Setting Up ApexGuard on TP-Link Routers
Prerequisites
- TP-Link Router that supports IPsec IKEv2 client connections (e.g., SafeStream or Omada router such as ER605, ER7206, etc. with recent firmware).
- ApexGuard IKEv2/IPsec Credentials:
- Server address (e.g.,
ikev2.apexguard.com) - Pre-shared key (PSK)
- (Optional) If ApexGuard also provides a username/password or certificate, you will adapt those steps accordingly.
- Server address (e.g.,
- Local Network information (e.g., 192.168.0.0/24).
Note: These instructions assume a simple PSK-based configuration, which is the most common IKEv2 setup for small offices or advanced home users.
1. Log into the TP-Link Router
- Open a web browser and go to the router’s IP address (often
192.168.0.1or192.168.1.1). - Enter your admin username and password.
2. Locate the IPsec (VPN) Section
- On the router’s management interface, navigate to VPN → IPsec, or VPN → IPsec VPN.
- Ensure the IPsec service is enabled if there’s an on/off toggle.
3. Create a New IPsec (IKEv2) Connection
- Click Add, Create, or New IPsec connection (wording may vary).
- In Connection Name, use something identifiable like
ApexGuard_IKEv2.
4. Configure Basic Tunnel Settings
You’ll typically see prompts for Mode, Remote Gateway, and Local Subnet:
- Mode / IKE Version: Choose IKEv2 (if the router offers a choice between IKEv1 and IKEv2).
- Remote Gateway (Server): Enter
ikev2.apexguard.com(or whichever address ApexGuard provides). - Local Subnet:
- If you want to route all local traffic through ApexGuard, specify your LAN range (e.g.,
192.168.0.0/24).
- If you want to route all local traffic through ApexGuard, specify your LAN range (e.g.,
- Remote Subnet:
- Many providers use
0.0.0.0/0for a “full-tunnel” setup, meaning all your traffic is routed via ApexGuard. - If your router requires a site-to-site style, just follow the recommended remote network settings from ApexGuard.
- Many providers use
5. Authentication: Pre-Shared Key
- Authentication Method: Select PSK (Pre-Shared Key).
- Pre-Shared Key: Paste in the key from your ApexGuard account.
6. Phase 1 (IKE) & Phase 2 (ESP) Settings
Match ApexGuard’s recommended proposals. A typical approach:
- Phase 1 (IKE):
- Encryption Algorithm: AES-256
- Authentication (Hash): SHA256
- DH Group: Group 14 (2048-bit)
- Lifetime: 28800 seconds
- Phase 2 (ESP):
- Encryption Algorithm: AES-256
- Authentication (Hash): SHA256
- Lifetime: 3600 seconds (or as recommended)
If your router only offers drop-downs for standard ciphers, pick something as close to ApexGuard’s published specs as possible.
7. Save and Enable the Tunnel
- Click Save or OK.
- You should see your new profile (
ApexGuard_IKEv2) in the IPsec list. - Enable or Connect the tunnel if there is a toggle or “connect” button.
8. Verify Connection Status
- Check the router’s VPN / IPsec status page.
- If successful, it should show Connected or Established next to the
ApexGuard_IKEv2tunnel. - If it fails, review the logs for mismatch in PSK, wrong server name, or cipher mismatch.
9. Test Your Connection
- From a device on your LAN, visit “What is my IP?” or check the ApexGuard dashboard.
- If you see your traffic is coming from an ApexGuard location, the VPN is working.
- Optionally, run continuous pings or speed tests to confirm performance.
Was this article helpful?
Thank you, you're making us better!