

Vpn ubiquiti edgerouter x setup guide for secure site to site and remote access vpns on edgerouter x is all about getting two things right: a solid site-to-site tunnel between networks and a reliable remote access setup for users who need in. Think of it as building a private highway for data that runs 24/7, no matter where your team sits.
Vpn ubiquiti edgerouter x setup guide for secure site to site and remote access vpns on edgerouter x
Quick fact: Edgerouter X can handle both site-to-site VPNs and remote access VPNs with OpenVPN or IPsec, all on a compact, affordable device.
This guide covers:
- Why you’d want both site-to-site and remote access VPNs
- A practical, step-by-step setup for each VPN type
- Security best practices and common gotchas
- Real-world tips and troubleshooting
- A handy checklist to confirm everything works
If you’re in a hurry, here’s a quick path:
- Step 1: Prep your Edgerouter X with the latest firmware
- Step 2: Set up a site-to-site VPN with IPsec
- Step 3: Enable remote access VPN for users IPsec or OpenVPN
- Step 4: Configure firewall rules and NAT exemptions
- Step 5: Test from both sides and verify connectivity
Notes and resources: - Ubiquiti support: ubnt.com
- Edgerouter X product page: ubnt.com
- OpenVPN docs: openvpn.net
- IPsec best practices: home networks and enterprise guides
- Community forums: форум.ubnt.com and reddit r/homelab
- Understanding the two VPN flavors
- Site-to-site VPN: Creates a private tunnel between two networks, so devices on one network can reach devices on the other as if they were locally connected. It’s perfect for branch offices or data centers.
- Remote access VPN: Lets individual users connect to your network securely from anywhere. It’s great for remote workers, consultants, and field teams.
- Prerequisites and planning
- Hardware: Ubiquiti EdgeRouter X ER-X, power supply, network cables, a stable internet connection on each side.
- Firmware: Confirm you’re running the latest EdgeOS version for ER-X, check the model’s firmware release notes.
- Network planning: Static IPs or dynamic DNS on both sides, and a clear list of local subnets to be made reachable over the VPN.
- Site-to-site VPN with IPsec on EdgeRouter X
Overview:
- You’ll create a tunnel with a peer router, typically at your branch office. You’ll define the local network behind your ER-X and the remote LAN behind the peer.
Step-by-step:
- Step 1: Access the EdgeRouter X UI usually 192.168.1.1 or custom IP
- Step 2: Update firmware to the latest stable release
- Step 3: Set up a certificate and pre-shared key PSK for authentication
- Step 4: Create the IPsec tunnel with phase 1 and phase 2 settings
- Step 5: Define local and remote LAN subnets
- Step 6: Add firewall rules to permit VPN traffic
- Step 7: Save and apply changes
- Step 8: Test the tunnel using ping or traceroute across subnets
Best practices:
- Use a strong PSK not a simple word
- Keep a consistent MTU to avoid fragmentation
- Lock down the tunnel with strict firewall rules
- Keep logs enabled for troubleshooting
- Remote access VPN on EdgeRouter X
Two common approaches: IPsec with strong authentication or OpenVPN more flexible for clients.
Option A: IPsec remote access
- Pros: Built-in, generally straightforward for mobile devices
- Cons: Some client platforms have quirks; management is a bit less flexible than OpenVPN
- Setup highlights:
- Create a user group and user accounts
- Configure a PSK or certificate-based authentication
- Define the remote network to be allocated to VPN clients
- Install client on user devices Windows, macOS, iOS, Android
- Test by connecting from outside your network
Option B: OpenVPN remote access
- Pros: Very portable clients, easier cross-platform support
- Cons: Requires installing the OpenVPN client on user devices
- Setup highlights:
- Enable OpenVPN server on EdgeRouter X
- Generate server and client certificates
- Create client config files .ovpn for distribution
- Open firewall ports UDP 1194 by default, adjust if needed
- Validate connectivity to internal resources after connect
- Firewall and NAT considerations
- For site-to-site: Ensure inbound/outbound firewall rules allow IPsec ESP, AH, and IKE and related UDP ports like 500/4500 if NAT-T is used.
- For remote access: Allow VPN port IPsec or OpenVPN through the firewall and ensure NAT exemptions so VPN traffic isn’t inadvertently translated.
