Firmware Release for OpenVPN WAN

The following is the supported models and firmware download links for the feature of OpenVPN WAN support.

This firmware is specific for the customer who purchased OpenVPN WAN license.

Product Hardware Revision Download Link
Balance 1350 HW2 Download
Balance 20 ALL Download
Balance 20X ALL Download
Balance 210 HW2-3 Download
HW4-5 Download
Balance 2500 ALL Download
Balance 30 ALL Download
Balance 30 LTE HW1-2 Download
HW3 Download
Balance 30 Pro ALL Download
Balance 305 HW2 Download
Balance 310 HW2-3 Download
HW4 Download
Balance 310X ALL Download
Balance 380 HW6 Download
Balance 50 ALL Download
Balance 580 HW2-3 Download
Balance 710 HW3 Download
Balance One ALL Download
Balance One Core ALL Download
Balance Two ALL Download
EPX ALL Download
MAX 700 HW1-2 Download
HW3-4 Download
MAX BR1 HW2-3 Download
MAX BR1 ENT ALL Download
MAX BR1 IP55 HW2-3 Download
HW4 Download
MAX BR1 IP67 ALL Download
MAX BR1 M2M ALL Download
MAX BR1 Mini ALL Download
MAX BR1 Mini Core ALL Download
MAX BR1 MK2 ALL Download
MAX BR1 Pro HW2 Download
HW3 Download
MAX BR1 Slim ALL Download
MAX BR2 HW2 Download
HW3 Download
MAX BR2 IP55 HW2-3 Download
MAX HD2 HW1-4 Download
HW5-6 Download
MAX HD2 Dome ALL Download
MAX HD2 IP67 HW1 Download
HW2-4 Download
MAX HD2 Mini ALL Download
MAX HD2 with MediaFast ALL Download
MAX HD4 ALL Download
MAX HD4 IP67 ALL Download
MAX HD4 MBX ALL Download
MAX HD4 with MediaFast ALL Download
MAX Hotspot ALL Download
MAX On-The-Go HW2 Download
MAX Transit ALL Download
MAX Transit Duo ALL Download
MAX Transit Mini ALL Download
MediaFast 200 HW1-3 Download
MediaFast 500 ALL Download
MediaFast 750 ALL Download
SDX ALL Download
SpeedFusion Engine ALL Download
SpeedFusion Engine Cam ALL Download
Surf SOHO HW2 Download
Surf SOHO MK3 ALL Download
UBR LTE ALL Download
1 Like

Quick Start Guide for OpenVPN WAN with special firmware 8.1.0s024

NOTE:
The OpenVPN WAN is available as a standard feature (*with optional license) started from firmware 8.1.1GA, you may download the latest GA from the firmware download page.

Step 1: Prior to the configuration, please upgrade the device with the special firmware 8.1.0s024, this firmware version specifically includes our new OpenVPN WAN feature. Next, please visit Store (or via other purchase channels) to acquire the OpenVPN WAN License.

Step 2: Once the license obtained, you can choose to let InControl2 push the license key to the device automatically provided that the device is connected/online in IC2. Or, if you opt to enter the feature activation key manually, please go to System > Feature Add-ons to paste the license key, then click the [Activate] button.

Step 3: A notification will display if the feature is activated successfully. Please reboot the unit to continue as instructed.

Step 4: The new WAN (default name “OpenVPN WAN 1”) will appear after the device rebooted (firmware 8.1.0s024). Click on that WAN to continue with configuration.

Step 5: Follow the highlighted instructions for the mandatory parameters, you may leave other settings on default. Click [Save] once you are finished filling in the highlighted settings. Click on the [Apply Changes] button to save your settings and to activate the OpenVPN WAN.

Step 6: The router will attempt to contact the OpenVPN server and negotiate to establish the connection. Once negotiation is successful, it will be connected (as shown below). The router is now connected to OpenVPN WAN.

Step 7: Once it is connected, a simple PING test can be performed as a verification process. Please select the “OpenVPN WAN 1” as the Connection.

Step 8: Done! OpenVPN WAN is successfully configured and working on the router now.

6 Likes

For a high-availability pair, do I need two licenses (one for each) or just one (and it’ll carry over to the slave if the master fails)?

Cheers,

Z

You need two licenses, OpenVPN WAN license does not carry over to slave.

2 Likes

If I bind the OpenVPN to a certain uplink, e.g. Wi-Fi WAN on 2.4Ghz, then both (WiFi WAN on 2.4 GHz, and OpenVPN WAN 1) will be active in the connection status – how can I be sure that all traffic using this uplink is going through the VPN and not directly through the WiFi WAN on 2.4 GHz?

Set an outbound policy to enforce the network traffic or other criteria to use the openvpn wan.

1 Like

I realize this is a 2021 post, but I wonder if these instructions are current in 2024 with firmware 8.4.1 build 5274 ?

I have a Balance 305 with the a/m firmware. I don’t have an “openVPN license”, or at least I never bought it or installed it (unless something came with the Balance?).
However, going to Advance-OpenVPN I can still setup the openvpn by ingesting the .opvn file generated by my openVPN server (router in another country).
When I then go to Status-OpenVPN, it says “Connected” in green, even if no “OpenVPN WAN” ever appears among the WAN’s or in the dashboard.
Why is it allowing me to do this, and differently from the instructions of this original post?

