CarderPlanet
Professional
- Messages
- 2,552
- Reaction score
- 712
- Points
- 83
Many VPN services charge from $ 10 per month, despite the fact that you can use such a VPN only on 1 device + ip which is often not unique, and is issued to everyone in a row.
In this article, I'll show you how to get your VPN up and running in 5 minutes.
We buy the cheapest VPS at https://www.ramnode.com/vps.php
Mandatory KVM virtualization Tariff for $ 3.5 with 256 MB of RAM [Premium] KVM SSD
256 MB of RAM is enough for us for at least 5 devices.
After the purchase, the login data will be sent to the control panel, we put the debian of the latest version, there were no problems with it.
We go via SSH (what is SSH, etc. we find out in Google, software for connecting to SSH Putty):
We update the system:
After launching the automatic VPN installer / configurator:
We follow the instructions, there will not be anything complicated, you can just press enter and agree with everything in the flesh until the end of the installation, but I would advise you to change the standard port to your own at the beginning.
After installation, our VPN config will be in the root directory
Download it via FileZilla, for example.
In order to create a config for a new device, simply run the installer script again:
And enter the name of the new config, the config will also appear in the root folder
Setting up openVPN on Windows (hide IP):
Download and install openVPN https://openvpn.net/index.php/open-source/downloads.html
Run as administrator, a VPN icon will appear in the tray, right-click on it and import our config downloaded from the server.
We connect.
Setting up openVPN on ubuntu (hide IP):
We'll have to work in the terminal:
Install openVPN
Create a config file
Install the nano editor (you can use any):
- during installation we confirm "y" [/ CODE]
Create and edit the config:
Open the config downloaded from the VPS server with a text editor, copy everything that is there and paste it into the terminal into the created config.conf file
Press ctrl + o to save and ctrl + x to exit
Launch:
If we want to start VPN automatically after every system reboot:
Anonymity of this method:
I wanted to supplement the article about disabling logs, but there is no point in this, but no, because logging will still be on the main machine where the VPS server itself is running.
This VPN is perfect for everyday use everywhere if you want:
Who, after configuration, does not have a connection to the server via openVPN, try when executing the command:
Select protocol TCP and not UDP
Error solution:
ERROR: The certificate of `raw.githubusercontent.com' is not trusted.
ERROR: The certificate of `raw.githubusercontent.com' hasn't got a known issuer.
Run command:
Definition of the tunnel (two-way ping often shows at 2ip.ru when checking). Cut down using iptables:
These commands will block ICMP packets without any error messages from the server.
When using a VPN, I advise you to increase your anonymity using DNS from CloudFlare (when installing a script on a VPS, choose DNS 1.1.1.1) or already in the system, change:
And here's what I got for my day to day work:
Thanks to the author and an apology for the drain)
In this article, I'll show you how to get your VPN up and running in 5 minutes.
We buy the cheapest VPS at https://www.ramnode.com/vps.php
Mandatory KVM virtualization Tariff for $ 3.5 with 256 MB of RAM [Premium] KVM SSD
256 MB of RAM is enough for us for at least 5 devices.
After the purchase, the login data will be sent to the control panel, we put the debian of the latest version, there were no problems with it.
We go via SSH (what is SSH, etc. we find out in Google, software for connecting to SSH Putty):
We update the system:
Code:
apt-get update
After launching the automatic VPN installer / configurator:
Code:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
We follow the instructions, there will not be anything complicated, you can just press enter and agree with everything in the flesh until the end of the installation, but I would advise you to change the standard port to your own at the beginning.
After installation, our VPN config will be in the root directory
Download it via FileZilla, for example.
In order to create a config for a new device, simply run the installer script again:
Code:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
And enter the name of the new config, the config will also appear in the root folder
Setting up openVPN on Windows (hide IP):
Download and install openVPN https://openvpn.net/index.php/open-source/downloads.html
Run as administrator, a VPN icon will appear in the tray, right-click on it and import our config downloaded from the server.
We connect.
Setting up openVPN on ubuntu (hide IP):
We'll have to work in the terminal:
Install openVPN
Code:
sudo apt-get install openvpn
Create a config file
Install the nano editor (you can use any):
Code:
sudo apt-get install nano
- during installation we confirm "y" [/ CODE]
Create and edit the config:
Code:
sudo nano /etc/openvpn/config.conf
Open the config downloaded from the VPS server with a text editor, copy everything that is there and paste it into the terminal into the created config.conf file
Press ctrl + o to save and ctrl + x to exit
Launch:
Code:
sudo openvpn --config /etc/openvpn/config.conf
If we want to start VPN automatically after every system reboot:
Code:
sudo openvpn --config /etc/openvpn/config.conf
Anonymity of this method:
I wanted to supplement the article about disabling logs, but there is no point in this, but no, because logging will still be on the main machine where the VPS server itself is running.
This VPN is perfect for everyday use everywhere if you want:
- Hide your real IP
- Hide your activity from the provider
- Use in various cafes and collective farm Wi-Fi networks
- Use to bypass locks on various resources
Who, after configuration, does not have a connection to the server via openVPN, try when executing the command:
Code:
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
Select protocol TCP and not UDP
Error solution:
ERROR: The certificate of `raw.githubusercontent.com' is not trusted.
ERROR: The certificate of `raw.githubusercontent.com' hasn't got a known issuer.
Run command:
Code:
sudo apt-get install ca-certificates
Definition of the tunnel (two-way ping often shows at 2ip.ru when checking). Cut down using iptables:
Code:
# iptables -A OUTPUT -p icmp --icmp-type echo-request -j DROP
# iptables -A INPUT -p icmp --icmp-type echo-reply -j DRO
# iptables -A INPUT -p icmp --icmp-type echo-request -j REJECT
These commands will block ICMP packets without any error messages from the server.
When using a VPN, I advise you to increase your anonymity using DNS from CloudFlare (when installing a script on a VPS, choose DNS 1.1.1.1) or already in the system, change:
Code:
1.1.1.1
1.0.0.1
2606: 4700: 4700 :: 1111
2606: 4700: 4700 :: 1001
And here's what I got for my day to day work:

Thanks to the author and an apology for the drain)