Setting Up NordVPN Onion Over VPN with Threat Protection on TP-Link Omada
Description: This guide details how to configure a dedicated "Secure Network" VLAN on a TP-Link Omada router (ER8411/OC300) that routes all traffic through NordVPN's Onion network. It includes specific steps to enable malware blocking (Threat Protection) and to prevent location leaks via IPv6 and WebRTC/QUIC.
Last Updated: January 2026
Prerequisites: NordVPN Account, Omada SDN Controller, Omada Router
Phase 1: Obtain Configuration & Credentials
Do not use your regular NordVPN email and password.
- Log in to the NordVPN Dashboard and navigate to NordVPN > Manual setup.
- Get Credentials:
- Click the Service credentials tab.
- Copy the Username and Password (these are long alphanumeric strings).
- Download Onion Config:
- Go to the Server recommendation tab.
- Change the Country to Switzerland or The Netherlands.
- In the Server type dropdown, select Onion Over VPN.
- Click Get setup configuration and download the UDP .ovpn file.
- Extract Server IP:
- Open the downloaded .ovpn file with a text editor (Notepad).
- Locate the line starting with
remote. - Copy the IP Address found on that line (e.g., 37.120.137.172).
Phase 2: Configure Omada VPN Client
This sets up the tunnel interface.
- In Omada Controller, go to Settings > VPN > VPN > OpenVPN Client.
- Click Create and configure:
- VPN Type: VPN Client - OpenVPN
- Username/Password: Paste the Service Credentials obtained in Phase 1.
- Configuration: Upload the .ovpn file you downloaded.
- CRITICAL FIX (IP Mismatch):
- Check the Remote Server field. If it does not match the IP address inside your text file, delete it.
- Manually enter the correct IP address you found in the text file (e.g., 37.120.137.172).
- Ensure the port is set to 1194.
- Local Networks: Select your specific VLAN (e.g., "SecureLAN").
- Click Create/Apply.
- Check VPN > Client status to confirm it says "Connected".
Phase 3: Enable Malware Protection (DNS)
This replaces standard DNS with NordVPN's Threat Protection filtering.
- Go to Settings > Wired Networks > LAN.
- Edit your Secure Network VLAN.
- Scroll to DNS Server and select Manual.
Primary DNS: 103.86.96.96 Secondary DNS: 103.86.99.99
- Click Save.
Phase 4: "Leak Plug" Configuration
These steps prevent Google and other services from bypassing the VPN.
Step A: Disable IPv6
- In the same VLAN Edit menu (Settings > Wired Networks > LAN), scroll to Configure IPv6.
- Uncheck the Status box (or set interface type to "None") to disable IPv6 entirely for this VLAN.
- Click Save.
Step B: Block QUIC (UDP 443)
Omada cannot use "0.0.0.0/0" for groups, so we use the "Split Subnet" method.
- Create Port Group:
- Go to Settings > Profiles > Groups.
- Create a new IP-Port Group named QUIC_Ports.
- Port: 443
- Subnets: Add these two entries to cover all IPs:
Entry 1: 1.0.0.0/1 Entry 2: 128.0.0.0/1
- Create ACL Rule:
- Go to Settings > Network Security > ACL > Gateway ACL.
- Create a new rule:
- Description: Block_QUIC_Google
- Direction: LAN > WAN
- Policy: Deny
- Protocol: UDP
- Source: Your Secure VLAN (Network).
- Destination: IP-Port Group > QUIC_Ports.
- Click Create.
Phase 5: Verification
Perform these tests to confirm security.
- BrowserLeaks Test: Visit https://browserleaks.com/ip.
- Success: IP Location shows Europe (Netherlands/Switzerland).
- Success: WebRTC Leak shows European IP or "Disabled".
- Success: IPv6 Test says "Not Reachable".
- Latency Check:
- Run a speed test (e.g., fast.com).
- Success: Latency should be high (>100ms), confirming traffic is routing through the Tor network.
Troubleshooting Notes
- Connection Failed: If the VPN refuses to connect, re-open the .ovpn file in a text editor and verify the "Remote Server" IP in Omada matches the file exactly.
- Google Speed Test 5ms: If you see low ping on Google, the QUIC block is not active. Verify the ACL rule is set to UDP (not TCP) and the destination group covers all IPs.
No comments to display
No comments to display