Set Up Your Own VPN Server on AWS (Free)
– 👌
Read 5 minutes
an introduction
A VPN has become a basic necessity these days. Some use a VPN to increase your online privacy or to access region-locked sites. VPN helps people from other countries to access Netflix from other countries to access the rich content library of Netflix US. There are a lot of VPN apps that claim to provide free/paid VPN servers. Some come with no-logs policies. But a lot of these VPN server operators lack transparency. Often times the no-logging policy is unfounded. Let’s build our own VPN server using AWS EC2. You have chosen to host our VPN in the Mumbai (India) region of AWS.
instructions
Use the follow options
OpenVPN Access Server Initial Configuration Tool ———————————————— – ——– Please enter “Yes” to indicate your consent [no]: Yes Once some initial configuration settings are provided, the OpenVPN Access Server can be configured by accessing its admin web user interface using your web browser. Will this be the primary access server node? (Enter “No” to configure as a backup or backup node) Press ENTER by default [yes]: Please select the network interface and IP address to be used by Admin Web UI: (1) All interfaces: 0.0.0.0 (2) eth0: 172.31.35.209 Please enter the option number from the above list (1-2). Press Enter for default setting [1]: Please specify the port number for the admin web user interface. Press ENTER by default [943]: Please select TCP port number for OpenVPN Daemon > Press ENTER by default [443]: Should client traffic be routed by default through a VPN? Press ENTER by default [no]: Yes Should the client’s DNS traffic be routed by default through a VPN? Press ENTER by default [no]: Yes using local authentication via an internal database? Press ENTER by default [yes]: Private subnets detected: [‘172.31.0.0/16’]
Should private subnets be available by default to clients? Press ENTER for default EC2 [yes]: To initially log into the Admin Web UI, you must use a username and password that will successfully authenticate you with the UNIX host system (you can later modify the settings so that RADIUS or LDAP is used for authentication instead). You can log into the Admin Web UI as “openvpn” or select a different user account to use for this. Do you want to login to the Admin UI as “openvpn”? Press ENTER by default [yes]: Please select the activation key (or leave it blank for selection later): Configure OpenVPN … remove group management user login … userdel “admin_c” add new user login … type useradd -s / sbin / nologin “openvpn” as a config file… perform initialization… clear any previous db user… create default profile… modify default profile… add new user to userdb… modify new user as superuser in userdb… Get hostname…hostname:13.233.225.57 Preparing web certificates…Getting web user account…Adding webgroup account…Adding webgroup…Setting license directory ownership…Initializing confdb … create a PAM configuration … enable the service Start openvpnas … NOTE: Your system clock must be correct for the OpenVPN access server to function properly. Please make sure the time and date are correct on this system. Initial configuration complete! You can now proceed with your OpenVPN access server configuration by pointing your web browser to this URL: https://13.233.225.57:943/admin Log in as “openvpn” with the same password used to authenticate on this UNIX host. During normal operation, OpenVPN AS can be accessed via these URLs: Administrator UI: https://13.233.225.57:943/admin Client UI: https://13.233.225.57:943/ See release notes for this release at: https : //openvpn.net/vpn-server-resources/release-notes/
- Set up a password for the user “openvpn” by running the command
- Open the IP address in a web browser with https:// prefix. For example https://127.0.0.1
- Username: openvpn and password from the previous step to login to the portal
- Download the OpenVPN client for your operating system.
- Install and open the client. The connection profile must be installed, if the profile is not downloaded from the admin portal and installed in the client.
- You should now be connected to the VPN server located in Mumbai, India.
- Here are some pictures to show the work of a newsworthy VPN server:
VPN server pictures are working.
Tags:
aws ec2, AWS, ec2 vpn server, ec2, Fix, free vpn, howto, india vpn free, india vpn server free, india vpn, Lambda, network, openvpn, roubleshooting, vpn
Categories:
AWS and EC2
updated: June 13, 2020
participate in
Facebook social networking site
[ad_1]
Don’t forget to share this post with friends !
