Download OpenVPN configuration files for your tariff plan on the page: /tutorials.php
In this example, RSA configuration files for the "OpenVPN" tariff plan will be used /files/UDP/OpenVPN.zip
Download the OpenVPN configuration files from the service site with a browser, because Anti-DDoS tools will not allow you to do this through wget, curl and other download managers. It is assumed that the archive with the configuration files is saved in /home/user/Downloads. Directory listing:
[root@localhost user]# cd Downloads/
[root@localhost Downloads]# ls -la
total 328
drwxr-xr-x. 2 user user 4096 May 17 14:07 .
drwx------. 15 user user 4096 May 17 13:27 ..
-rw-rw-r--. 1 user user 326554 May 17 14:07 ALL-OpenVPN.zip
[root@localhost Downloads]#
Unzip the downloaded archive with the unzip command. For convenience, the output of the command has been greatly reduced. In this example, we will use the RSA configuration file to connect to a server in Germany:
Go to the directory with the RSA configuration files:
[root@localhost Downloads]# cd ALL-OpenVPN/RSA/
[root@localhost RSA]# ls -la
total 260
drwxr-xr-x. 2 root root 4096 May 8 02:26 .
drwxr-xr-x. 5 root root 4096 May 8 02:24 ..
{abbreviated}
-rw-r--r--. 1 root root 9562 Apr 29 00:30 DE1-OpenVPN.ovpn
{abbreviated}
[root@localhost RSA]# pwd
/home/user/Downloads/ALL-OpenVPN/RSA
[root@localhost RSA]#
Connect to the VPN server you need with the command: openvpn configuration_file_name.ovpn In this example, this is Germany, configuration file DE1-OpenVPN.ovpn:
[root@localhost RSA]# openvpn DE1-OpenVPN.ovpn
Sun May 17 14:23:43 2020 OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 19 2020
Sun May 17 14:23:43 2020 library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10
Enter Auth Username: [email protected] Enter Auth Password: **********
Sun May 17 14:23:49 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun May 17 14:23:49 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun May 17 14:23:49 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.9.170.232:2484
Sun May 17 14:23:49 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun May 17 14:23:49 2020 Attempting to establish TCP connection with [AF_INET]5.9.170.232:2484 [nonblock]
Sun May 17 14:23:50 2020 TCP connection established with [AF_INET]5.9.170.232:2484
Sun May 17 14:23:50 2020 TCP_CLIENT link local: (not bound)
Sun May 17 14:23:50 2020 TCP_CLIENT link remote: [AF_INET]5.9.170.232:2484
Sun May 17 14:23:50 2020 TLS: Initial packet from [AF_INET]5.9.170.232:2484, sid=847403b4 1c7414b4
Sun May 17 14:23:50 2020 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Fort-Funston CA, name=EasyRSA, [email protected] Sun May 17 14:23:50 2020 VERIFY KU OK
Sun May 17 14:23:50 2020 Validating certificate extended key usage
Sun May 17 14:23:50 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun May 17 14:23:50 2020 VERIFY EKU OK
Sun May 17 14:23:50 2020 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=server, name=EasyRSA, [email protected] Sun May 17 14:23:51 2020 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun May 17 14:23:51 2020 [server] Peer Connection Initiated with [AF_INET]5.9.170.232:2484
Sun May 17 14:23:52 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun May 17 14:23:53 2020 PUSH: Received control message: 'PUSH_REPLY,route 192.168.9.0 255.255.255.0,redirect-gateway def1,dhcp-option DNS 192.71.244.22,dhcp-option DNS 54.39.94.211,block-outside-dns,route 192.168.9.1,topology net30,ping 10,ping-restart 120,ifconfig 192.168.9.10 192.168.9.9,peer-id 0,cipher AES-256-GCM'
Sun May 17 14:23:53 2020 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: block-outside-dns (2.4.9)
Sun May 17 14:23:53 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sun May 17 14:23:53 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sun May 17 14:23:53 2020 OPTIONS IMPORT: route options modified
Sun May 17 14:23:53 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun May 17 14:23:53 2020 OPTIONS IMPORT: peer-id set
Sun May 17 14:23:53 2020 OPTIONS IMPORT: adjusting link_mtu to 1627
Sun May 17 14:23:53 2020 OPTIONS IMPORT: data channel crypto options modified
Sun May 17 14:23:53 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun May 17 14:23:53 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun May 17 14:23:53 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun May 17 14:23:53 2020 ROUTE_GATEWAY 10.0.2.2/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:ea:5d:49
Sun May 17 14:23:53 2020 TUN/TAP device tun0 opened
Sun May 17 14:23:53 2020 TUN/TAP TX queue length set to 100
Sun May 17 14:23:53 2020 /sbin/ip link set dev tun0 up mtu 1500
Sun May 17 14:23:53 2020 /sbin/ip addr add dev tun0 local 192.168.9.10 peer 192.168.9.9
Sun May 17 14:23:55 2020 /sbin/ip route add 5.9.170.232/32 via 10.0.2.2
Sun May 17 14:23:55 2020 /sbin/ip route add 0.0.0.0/1 via 192.168.9.9
Sun May 17 14:23:55 2020 /sbin/ip route add 128.0.0.0/1 via 192.168.9.9
Sun May 17 14:23:55 2020 /sbin/ip route add 192.168.9.0/24 via 192.168.9.9
Sun May 17 14:23:55 2020 /sbin/ip route add 192.168.9.1/32 via 192.168.9.9
Sun May 17 14:23:55 2020 Initialization Sequence Completed
OpenVPN will ask for a login and password to connect. They correspond to your username and password on the service website:
Enter Auth Username: <<< Enter your E-Mail from your personal account here
Enter Auth Password: <<< Enter your password here, the same as in your personal account
Do not close the console with the OpenVPN application until while you want to use OpenVPN connection.
If you want to disconnect from the OpenVPN server, in the terminal with the OpenVPN application, press the key combination Ctrl + C
Sun May 17 14:23:55 2020 Initialization Sequence Completed
^CSun May 17 14:32:19 2020 event_wait : Interrupted system call (code=4)
Sun May 17 14:32:19 2020 /sbin/ip route del 192.168.9.0/24
Sun May 17 14:32:19 2020 /sbin/ip route del 192.168.9.1/32
Sun May 17 14:32:19 2020 /sbin/ip route del 5.9.170.232/32
Sun May 17 14:32:19 2020 /sbin/ip route del 0.0.0.0/1
Sun May 17 14:32:19 2020 /sbin/ip route del 128.0.0.0/1
Sun May 17 14:32:19 2020 Closing TUN/TAP interface
Sun May 17 14:32:19 2020 /sbin/ip addr del dev tun0 local 192.168.9.10 peer 192.168.9.9
Sun May 17 14:32:19 2020 SIGINT[hard,] received, process exiting
[root@localhost RSA]#