Overview
Universal VPN Server on Linux with user management Control Panel. This VPN server is designed to work together with end-user devices as well as with routers. It combines the capabilities of a traditional VPN server (PPTP/L2TP) and OpenVPN®. This server supports standard protocols PPTP, L2TP without IPSec (which is widely used in routers), L2TP/IPSec-PSK and OpenVPN® (TCP port 443 and UDP port 1194).
The maximum number of users is about 100. It is recommended to determine the number of VPN users based on the server capacity and the real load on the server.
High server efficiency allows using it even on low-performance machines, that may reduce the costs. You can choose a simple instance type like t3.micro, t3.small, t3.medium etc.
Areas of use:
- This VPN server can be used to provide the secure internet access for computers and mobile devices.
- It can be used to connect routers to internet via VPN (OpenVPN®, PPTP or L2TP with or without IPSec).
- It provides internet access in countries where the authorities restrict the Internet.
The key features:
- Easy-to-use. This VPN server practically does not require configuration. After launching the server, it immediately becomes fully operational.
- Authentication PPTP and L2TP (without IPSec): username/password (User Management Web Panel).
- Authentication L2TP/IPSec-PSK: username/password (User Management Web Panel) + pre-shared key.
- Authentication OpenVPN®: certificates (.ovpn config file for clients) + username/password (User Management Web Panel).
- Authentication process uses MySQL so user management can be customized.
Disclaimer: The respective trademarks mentioned in the offering are owned by the respective companies. OpenVPN® is a completely separate project from ADEO Imaging OU.
© 2002-2023 OpenVPN Inc. OpenVPN is a registered trademark of OpenVPN Inc.
Highlights
- Easy-to-use. After launching, this VPN server is immediately fully operational. No server setup required.
- This VPN Server supports PPTP, L2TP without IPSec (which is widely used in routers), L2TP/IPSec-PSK and OpenVPN® (443 TCP port and 1194 UDP port).
- High server efficiency of this VPN server allows using it even on low-performance machines, that may reduce the costs.
Details
Typical total price
$0.083/hour
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.nano | $0.073 | $0.006 | $0.079 |
t2.micro AWS Free Tier | $0.073 | $0.012 | $0.085 |
t2.small | $0.073 | $0.023 | $0.096 |
t2.medium | $0.073 | $0.046 | $0.119 |
t2.large | $0.073 | $0.093 | $0.166 |
t2.xlarge | $0.073 | $0.186 | $0.259 |
t2.2xlarge | $0.073 | $0.371 | $0.444 |
t3.nano | $0.073 | $0.005 | $0.078 |
t3.micro AWS Free Tier Recommended | $0.073 | $0.01 | $0.083 |
t3.small | $0.073 | $0.021 | $0.094 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
You may terminate the instance at anytime to stop incurring charges.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
- Launch the server. This server does not require the powerful computing resources; you can choose a simple instance type. Linux username: admin
- Attach the elastic ip to the instance.
After launching, the VPN server becomes immediately fully operational with no additional setup required.
This server supports VPN connections:
- PPTP: login, password
- L2TP without IPSec: login, password
- L2TP/IPSec-PSK: login, password, PSK
- OpenVPN (443 port TCP): certificates in OVPN file, login, password
- OpenVPN (1194 port UDP): certificates in OVPN file, login, password
User management Web Panel:
- http://[Public IP address]
- https://[Public IP address]:8443 (recommended)
- use "administrator" as username and your instance ID as password.
Web panel description:
When accessing the Web Panel or downloading OVPN config file using the HTTPS protocol, your web browser may display a warning about potential risks due to the use of IP address in the URL. In this case, you should proceed and accept the risks, as our goal is to encrypt traffic, and there is no reason to worry about using IP address in a web browser.
=== PPTP/L2TP/L2TP-PSK ===
When the server is first started, a Pre-Shared Key (PSK) is generated. This key should be specified in the settings on client devices for L2TP/IPSec-PSK connections. This PSK key is the same for all users. You can find PSK with help of SSH on a Linux welcome screen or you can find it in the file "/etc/ipsec.secrets". You can change it, if needed.
Please note that in order to establish L2TP/IPSec-PSK connection from a client on Windows, you may need to make changes to the Windows registry, otherwise Windows error code 809 or 789 may appear. To fix it:
- in section "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent" please create DWORD (32 bit) parameter "AssumeUDPEncapsulationContextOnSendRule" and set value 2 for it.
- in section "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters" set parameter "ProhibitIPSec" to 0.
- restart Windows.
Information on how to create VPN connection on the client devices:
For Windows computers, we recommend our utility to easily create a VPN connection in one click:
Please note:
Despite the fact that this server supports VPN connection via the L2TP without IPSec, it should be noted that such VPN tunnel can not be considered as secure. Therefore, we recommend using L2TP-IPSec-PSK or PPTP on client devices instead of L2TP without IPSec, if possible.
It should be noted that the simultaneous connections to the VPN server of several Windows client devices that located behind a single NAT router may not work with L2TP-IPSec-PSK. In this case, we recommend to use PPTP connection for each Windows device. There are no such problems for Android, iOS or Linux client devices.
==== OpenVPN ===
Before creating a VPN connection, you will need to install the OpenVPN client application on the client side. OpenVPN client applications are available on the web for Windows, Linux, Android, iOS and macOS. To create a VPN connection, simply import the desired OVPN configuration file (for a TCP or UDP connection) into the client application.
ZIP archive, containing OVPN configuration files can be downloaded from the server:
- http://[Public IP address]/config/ovpn-download.php
- https://[Public IP address]:8443/config/ovpn-download.php (recommended)
- use "config" as username and your instance ID as password to download this file with your web browser.
Configuration files containing certificates are the same for all users. The certificates are automatically generated when the instance is first started. User logins and passwords are stored in the database on the server, and users records can be managed with help of user management control panel.
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.