diff --git a/README.md b/README.md
index 5356c2c..2a93999 100644
--- a/README.md
+++ b/README.md
@@ -61,7 +61,7 @@ Some users have created their own repositories for manual connections, based on
| Linux | No | Python | WireGuard, PF | [milahu/python-piavpn](https://github.com/milahu/python-piavpn) |
| Linux | No | Bash | WireGuard, PF,
router and android config | [triffid/pia-wg](https://github.com/triffid/pia-wg) |
| Linux/FreeBSD/Win | No | Go | WireGuard,
config generation | [ddb_db/piawgcli](https://gitlab.com/ddb_db/piawgcli) |
-| OPNsense | No | Python | WireGuard, PF | [FingerlessGlov3s/OPNsensePIAWireguard](https://github.com/FingerlessGlov3s/OPNsensePIAWireguard) |
+| OPNsense | No | Python | WireGuard, PF, DIP | [FingerlessGlov3s/OPNsensePIAWireguard](https://github.com/FingerlessGlov3s/OPNsensePIAWireguard) |
| pfSense | No | Sh | OpenVPN, PF | [fm407/PIA-NextGen-PortForwarding](https://github.com/fm407/PIA-NextGen-PortForwarding) |
| pfSense | No | Java/PHP | WireGuard, PF | [ddb_db/pfpiamgr](https://gitlab.com/ddb_db/pfpiamgr) |
| Synology | Yes | Bash | Compatibility | [steff2632/manual-connections](https://github.com/steff2632/manual-connections) |
@@ -69,6 +69,7 @@ Some users have created their own repositories for manual connections, based on
| TrueNAS | No | Bash | PF | [dak180/TrueNAS-Scripts](https://github.com/dak180/TrueNAS-Scripts/blob/master/pia-port-forward.sh) |
| UFW | Yes | Bash | Firewall Rules | [iPherian/manual-connections](https://github.com/iPherian/manual-connections) |
| Windows | No | PowerShell | Windows comptaibility | [ImjuzCY/pia-posh](https://github.com/ImjuzCY/pia-posh) |
+| Windows | No | Powershell | OpenVPN, PF | [dougbenham/PIA-OpenVPN-Script](https://github.com/dougbenham/PIA-OpenVPN-Script) |
## PIA Port Forwarding
diff --git a/connect_to_wireguard_with_token.sh b/connect_to_wireguard_with_token.sh
index 30aa3a2..6d0c89e 100755
--- a/connect_to_wireguard_with_token.sh
+++ b/connect_to_wireguard_with_token.sh
@@ -139,7 +139,7 @@ $dnsSettingForVPN
[Peer]
PersistentKeepalive = 25
PublicKey = $(echo "$wireguard_json" | jq -r '.server_key')
-AllowedIPs = 0.0.0.0/0
+AllowedIPs = 0.0.0.0/1, 128.0.0.0/1
Endpoint = ${WG_SERVER_IP}:$(echo "$wireguard_json" | jq -r '.server_port')
" > /etc/wireguard/pia.conf || exit 1
echo -e "${green}OK!${nc}"
diff --git a/get_token.sh b/get_token.sh
index 38ab5c0..6285a26 100755
--- a/get_token.sh
+++ b/get_token.sh
@@ -69,7 +69,7 @@ fi
echo -n "Checking login credentials..."
generateTokenResponse=$(curl -s -u "$PIA_USER:$PIA_PASS" \
- "https://privateinternetaccess.com/gtoken/generateToken")
+ "https://www.privateinternetaccess.com/gtoken/generateToken")
if [[ $(echo "$generateTokenResponse" | jq -r '.status') != "OK" ]]; then
echo