Overview
Fully-preconfigured OpenVPN server on Debian for Internet access, with a web panel to manage users. This OpenVPN server uses two public IP addresses (Elastic IPs) when deployed via a CloudFormation template. The first IP is used for both the web interface and as the VPN Endpoint, which is the address specified in client configurations to connect to the VPN server. The second IP is used for the Outbound connection - this is the address under which client traffic appears on the internet. This allows you to change or rotate the outbound IP at any time by replacing the second Elastic IP, without updating the client configuration or restarting the server.
This server is intended to provide the secure internet access for computers, mobile devices and routers. It is easy-to-use. After launching, this server is immediately fully operational. No server setup required. User authentication is performed using certificates embedded in the client OVPN configuration file, combined with a username and password. This server uses user authentication and traffic accounting via a RADIUS server, which relies on a MySQL database. High server efficiency allows using it even on low-performance machines, that may reduce the costs. You can choose a simple instance type like t3.micro, t3.small, t3.medium etc. This server provides a stable VPN connection at the highest possible speed.
Areas of use:
- This server can be used to provide the secure internet access for computers, mobile devices and routers.
- This server can be used to provide internet access in countries where the authorities restrict the Internet.
- Suitable for use by individuals as well as for companies offering VPN services.
The key features of this server:
- Easy-to-use. After launching, the server is immediately fully operational. No server setup required.
- 2 separate public IP addresses for the Endpoint and the Outbound connection when using the CloudFormation template deployment.
- Ports: 443 TCP, 1194 UDP.
- Authentication with certificates (config .ovpn file) + username/password.
- A convenient and intuitive user management web panel.
- Very high speed of the VPN channels. Optimal server configuration provides the highest possible data transfer rate.
Disclaimer: OpenVPN® is a completely separate project from ADEO Imaging OU.
Highlights
- Easy-to-use. After launching, the server is immediately fully operational. No server setup required.
- 2 separate public IP addresses for the Endpoint and the Outbound connection when deployed via a CloudFormation template. This allows you to change or rotate the outbound IP address simply by replacing the second Elastic IP, without needing to update the client configuration and without restarting the server.
- Very high speed of the VPN channels. Optimal server configuration provides the highest possible data transfer rate.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
---|---|
t3.small Recommended | $0.063 |
t3.micro AWS Free Tier | $0.063 |
t2.micro AWS Free Tier | $0.063 |
t3a.2xlarge | $0.063 |
m5.xlarge | $0.063 |
t2.large | $0.063 |
m5n.xlarge | $0.063 |
m5n.2xlarge | $0.063 |
t3.large | $0.063 |
t3a.xlarge | $0.063 |
Vendor refund policy
You may terminate the instance at anytime to stop incurring charges.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
It is now possible to deploy using a CloudFormation template, which sets up a configuration with two IP addresses. The first IP is used for both the web interface and as the VPN Endpoint, which is the address specified in client configurations to connect to the VPN server. The second IP is used for the Outbound connection - this is the address under which client traffic appears on the internet. This allows you to change or rotate the outbound IP at any time by replacing the second Elastic IP, without updating the client configuration or restarting the server.
User management web panel has been modified.
Additional details
Usage instructions
After deploying this server using the Standalone AMI, you will get a fully functional OpenVPN server with a single IP address used for both the Endpoint and Outbound traffic.
If you want to run the OpenVPN server with separate IP addresses for the Endpoint and the Outbound connection - where the Endpoint IP is used by clients to connect to the VPN, and the Outbound IP is the address under which client traffic appears on the internet - you can deploy this server using a CloudFormation template. This configuration allows you, for example, to change or rotate the outbound IP address later simply by replacing the second Elastic IP, without needing to update the client configuration and without restarting the server.
Instructions for deploying the OpenVPN Server from the Standalone AMI:
Launch the server. This server does not require the powerful computing resources - you can choose a simple instance type. If the Elastic IP was assigned to a running instance, the instance must be restarted.
Linux username: admin
After launching the server, it is immediately ready for use, with no additional settings required.
OpenVPN ports:
- 443 - for TCP connection
- 1194 - for UDP connection
User management Web Panel:
- http://[Public IP address]/
- https://[Public IP address]:8443/ (recommended)
- Please use "admin" as username and your instance ID as password.
When accessing the Web Panel using HTTPS, your web browser may display a message about potential risks due to the use of an IP address in the URL. In this case, you should proceed and accept the risks, as our main objective is to encrypt traffic, and using an IP address in a web browser is safe for our purposes
User authentication: OVPN file, containing user certificate + username/password. Server certificates are automatically generated and installed on the server when the instance is launched for the first time. Client certificates are generated in the web panel when a user is created and are embedded into the client configuration OVPN file. A ZIP archive containing two OVPN files (for TCP and UDP connections) can be downloaded for each client from the web panel directly or via a QR code.
OpenVPN-CLIENT SETUP
Before creating a VPN connection, you will need to install the OpenVPN client application on the client side. OpenVPN client applications are available on the web for Windows, Linux, Android, iOS and macOS. To create a VPN connection, simply import the OVPN configuration file into the client application.
ADDITIONAL INFO
This server uses user authentication and traffic accounting via a RADIUS server, which relies on a MySQL database. Although the main information is available through the web panel, phpMyAdmin (database management) is also installed on this server for convenience:
- https://[Public IP address]:8443/phpmyadmin/
- Default username for phpMyAdmin: "administrator", initial password is your instance ID.
- By default, access to phpMyAdmin is denied in .htaccess file: /usr/share/phpmyadmin/.htaccess
Resources
Vendor resources
Support
Vendor support
If you have any questions regarding the deployment or use of this server, you can use the Contact Us form on our website or reach out via email. We guarantee a response within 24 hours.
Contact US: https://www.adeoclouds.eu/contact.php?id=4
E-mail: admin@adeoclouds.eu
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
