How It Works โ The Architecture
Before touching any hardware, understand what you're building. The goal is a permanent encrypted tunnel between your travel location and your home network, so all your internet traffic exits through your home IP address.
The Travel Node creates a WiFi network wherever you are. All traffic encrypts and travels through a WireGuard tunnel to your Home Node, which decrypts it and sends it to the internet. To the outside world โ including your company's security systems โ you're sitting on your couch.
Assemble the Gear
You need two identical routers โ one for home, one for travel. Don't mix models. Identical hardware makes configuration significantly easier and reduces failure points.
| Item | Role | Notes |
|---|---|---|
| 2ร GL.iNet Beryl AX (GL-MT3000)Available on Amazon | Home Node + Travel Node | Best WireGuard performance in this price range. Same model on both ends simplifies setup. |
| 2ร Cat6 Ethernet cableShort lengths fine | WAN connections | Routers come with one short cable. Get extras โ you'll use them during setup. |
Set Up the Home Node
This is the most critical step. If the Home Node isn't reachable from the internet, the whole system fails. Do this at home before anything else.
Wiring
- 1Plug the power adapter into the Home Node router.
- 2Run an Ethernet cable from the WAN port (blue) on the Home Node to any LAN port on your ISP modem/router (the Comcast or AT&T box).
- 3Wait 2โ3 minutes for the device to boot fully.
Access the Admin Panel
- 1Connect your laptop to the Home Node's WiFi. Look for a network named GL-MT3000-xxxx. The password is on the back of the router, labeled Key.
- 2Open a browser and go to 192.168.8.1.
- 3Select English, create a strong admin password, and save it somewhere safe.
Activate the WireGuard Server
- 1In the left sidebar, click VPN โ WireGuard Server.
- 2Click Start.
- 3Click Options (top right). Toggle "Allow Remote Access to LAN Subnet" ON. Click Apply.
Port Forwarding โ The Hard Part
For the Travel Node to reach the Home Node from outside your network, you need to open a port on your ISP modem. This is called port forwarding, and it's where most DIY setups stall.
- 1Log into your ISP modem โ not the GL.iNet. Usually at 192.168.1.1 or 10.0.0.1. If unsure, Google your ISP name + "how to access router".
- 2Find Port Forwarding โ usually under Advanced or Firewall.
- 3Create a new rule with these exact values:
Dynamic DNS (DDNS)
Your home IP address changes periodically. DDNS gives your home a stable hostname the Travel Node can always find.
- 1Back on the GL.iNet admin panel (192.168.8.1), go to Applications โ Dynamic DNS.
- 2Toggle Enable DDNS on and accept the terms.
- 3Wait for a URL like xxxx.glddns.com to appear. Write this down โ it's your Home Node's permanent address.
- 4Click Apply.
Set Up the Travel Node
Now configure the router that goes in your bag. First you need the WireGuard configuration key from your Home Node.
Get the Configuration Key
- 1On the Home Node admin panel, go to VPN โ WireGuard Server โ Profiles tab.
- 2Click + Add. Name it "Travel Node". Click Apply.
- 3A configuration block appears. Before copying it, make sure the Address field shows your DDNS hostname (xxxx.glddns.com) โ not a raw IP. Select it from the dropdown if needed.
- 4Click Download or copy the entire configuration block.
Configure the Travel Node
- 1Power up the Travel Node. Connect your laptop to its WiFi (GL-MT3000-xxxx, password on back).
- 2Go to 192.168.8.1 and log in.
- 3Go to VPN โ WireGuard Client. Click + New Group, name it "HomeLink".
- 4Click Manually Add Configuration. Paste the configuration block you copied. Click Apply.
- 5Click the โฏ menu next to the configuration and select Start.
Enable the Kill Switch
This is non-negotiable. The kill switch cuts internet access entirely if the VPN tunnel drops โ preventing your real IP from leaking even for a moment.
- 1On the Travel Node, go to VPN โ VPN Dashboard.
- 2Click the gear icon next to the WireGuard Client toggle.
- 3Find "Block Non-VPN Traffic" or "Kill Switch". Toggle it ON. Click Apply.
Add Your Phone
You can also route your phone's traffic through the Home Node directly โ useful when you're away from the Travel Node but still need a US IP for banking or work apps.
- 1Download the WireGuard app on your phone (iOS App Store or Google Play).
- 2On the Home Node admin panel, go to VPN โ WireGuard Server โ Profiles. Click + Add, name it "My Phone".
- 3This time, click the QR Code tab instead of Configuration File.
- 4In the WireGuard app on your phone, tap + โ Create from QR Code. Scan the QR code on screen.
- 5Name the tunnel and toggle it on. Verify your IP at whatismyip.com.
Verification โ The Pre-Flight Test
Do not get on a plane until you pass this test. Run it at a coffee shop or using your phone's hotspot โ anywhere other than your home network.
Phase A โ Get your baseline IP
- 1At home on your normal WiFi (not the HomeLink router), go to whatismyip.com.
- 2Write down the IPv4 address. This is your "Safe" home IP.
Phase B โ Field test
- 1Go to a coffee shop or enable your phone's mobile hotspot.
- 2Power up the Travel Node. Connect it to the coffee shop WiFi or hotspot via the admin panel (192.168.8.1 โ Internet โ Repeater โ scan and connect).
- 3Connect your laptop to the Travel Node WiFi. Wait 30 seconds for the tunnel to establish โ look for a green/blue dot next to VPN in the sidebar.
- 4Go to whatismyip.com on your laptop.
If it fails โ troubleshooting checklist
- Is the WireGuard Server running on the Home Node? Check VPN โ WireGuard Server โ should show active/green.
- Is the WireGuard Client running on the Travel Node? Check VPN โ WireGuard Client โ should show connected.
- Is port forwarding correctly configured on your ISP modem? Double-check port 51820 UDP is forwarded to the Home Node's IP.
- Does the DDNS hostname resolve correctly? Go to Applications โ Dynamic DNS on the Home Node and run the DDNS Test โ the IP shown should match whatismyip.com from your home network.
- Is your ISP using CGNAT? If so, port forwarding won't work. See the HomeLink option below.
The Golden Rules โ Never Get Complacent
Having the hardware set up is half the battle. Maintaining operational discipline is the other half.
- Run the leak test before opening Slack. Go to whatismyip.com every time you connect from a new location. Takes 10 seconds.
- Keep the Travel Node in your carry-on. Never checked luggage โ if it gets lost you have no tunnel.
- Have a backup plan. If your home internet goes down (power outage, ISP issue), your tunnel goes down too. Know what you'll do.
- Don't take Zoom calls in front of location-revealing backgrounds. Street signs, landmarks, and foreign-language signage are visible to anyone on the call.
- Check your kill switch after firmware updates. GL.iNet updates can silently reset it. Verify it's on before every trip.
- Lock your system timezone. Don't let your laptop auto-update to the local timezone โ it creates log inconsistencies that SIEM systems flag.
Prefer it done for you?
If you hit a wall โ CGNAT, port forwarding issues, or just don't want to maintain this โ HomeLink kits handle all of it. No port forwarding, permanent relay connection, hardcoded kill switch.