PrivacyGear.nl

Setting up a GL.iNet travel router: VPN, DNS and guest network

Step by step: GL.iNet router ready for travel or home use. VPN client, DNS-over-TLS, AdGuard Home and guest network.

Setting up a GL.iNet travel router: VPN, DNS and guest network

Setting up a GL.iNet travel router: VPN, DNS and guest network

A GL.iNet router comes with OpenWrt pre-installed and its own admin panel. After basic setup you have a VPN connection that works for all connected devices, encrypted DNS, DNS filtering and an isolated guest network.

This guide works for all GL.iNet models: Beryl AX (MT3000), Flint 2 (MT6000), Slate AX, and others. The screens are the same.


What you need

  • A GL.iNet router
  • A laptop or phone to configure it
  • A VPN subscription with WireGuard support (Mullvad, ProtonVPN or your own server)
  • About 30 minutes

Step 1 — First connection

Plug the router into power. Connect your laptop or phone via wifi to the network the router broadcasts — the name is on the bottom of the device, along with the default wifi password.

Open a browser and go to:

192.168.8.1

You’ll see the GL.iNet admin interface. Set a strong admin password. Store it in your password manager.


Step 2 — Internet connection

As a travel router (hotel, Airbnb, office):

Go to InternetRepeater. Click Scan and select the wifi network at the location. Enter the password. The router connects and shares the connection.

All devices you connect to the GL.iNet router afterwards go through this connection — with all the settings you configure below.

At home:

Connect the WAN port to your existing router or modem via a network cable. The GL.iNet router then works as a second router behind your first.


Step 3 — Set up VPN (WireGuard)

This is the most important step. Once configured, all traffic from all connected devices automatically goes through VPN — without configuring anything per device.

Go to VPNWireGuard Client.

Mullvad:

  1. Log in at mullvad.netDevicesGenerate WireGuard key
  2. Download the configuration file for a server of your choice (nearest to you)
  3. Back in GL.iNet → WireGuard ClientAdd ProfilesUpload Config
  4. Upload the downloaded file
  5. Activate the connection

ProtonVPN:

  1. Log in at protonvpn.comDownloadsWireGuard configuration
  2. Choose a server and download the configuration file
  3. Same steps as above

Your own WireGuard server: If you run a WireGuard server at home or on a VPS: export the client config and upload it.

Check that VPN is active: Go to ip.me from a connected device. The IP address should match the VPN server, not your own internet connection.

Enable kill switch: Go to VPNVPN Dashboard → enable Block Non-VPN Traffic. If the VPN connection drops, the router blocks all traffic. No unprotected connections from a VPN failure.


Step 4 — DNS-over-TLS

By default DNS requests go unencrypted over the network — even when using VPN. With DNS-over-TLS they are sent encrypted.

Go to NetworkDNS.

Enable DNS Rebinding Attack Protection.

Enable Encrypted DNS. Choose a provider:

ProviderAddressBlocks malware?
Quad9dns.quad9.netYes
Cloudflarecloudflare-dns.comNo (privacy only)
Mullvad DNSadblock.dns.mullvad.netYes

Quad9 is the recommended choice: blocks known malware domains, no logging, based in Switzerland.

If you install AdGuard Home (step 5), configure DNS-over-TLS there instead of here.


AdGuard Home is a DNS filtering tool that blocks ads, trackers and malware domains for all devices on your network. It runs directly on the router.

Go to ApplicationsAdGuard HomeInstall.

After installation: click Open AdGuard Home. You’re redirected to the AdGuard interface on port 3000.

Set DNS in AdGuard Home: Go to SettingsDNS settingsUpstream DNS servers. Enter:

tls://dns.quad9.net

Add filter lists: Go to FiltersDNS blocklists. The default AdGuard list is already active. Add if desired:

  • OISD — broad filter list, few false positives
  • Hagezi Multi Normal — extended tracker blocking

Check it’s working: Go to adblock-tester.com from a connected device. You should get a high score.


Step 6 — Guest network

A guest network is completely separated from your main network. Devices on the guest network cannot communicate with devices on your main network.

Use this for:

  • Smart home devices (TV, speaker, thermostat)
  • Visitors’ devices
  • IoT devices whose software you don’t trust

Go to WirelessGuest Network. Enable the guest network. Give it a different name than your main network. Set a separate password.

Make sure Client Isolation is on — this prevents devices on the guest network from communicating with each other.


Step 7 — Change wifi password and network name

The default wifi password is on the bottom of the router. Change it to something stronger.

Go to Wireless. Choose a network name (SSID) that doesn’t reveal anything about the device or location. Set a password of at least 16 characters.


Verification

After setup check four things:

WhatHowExpected result
VPN activeip.meIP of VPN server
DNS encryptedAdGuard Home → Query LogRequests visible
Malware blockedadblock-tester.comHigh score
Guest network isolatedConnect via guest, try 192.168.8.1No access to router

Using it as a travel router

The advantage of a travel router: you set everything up once, and every location works the same.

In a hotel you connect the router to hotel wifi via Repeater. All devices you connect automatically go through VPN — your phone, tablet and laptop. You don’t need to configure anything separately on each device.

Some hotels require a login page (captive portal) before you get internet. In that case temporarily go through the router settings to the hotel network via a browser on the router, or use the Repeater function, connect first without VPN, confirm the captive portal, then enable VPN.


Keep firmware updated

GL.iNet releases regular firmware updates with security patches. Check occasionally via SystemUpgrade.

Automatic updates are available but not enabled by default. For a travel router you don’t use weekly: enable automatic updates via SystemScheduled Tasks.


See also: