Deploy your Cloud Server
To get started with this quick tutorial, head over to app.cloudcone.com and deploy your VPS with your preferred OS from Debian, Ubuntu, or CentOS and log in as root so you are all set to go. If you need help in deploying your server, check out this guide here
Psst. our smallest plan starts at $2.67 /MO which can hold up to 7 VPN users ?
Let’s get started
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange.
OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/password. When used in a multiclient-server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate authority. It uses the OpenSSL encryption library extensively, as well as the SSLv3/TLSv1 protocol, and contains many security and control features.
Road Warrior is an OpenVPN installer for Debian, Ubuntu, and CentOS. This script will let you setup your own VPN server in no more than a minute, even if you haven’t used OpenVPN before. It has been designed to be as unobtrusive and universal as possible.
Run the script and follow the assistant:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
Once it ends, you will be prompted with a menu to create your first VPN user, once you create that, it will show you where the VPN connection file was saved.
Download the Connection profile
Using an FTP/SCP software like WinSCP or CyberDuck login to your server, and download the connection profile, after that, you can go ahead and install it on your computer to tunnel your connection through your new VPN
Just in case, I have added 2 famous VPN client software which you can open your connection profile and start using the VPN
Have fun and enjoy! Leave a comment below if you bump into any errors