In any case things are not working properly: when OpenVPN is connected this way, all the devices in the LAN, regardless to which physical WAN they are connected, see the public IP of the openVPN server, with consequent ping delays, no matter what I do with the outbound policy (as I don’t have an "openVPN WAN to route through?).
Also, VPN appears to leak: dnsleaktest.com shows several servers of the various physical WAN’s in different countries.

I am confused, which is the right approach with Balance 305 in 2024 to run openVPN and make sure it does not leak?

thanks!

Why did no one ever answer NICOBAR’s question???

I bought this license key, but unfortunately it appears that it was a waste of $20. Can not get it to connect no matter what I do in the settings… It either shows “Uplink Not Ready” or “Disconnected”. MAX BR1 MINI CORE (Firmware version 8.5.1 Build 5203)

What interface is the openvpn pointed to? Can you share a screenshot of the setup?

1 Like

After some further messing around with this today I was able to get the WAN OPENVPN to connect.
But the whole reason I bought the $20 WAN OPEN VPN license is because I can NOT ping any devices that are behind the Peplink and I thought this license was the solution to the pinging problem but it seems to have not resolved the issue.
I can ping devices on the OPENVPN SERVER end of the VPN connection (outgoing from the Peplink device side), but I can NOT ping any devices that are plugged into the Peplink BR1 (client side incoming from the VPN Server side).
I am banging my head against a wall in frustration as to why ping is only one way.
Any suggestions?

Hi.
Look…

To ping devices connected to your peplink, you need to disable NAT.

1 Like

I disabled NAT for the OPENVPN WAN and I am still not able to ping any devices on the Peplink Router side of the VPN connection.

When I also disabled NAT on the cellular modem I got error “WAN failed smart check” and the OPENVPN WAN stated “Uplink Not Ready”.

Look…
At your openvpn gateway server… you need to have a route to your peplink lan address.
So… sample…
1 - when your peplink connect at ovpn gw, get a ip x.x.x.10 at ovpn virtual interface.
2 - this ovpn gw, need to have a route to 192.168.50.0/24 to this ip x.x.x.10 ovpn virtual address…
3 - very, very important!!! You cannot have at wan address the same ip network address of your lan address

1 Like

While people are looking at this again, can we get a option for a 2nd OVPN WAN interface?! insta-buy for me.

MarceloBarros,
Not sure why you start your responses with “Look…” Are you upset? It ‘reads’ that way.
Sorry for delay, I am currently out of town with work and do not have the equipment with me and will not be home until late tonight. But first chance I get when I return home I will take another look at the settings. In the meantime though I am a little confused by your instructions though and not sure I fully understand what you want me to do. Can you maybe reword your instructions or explain more in detail so more clear on exactly what I need to do?
Thank you so much,
Doug

Look (sorry… brazilian way)

1 Like

Hi.
Because you want to use ovpn and also need an access to your peplink internet network, you need to route (network route) your connection between all points. You need to check about this capability at your ovpn gw server. Do you know how ipsec works? lan to lan (l2l)? Do you know how to route networks?

2 Likes

agreed, use trace route to see where it’s failing as well.

I am not a network guru, nor do I claim to be. I have a general understanding of ipsec ad basic networking, so assume I know little to nothing. I am having trouble understanding exactly how to go about setting this up so I have a route to my peplink lan address from the OpenVpn server.

On a side note there was already an area to configure OPENVPN connections in the Peplink, but after purchasing the OPENVPN client license I now have this added WAN OPENVPN in the WAN connection section. I thought everything would be in one location and now has two separate locations and they both will accept an .ovpn file for OPENVPN connection. Confusing.

If you are willing to walk me through it in detail that would be awesome and greatly appreciated.

I am working with a Peplink MAX BR1 MINI CORE HW3 (the OpenVpn Client) (Cellular connection is Dynamic IP address non public routable ip, not static, not sure if that makes any difference) and a Synology RT2600AC router (the OpenVpn Server).

Let me know if there is any information you need in order to help me. Thank you.

P.S. Not sure if this screenshot is helpful, it is network ip settings in the VPN network section of my Synology router, originally OpenVpn was 172.xxx.xxx.xxx IP address but I changed it to 192.168.50.0/24 trying to get this to work because I thought it needed to be on the same network as the Peplink.

Hi…
Sorry… I cannot help you with Synology RT2600AC router. I don’t know this device .
But… looking at the picture… look OpenVPN subnet… you must change this to another network… you can not have at your remote device (peplink) a WAN and a LAN at the same network ip address. (192.168.50/0/24)

Let’s say… you change this address to 192.168.55.0/24. okay?

when you peplink connect to this ovpn server gw, it will get at peplink ovpn connection 192.168.55.123 / 24. so…

You need to add a route in your synolgy device that 192.168.50.0/24 ( peplink lan ip network ) will be behind 192.168.55.123

Sample (I don’t know the cli of your Synology)
route add 192.168.50.0 netmask 255.255.255.0 192.168.55.123

Very important… you need to check at your Synology… that every new connection made by the same peplink always will get the same IP from Synology (192.168.55.123 )

and remember… disable nat for opvn in your peplink.

I did a search… Found

I never see this device in Brazil…

2 Likes