- Territory wise, define rules to only permit VPN traffic from trusted IPs or subnets where feasible.
Firewalls and NAT examples conceptual:
- IPsec site-to-site:
- Allow: ipsec esp
- Allow: udp 500, 4500 if NAT-T
- Allow: ah if needed
- OpenVPN:
- Allow: udp 1194 or your chosen port
- NAT exemption for VPN subnet to access internal networks
- Routing and DNS considerations
- Ensure that routes to the remote subnet are pushed to the EdgeRouter X so devices know how to reach the other network.
- If you rely on DNS for internal resources, consider configuring DNS forwarding or split-horizon DNS so VPN clients resolve internal hosts correctly.
- Security hardening tips
- Regular firmware updates
- Change default admin credentials and disable unused services
- Use strong, unique PSKs or certificates
- Enable logging and monitor VPN activity
- Implement two-factor authentication if possible for OpenVPN access through a gateway
- Troubleshooting quick-start tips
- VPN tunnel not establishing:
- Verify IPs and subnets on both ends
- Check IKE phase 1 auth method, exchange mode and phase 2 settings
- Inspect firewall rules for blocks
- Confirm that NAT-T is working if behind NAT
- Remote clients can connect but can’t reach internal resources:
- Check route propagation to clients
- Verify internal firewall rules allow traffic from VPN subnet
- Ensure DNS entries resolve correctly for internal hosts
- Slow performance:
- Check MTU size and fragmentation
- Review CPU load on ER-X it’s a small device; heavy use can throttle performance
- Quick reference configurations and templates
- Site-to-site IPsec high level
- Local network: 192.168.10.0/24
- Remote network: 192.168.20.0/24
- PSK: yourStrongPSK
- IKE settings: AES256, SHA256, 28800s lifetime
- Phase 2: AES256, SHA256, 3600s
- Remote access IPsec user
- User: remoteuser
- Password or cert-based auth
- Assigned VPN subnet: 192.168.30.0/24
- OpenVPN remote access
- Server: enable
- Port: 1194 UDP
- Protocol: UDP
- VPN subnet: 192.168.40.0/24
- Client config: embedded certificates and keys or separate files
- Data and statistics to track
- Uptime and tunnel status IPsec status, OpenVPN status
- Connected clients count and session duration
- Bandwidth per VPN tunnel
- Failed connection attempts and error codes
- Firewall hits related to VPN traffic
- Common mistakes to avoid
- Using weak PSKs or no authentication for IPsec
- Mismatched phase 1/2 algorithms between peers
- Forgetting to push routes to VPN clients
- Blocking essential VPN ports in firewall rules
- Not updating firmware after major changes
- Real-world scenario examples
- Small business with a main office and one remote site:
- Site-to-site IPsec tunnel bridges 192.168.1.0/24 and 192.168.2.0/24
- Remote workers connect via OpenVPN or IPsec remote access
- All printers and file servers reachable across the VPN
- Freelance consultant accessing a home lab:
- OpenVPN or IPsec remote access gives secure access to 192.168.0.0/24 resources
- Client devices connect from hotel networks or coffee shops with minimal risk
- Maintenance and upgrade path
- Schedule firmware updates during off-peak hours
- Back up your EdgeRouter X configurations before major changes
- Test VPN after any network topology change new subnets, new remote sites
- Audit user accounts and prune inactive users
- Quick-start checklist
- Firmware updated on EdgeRouter X
- Site-to-site IPsec tunnel configured and tested
- Remote access VPN configured IPsec or OpenVPN
- Firewall rules aligned with VPN traffic
- Routes propagated to VPN clients
- DNS configuration for internal hosts verified
- Client devices tested for connectivity to internal resources
- Logs and monitoring enabled
- Backups created of the current configuration
Frequently Asked Questions
How do I know if my Edgerouter X supports both site-to-site and remote access VPNs?
Edgerouter X supports IPsec and OpenVPN remote access configurations, and you can set up a site-to-site IPsec tunnel with the same hardware. Check the official EdgeRouter X documentation for exact feature support in your firmware version.
Can I run OpenVPN on EdgeRouter X with a simple GUI setup?
Yes, you can enable OpenVPN server on EdgeRouter X and generate client configuration files. It’s user-friendly for clients with the OpenVPN client installed on their devices.
What’s the difference between IPsec and OpenVPN on EdgeRouter X?
