V. VPN (Virtual Private Networking)
ExpiredNordVPN: How to connect a DrayTek VPN router with IKEv2
DrayTek Vigor routers running firmware versions 3.9.9.8 and above can be configured to connect to NordVPN.
This article demonstrates how to create an IKEv2 VPN tunnel from a DrayTek Vigor Router to NordVPN server.
Account & Initial Setup
1. You will need a NordVPN account. You can apply for a account via https://nordvpn.com/
2. Download the NordVPN root CA certificate here.
3. Get the NordVPN server domain using the steps here.
Router Setup - Installing the X.509 Certificate
To connect to NordVPN, the router will need to have the certificate from NordVPN loaded onto the router and configured as a trusted certificate. It can then be used for authentication.
4. Log into the router's management page. Go to [Certificate Management ] > ]Trusted CA Certificate] page, and click IMPORT. Click Choose File to select the root.der file we downloaded in step 2. Then, click Import.
5. Wait for a few seconds until the router responds “Import Success” and the Certificate Status shows OK.
6. Go to [VPN and Remote Access] > [IPsec Peer Identity], edit a profile to for NordVPN server.
- Check Enable this account
- Select Accept Any Peer ID
Router Setup - VPN Configuration
7. Go to [VPN and Remote Access] > [LAN to LAN], click on an available index number, and edit the profile as follows. In Common Settings,
- Give it a profile name
- Check Enable this profile
- Set Call Direction to "Dial-Out"
- At Dial-Out Through, select the WAN interface for VPN connection
8. In Dial-Out Settings,
- Select IPsec Tunnel and IKEV2 EAP for the VPN server type
- Enter the domain of VPN server we get in step 3 at Server IP address/Hostname
- Enter your NordVPN service Username (How to get this)
- Enter your NordVPN service Password (How to get this)
- Select the IPsec Peer Identity Profile created in step 6 for Peer ID
- IKE phase 1 proposal encryption as "AES256"
- IKE phase 1 proposal DH group as "G14"
- IKE phase 1 proposal authentication as "SHA1"
- IKE phase 2 proposal encryption as "AES256"
- IKE phase 2 proposal authentication as "SHA1"
- IKE phase 1 key lifetime as "28800"
- IKE phase 2 key lifetime as "3600"
9. At TCP/IP Network Settings:
- Enter Remote Network IP as "0.0.0.0"
- Select Remote Network Mask to "0.0.0.0/0"
- First Published: 06/04/2020
- Last Updated: 10/12/2024