov 19 2007 .profile
-rw——- 1 root root 1024 Aug 30 16:42 .rnd

so I don’t know what any of that means.

I will keep looking online to see what I can find.
Thanks for any help

  • Logan

2016/08/31 at 8:41 am | Reply

Sorry, you need to move to the directory first.

cd /usr/lib/ssl/misc/
ls -la

Also, if you’re not familiar with the CLI, the EdgeRouter may not be the router for you.

  1. nicolas

2016/10/08 at 7:06 pm | Reply

Hello, i really like to read your tutorial, you take your time to explain things so even a newbie like me could make it so thanks for that lol. How you ever tried to use openvpn like a server in the cloud ? i see aws got instances set for that. I was thinking about running one and connect as client several edgerouter from different location on it for remote access each of them separately from time to time.

What will be the best configuration on both part ? I keep looking around but don’t see no tutorial on this case ! thanks for your thoughts

  • Logan

2016/10/09 at 9:50 pm | Reply

Yes, you’re looking for an OpenVPN client (I only setup a server). You’ll want a guide like this.

  1. Ryan

2016/11/25 at 11:18 pm | Reply

Hi,

after I run this line:
openssl dhparam -out /config/auth/dh2048.pem -2 2048

It took 3-4 Hours instead of 5-10mins, is this normal?

I didn’t want to proceed just incase

  • Logan

2016/11/26 at 1:10 pm | Reply

As long as it finishes, you should be ok.

It’s possible that your router was too busy (no CPU time for generating entropy), or not busy enough (no entropy present for DH parameters).