IPsec is generally faster and uses native OS support for many devices; OpenVPN is easier to configure across diverse clients and platforms, and often provides more straightforward client management.
How do I secure my VPN PSK?
Use a long, complex pre-shared key at least 22+ random characters or switch to certificate-based authentication if supported. Avoid common phrases and reuse across sites.
How can I verify that site-to-site VPN is up?
Check the EdgeRouter X interface for tunnel status, use ping or traceroute from a host on the local LAN to a host on the remote LAN, and review VPN logs for handshakes.
What ports should I open for IPsec VPN on EdgeRouter X?
Typically UDP ports 500 and 4500, and ESP protocol 50/AH if enabled. If NAT-T is used, ensure UDP 4500 is open. For OpenVPN, UDP 1194 is common unless you change it.
How do I add a new remote user for VPN?
Create a new user or client certificate in the EdgeRouter X, assign the VPN subnet, and distribute the client configuration OpenVPN or credentials IPsec to the user.
How do I troubleshoot OpenVPN client connection issues?
Confirm server is enabled, port is reachable, client config has correct certificates/keys, and that the client can reach the VPN server’s public IP. Check logs on both client and server sides.
Can I use a dynamic DNS name for the remote peer?
Yes, using a dynamic DNS service makes sense if the peer’s public IP changes. Ensure the EdgeRouter X is configured to update or reference the DNS name for the tunnel peer.
What about multi-site scenarios?
You can chain multiple site-to-site VPNs through a central hub or use separate tunnels per site. Ensure routing and firewall rules don’t create loops or excessive latency.
Are there performance considerations with ER-X?
ER-X is a compact device, so CPU and memory limits matter with heavy traffic or many VPN clients. Monitor CPU utilization and bandwidth, and scale to a larger EdgeRouter model if needed.
How often should I back up VPN configurations?
Regular backups are wise—before changes, after successful deployments, and after any major update. Keep multiple restore points.
What’s the best practice for VPN subnets to avoid conflicts?
Choose non-overlapping subnets for each site and the VPN pools e.g., 192.168.x.0/24 for sites and 172.16.x.0/24 for VPN clients. Document them clearly.
More resources
- OpenVPN Community: openvpn.net
- Ubiquiti Community Forums: forum.ubnt.com
- EdgeRouter X product page: ubnt.com/products/edgerouter-x
- EdgeOS documentation: help.ui.com/hc/en-us/sections/115001138968-EdgeRouter
- IPsec on EdgeRouter X guide: help.ui.com/hc/en-us/articles/115003962868
Useful URLs and Resources text only
- Ubiquiti Official Site – ubnt.com
- OpenVPN – openvpn.net
- EdgeRouter X Support – help.ui.com
- Network Security Best Practices – en.wikipedia.org/wiki/Computer_security
- VPN Protocol Comparison – searchenginejournal.com/vpn-protocols-comparison
- Small Business VPN Setup Guide – cisco.com
- Remote Access VPN Best Practices – goldengatesecurity.com
End of post
Vpn ubiquiti edgerouter x is a VPN setup using the Ubiquiti EdgeRouter X to securely connect networks and remote users. In this guide you’ll get a practical, step-by-step path to configure both site-to-site IPSec VPNs and remote-access VPNs on the EdgeRouter X, plus real-world tips, common pitfalls, and performance considerations. If you’re trying to keep a small office, a home lab, or multiple branch offices protected, this post has you covered. For privacy-minded readers, NordVPN is currently offering a substantial discount—77% OFF + 3 Months Free—you can check out through this link:
. NordVPN deal aside, the content here focuses on EdgeRouter X capabilities and how to deploy VPNs efficiently and securely. Useful resources at the end include official docs and community guides to help you troubleshoot along the way.
