My hunch is my outbound NAT is not setup properly…and unsure if I need to take into account he virtual IP to PIA VPN remote IP. And of course when I do an IP lookup, it comes back as my WAN IP and not my PIA VPN IP. If I run a ping test to the virtualIP via the PIA openVPN interface, that passes. I have the FW rules configured along with the outbound NAT…the major difference I see between ExpressVPN and PIA, is that I appear to be getting an internal virtual IP address which I did not get with ExpressVPN. I used to do this via ExpressVPN but just made the switch over to PIA, and cannot for the life of me figure out where I am going wrong. OpenVPN is considered the most secure protocol available. WireGuard® is light and fast, perfect for streaming on Roku. PIA uses the best protocols in the game: WireGuard® and OpenVPN. I have followed the guides, and pretty sure I have it setup properly. Protocols are the bedrock of a VPN, and you need the best ones to protect yourself against cybercrooks and data harvesters. The OpenVPN, Interface, Gateway are all showing enabled and up however when I put a rule in to route a particular host to it, it does not seem to be working - all traffic continues to route out to my WAN. Hope this helps anyone else running DSM7.x that's having the same issues I was.Greetings all, I am having troubles routing particular traffic to my PIA Gateway. I created this guide by sorting through guides created by others like the one above, and am very thankful for the active NAS community as trying to figure all of this out on my own would have been a nightmare. To test your new profile navigate to the Network panel, select Network Interface then the profile you wish to use, and click "Connect." Click "Next" and unless your specific needs require otherwise select all three checkboxes.ovpn file by browsing to the folder you saved your custom configs to. OVPN profiles you created in the first step. zip file and find the files labeled ca. and ca. then move them to the folder containing the. Download the default OVPN config pack ZIP here:.ovpn file using a text editor like Notepad.ĭelete the word "compress" and replace with "comp-lzo". Select OpenVPN 2.4 or newer -> Linux -> Select VPN Region of your choice (I have 3 separate configs built: Two US and One Canadian, but you can load as many or few as you want) -> Select Port (I'm running the first default choice but there are several so you have options if your situation has specific requirements) -> Click Generate Create a custom OpenVPN file from here:.It should not match your local IP, but that of your VPN connection.įor those of you struggling to get this to work on DSM7.x, this is what finally got things running on my DS218+: The longest subscription plan for most VPN providers is two years, but PIA offers a three-year plan for 2.03 per month. Part of the reason PIA is so affordable is its long-term subscription plan. Start the download and wait for to refresh. At first glance, Private Internet Access offers the lowest monthly costs. Activate that feature and then copy and paste the Magnet link into the DSM Download Station app (install package if necessary). Navigate to the section that says Torrent Address detection. You also probably want to check "Reconnect when VPN connection is lost" to make sure the connection stays alive.īe sure to check your connection using when you are done by visiting in a new window/tab in your web browser. You also have to make sure "Use default gateway on remote network" is checked on the last screen, or you will be connected to VPN but your traffic will not be going through the VPN. Has anyone actually tested this and confirmed that traffic is actually going through their VPN? I was able to get it connected successfully using these instructions, but if I test my IP at, it is showing my traffic is not going through the VPN even though it says it is connected in DSM.Įdit: I just figured it out. I therefore do not recommend the continued use of PIA and urge you to find an alternative VPN provider. Make sure to tick "Use default gateway on remote network" and "Reconnect when the VPN connection is lost".Įdit: It has been brought to my attention that PIA has been acquired by a malware distributor company.At the "Client Revocation" field, click on "Browse" and import the "" file.Import the CA certificate by browsing to the "ca.rsa.2048" file.Input your user name and password from your PIA account.Delete the word "compress" and replace with "comp-lzo".Open using a text editor like Notepad.zip file and find your countries relevant. These instructions are for getting the PIA VPN working with Synology DSM 6.X (I have not tested with DSM 7.X). Posting this here for posterity to help others since the various places I searched had either incomplete or incorrect information.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |