NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
Morganino
Jun 26, 2017Tutor
Netgear R7000 and OpenVPN for Android App
Hi, since last OpenVPN for Android App update (v.0.6.73) downloadable at the following link: https://play.google.com/store/apps/details?id=de.blinkt.openvpn OpenSSL version was upgraded to 1.1 and...
- Feb 28, 2018
Thanks everyone for feedback so far. Attached is version 1.0.1. I fixed some typos, added a suggestion to clean up your tftp folder when you're done, and made a note about the OpenVPN version that's most compatible with the document.
Some users looking to work through this doc may find that they can avoid Step 1 by visiting this hidden page:
If the debug page loads and there is an "Enable Telnet" option then you got lucky. Note that either the debug page or the option to "Enable Telnet" may not exist on your device or firmware version. Remember to check that this option is disabled after you're finished because having telnet enabled is a security risk.
NG_Guru
Feb 25, 2018Star
I'm looking forward to see if I can update my R8500 with your method. I have telnet enabled.
Are you by chance loading your certificates via the hidden page? http://192.168.1.1/OPENVPN_hidden.htm
NG_Guru
Feb 25, 2018Star
looks like the certificates are stored in /usr/temp/openvpn
files are: ca.crt client.crt client.key dh1024.pem server.crt server.key
There may also be an easier way to enable telnet from the chek box at http://192.168.1.1/debug.htm
- ArnoldRKokMay 17, 2018Aspirant
I fixed the connection by manually editing my config file:
---
client
dev tap
proto udp
remote YourPublicIP-or-DNS 12974
resolv-retry infinite
nobind
persist-key
persist-tun
ca C:\\path-to-certificates\\OpenVPN\\config\\ca.crt
cert C:\\path-to-certificates\\OpenVPN\\config\\client.crt
key C:\\path-to-certificates\\OpenVPN\\config\\client.key
tls-cipher "DEFAULT:@SECLEVEL=0"
cipher AES-128-CBC
comp-lzo
verb 5---
Kind regards, Arnold
- pthorvaldMay 27, 2018Guide
Here is something interesting:
- I had resolved the issue using Diggie3's instructions.
- I just installed the beta FW (1.0.9.30_10_2_23)
- I did a telnet into the router and looked at /tmp/openvpn.... The newkeys.zip file that Diggie3 had us put in was still there.... so I unzipped it.
- I tried one of my clients that still had the old keys..... and it worked!!!
This appears to be the best of all worlds...
- I don't have to redistribute keys.
- They are unique and strong keys that I generated
- I am able to take new security updates from NG as they put them out.