Useful URLs and Resources un clickable
- Ubiquiti EdgeRouter documentation – ubnt.com/docs
- EdgeRouter X data sheet – ubnt.com/products/edgerouter-x
- strongSwan IPsec on EdgeRouter documentation – strongswan.org
- L2TP remote-access VPN concepts – official Linux and networking docs
- OpenVPN project site – openvpn.net
- Reddit networking threads on EdgeRouter VPNs – reddit.com/r/homenetworking
What you’ll learn in this guide
- How EdgeRouter X handles VPNs and why it’s a good fit for budget-friendly sites
- Step-by-step instructions for site-to-site IPSec VPN with a remote gateway
- How to configure remote-access VPN L2TP over IPsec for individual devices
- Security considerations, best practices, and common misconfigurations
- Troubleshooting tips and performance optimization advice
- Real-world examples and command snippets you can copy-paste with your values swapped in
Prerequisites and quick checks
- An EdgeRouter X with the latest EdgeOS firmware or a recent stable release
- Administrative access to the EdgeRouter X GUI or SSH/CLI
- A clear network plan: local LAN subnets and remote LAN subnets
- A static or known public IP or dynamic DNS with a static hostname for the EdgeRouter X
- A plan for credentials: PSK for IPSec or certificates if you choose a certificate-based approach
- Basic understanding of IP addressing, routes, and NAT
- Time to test: plan a maintenance window if you’re configuring a live site
How EdgeRouter X VPNs work in practice
EdgeRouter X supports IPSec VPNs via strongSwan integration and can handle both site-to-site tunnels and remote-access client connections. Benefits include:
- Cost-effective VPN capability on a compact device
- Flexible tunnel types: site-to-site for branch-to-branch and remote access for individual devices
- Customizable security settings IKE groups, ESP proposals, lifetimes
- NAT traversal options and policy-based routing to control traffic through VPN tunnels
Common caveats include the need to map local and remote subnets correctly, ensuring firewall rules allow VPN traffic, and balancing encryption strength with throughput on a low-power router.
Site-to-site IPSec VPN EdgeRouter X as local or hub gateway
Overview:
- Use-case: Connect two networks securely over the internet e.g., your home/office network to a partner site or another office
- Typical topology: Local LAN e.g., 192.168.1.0/24 <-> Remote LAN e.g., 10.1.0.0/24
- Security: IPSec with an IKE group and an ESP group, PSK or certificates, and a defined tunnel
Step-by-step outline:
- Gather remote gateway details: remote public IP, remote LAN subnet, PSK or certificates
- Define IKE group and ESP group for consistent crypto
- Create the site-to-site peer with authentication and tunnel settings
- Add local/remote subnet prefixes to the tunnel
- Ensure NAT rules don’t break traffic between the subnets
- Test with ping/traceroute, then adjust firewall rules as needed
Commands examples. replace placeholders with your values: Vpn para microsoft edge: the comprehensive guide to using a VPN with Microsoft Edge, setup, extensions, and tips 2026
configure
set vpn ipsec ike-group IKE-GROUP member 1 encryption aes256
set vpn ipsec ike-group IKE-GROUP member 1 hash sha256
set vpn ipsec ike-group IKE-GROUP lifetime 3600
set vpn ipsec esp-group ESP-GROUP proposal 1 encryption aes256
set vpn ipsec esp-group ESP-GROUP proposal 1 hash sha256
set vpn ipsec esp-group ESP-GROUP lifetime 3600
set vpn ipsec site-to-site peer PEER-IP address PEER-IP
set vpn ipsec site-to-site peer PEER-IP authentication mode pre-shared-secret
set vpn ipsec site-to-site peer PEER-IP authentication pre-shared-secret 'YOUR_PSK'
set vpn ipsec site-to-site peer PEER-IP ike-group IKE-GROUP
set vpn ipsec site-to-site peer PEER-IP default-esp-group ESP-GROUP
set vpn ipsec site-to-site peer PEER-IP local-address LOCAL_PUBLIC_IP
set vpn ipsec site-to-site peer PEER-IP tunnel 1 local prefix LOCAL_LAN
set vpn ipsec site-to-site peer PEER-IP tunnel 1 remote prefix REMOTE_LAN
commit
save
Tips:
- Use strong authentication: PSK is common and simple, but certificates add an extra layer of security if you have a PKI.
- Choose an appropriate IKE group: AES256/SHA256 with a modern DH group like DH14 or higher gives a good balance of security and performance.
- Verify the tunnel with immediate tests: ping a host on the remote LAN from a device in the local LAN, and vice versa.
- Make sure NAT is not intercepting or translating VPN traffic unintentionally. sometimes you need to exclude VPN subnets from NAT or add specific NAT rules for VPN traffic.
