How to Configure ExtremeVPN PPTP on Linksys E-5350 AC1000 Wi-Fi Router
Get an ExtremeVPN tunnel on your router and protect your devices at home, connected to wifi. This process works even on devices that don’t directly support a VPN connection.
This tutorial will guide you on configuring ExtremeVPN on a Linksys E-5350 Wifi Router with Software version 1.0.00 and Hardware version AC1000. However, first, you’ve to ensure the following factors:
- A working Internet connection
- VPN-supporting router device
- Premium ExtremeVPN account (click here to get a subscription if you don’t have one already or you’re a new customer)
You can manually configure your router using VPN credentials. For this, you’ve to follow the steps we’re listing here:
- Sign in to the Member area using your registered email and password.
- On the subscriptions tab, scroll down to locate your VPN credentials.
- You can now view or copy them.
- Note down and remember the login details. The pass is usually hidden. To view it, press the Eye icon in front of the password, and it will display the key.
- To set up a VPN on your E-5350 Wifi Router, you must first connect to it by searching http://192.168.0.1 in the browser’s address tab. It will take you to the router’s control panel; if it doesn’t, go to your router’s manual guide to find your Default Gateway Address.
- Now, log in using your username and password.
- After logging in, move to the Local Network option and choose WAN Setup from the list that appears.
- From the WAN Setup, set the Internet Setup to PPTP.
- Now, do the following configurations:
- Type 8.8.8.8 in DNS 1 (Optional)
- Type 8.8.4.4 in DNS 2 (Optional)
- Server address: Enter the server address you want to connect to.
- Enter your ExtremeVPN credentials (username and password in the fields).
- Keep Alive: Set it to Always-On.
- Tap on the Save button to enable the VPN connection.
- ExtremeVPN will now connect successfully to your Linksys E-5350 Router.
How helpful was this guide? Share your comments below. Your recommendations matter to us and everyone else in the entire cyber security community.
Comments
No comments.