What to watch for:
- Mismatched subnets between local and remote sides
- Firewall rules that block ESP IPsec or IKE UDP 500/4500 traffic
- ISP blocks or double NAT issues if you’re behind a carrier-grade NAT
- An inconsistent PSK or certificate issue mismatched credentials cause tunnel negotiation to fail
Remote-access VPN L2TP over IPsec for individual devices
- Use-case: Allow individual users to connect securely to your network from anywhere
- Protocols: L2TP over IPsec is a common combination for remote clients
- Pros: Easy client configuration on most devices Windows, macOS, iOS, Android
- Cons: Slightly less performant than pure IPSec tunnel in some setups, extra configuration overhead
Configuration outline:
- Create local users for remote access
- Configure L2TP remote-access settings with client subnet and DNS
- Tie L2TP to IPsec for encryption
- Ensure firewall rules permit L2TP traffic and IPsec tunnel establishment
Commands illustrative, adjust to your network:
set vpn l2tp remote-access authentication mode local
set vpn l2tp remote-access authentication local-users username REMOTE_USER password REMOTE_PASS
set vpn l2tp remote-access client-ip-pool start 192.168.50.100
set vpn l2tp remote-access client-ip-pool end 192.168.50.200
set vpn l2tp remote-access dns-servers server1 8.8.8.8
set vpn l2tp remote-access dns-servers server2 8.8.4.4
set vpn l2tp remote-access outside-address PUBLIC_IP
set vpn l2tp remote-access ipsec-options enabled
set vpn l2tp remote-access ipsec-options pre-shared-secret 'YOUR_PSK'
- Use a separate IP pool for VPN clients to avoid conflicts with your internal network
- Push DNS settings to clients to improve name resolution when connected
- If you’re behind carrier NAT, consider a dynamic DNS name for your public IP to simplify client configuration
Security and performance notes:
- L2TP over IPsec is generally secure and well-supported across devices, but monitor for potential DNS leaks and ensure your clients are updated
- For high-security environments, consider certificate-based IPSec or a dedicated VPN appliance to handle more concurrent connections
Performance, security, and best practices
- Encryption vs. throughput: On EdgeRouter X, CPU limitations can influence VPN throughput, especially with AES-256 and high-numbered tunnels. Expect a range from tens to a few hundred Mbps depending on cipher choices, tunnel count, and concurrent traffic. Lowering encryption strength or using AES-128 can improve throughput if you’re hitting a bottleneck.
- Keep firmware up to date: EdgeOS updates often include security and stability improvements for VPN features.
- Harden firewall rules: Only allow VPN traffic from known sources or limit the source IP ranges to reduce exposure. Create distinct firewall rules for VPN interfaces to prevent leaks.
- Avoid unnecessary NAT on VPN traffic: If it’s possible, place VPN traffic in a dedicated zone and use policy-based routing to keep VPN traffic from crossing into other networks unintentionally.
- Use of certificates vs PSK: Certificates are more scalable for larger deployments and can be rotated per remote site, but they require a PKI setup. PSKs are simpler for small setups but require careful management.
- Redundancy planning: If your site needs high availability, plan for a secondary gateway with a separate VPN tunnel and automatic failover if the primary tunnel drops.
- Logging and monitoring: Enable essential logs for VPN negotiation events, but avoid over-logging to keep the router responsive.
- Client-side considerations: For remote-access users, provide clear connection instructions and support for common OS clients. Provide fallback steps if a user can’t connect e.g., verify PSK, correct credentials, time sync.
Troubleshooting quick-start checklist
- Check tunnel status in EdgeOS: verify IKE and IPsec SA status
- Confirm remote and local subnets are correctly defined and do not overlap
- Validate firewall/NAT rules for VPN traffic
- Confirm PSK or certificates match on both sides
- Test with small subnets first to validate routing before expanding
- Verify DNS resolution from VPN clients to ensure proper name lookups
- If using L2TP: ensure UDP ports 1701, 500, and 4500 are open and not blocked by the ISP
Real-world tips and common mistakes
- Mistake: Subnets overlap between local and remote networks
Fix: Plan and document all subnets early and double-check before you apply the config
- Mistake: Forgetting to add a route for remote subnets on the EdgeRouter
Fix: Add static routes if automatic route propagation isn’t happening
- Mistake: Not testing with a client device early in the setup
Fix: Use a quick test device to validate the tunnel before rolling out to users
- Mistake: Using weak encryption or short lifetimes
Fix: Prefer AES-256 with SHA-256 and sane lifetimes e.g., 3600 seconds for stronger security
Maintenance and upgrades
- Before upgrading EdgeOS, read release notes for VPN-related fixes
- Back up your configuration before applying major changes
- After upgrades, re-check VPN status and test connectivity
- Periodically rotate PSKs or update certificates as part of a security hygiene routine
Frequently Asked Questions
# What is EdgeRouter X best used for in a VPN context?
EdgeRouter X is a compact, affordable router that handles IPSec site-to-site and remote-access VPNs well for small offices, home labs, or branch offices. It’s a solid option when you need flexible, self-managed VPN capabilities without buying a dedicated appliance.
# Can I run an IPSec site-to-site VPN with two EdgeRouter X devices?
Yes. You can configure each side as a peer in a site-to-site IPSec tunnel, exchanging PSKs or using certificates, and define the local and remote subnets for proper routing.
# Is OpenVPN supported on EdgeRouter X?
EdgeRouter OS primarily relies on IPSec for VPNs. Some users implement OpenVPN clients or containers, but native OpenVPN server support is not as straightforward as IPSec in EdgeOS. For many, IPSec site-to-site and L2TP over IPsec cover most needs.
# How do I test a VPN tunnel on EdgeRouter X?
Ping a host on the remote LAN from a host on the local LAN, then vice versa. Use traceroute to identify hops if the tunnel is up but traffic doesn’t route correctly. Check the VPN status in EdgeOS UI or via CLI.
# What if the tunnel won’t come up after configuration?
Double-check:
- Correct pre-shared secret or certificate setup
- Matching IKE and ESP group settings
- Subnet prefixes on both sides do not overlap
- Firewall rules allow IKE UDP 500/4500 and ESP traffic
- The remote gateway is reachable on the public IP
# How many VPN tunnels can EdgeRouter X handle simultaneously?
The EdgeRouter X supports multiple VPN tunnels, but performance depends on the workload and encryption settings. Start with a small number of tunnels and monitor CPU load and throughput. scale up as needed.
# Should I use PSK or certificates for IPSec?
PSK is simple and quick for small setups. Certificates are more scalable and secure for larger deployments or multiple sites, as they simplify key rotation and avoid shared secrets across many devices.
# How do I update EdgeRouter X firmware safely?
Back up your configuration, then apply the firmware upgrade. After upgrade, verify VPN configurations and connectivity since new firmware can impact VPN behavior.
# Can I automate VPN backup and restoration?
Yes. Regular backups of the EdgeRouter configuration help you recover quickly after a failure. Many admins keep a separate backup of a minimal VPN config snippet to re-create tunnels if needed.
# How can I improve VPN performance on EdgeRouter X?
- Use AES-128/256 with SHA-256
- Reduce tunnel count during peak times if you don’t need every tunnel active simultaneously
- Keep firmware up to date
- Consider QoS and traffic shaping to prioritize VPN traffic when needed
# Is L2TP over IPsec secure enough for sensitive data?
L2TP over IPsec is widely used and considered secure when properly configured strong PSK or certificates, up-to-date firmware, and solid firewall rules. For extremely sensitive data, consider additional layers of security or a dedicated VPN appliance with enhanced logging and monitoring.
# What about dynamic IP addresses on my edge network?
If your public IP can change, use a dynamic DNS service to map a hostname to your EdgeRouter X. This helps keep the remote site reachable without manual IP updates.
# How do I verify that VPN traffic is not leaking outside the tunnel?
Perform an IP leak test from a connected VPN client disable all non-VPN routes temporarily to confirm that traffic goes through the VPN. Review firewall NAT rules to ensure only intended traffic uses the VPN interface.
Final notes
Vpn ubiquiti edgerouter x represents a practical, scalable way to implement VPNs on a budget-friendly, consumer-grade device. The EdgeRouter X is capable of handling both site-to-site IPSec VPNs and remote-access VPNs with careful planning, proper credential management, and mindful firewall rules. Use the step-by-step commands above as a starting point, then tailor them to your network topology and security requirements. With a tested configuration, you’ll have a robust VPN setup that protects traffic between sites and provides secure remote access for users, all while keeping management approachable for small teams or home networks.
一键连vpn官网:官方入口、快速连接、设备使用、隐私与安全全解读