Vultr VPN Server Setup & Quick Start Guide
Deploy OpenVPN's Access Server software on Vultr's AI-first cloud with the Vultr Marketplace listing. Here's how.
Access Server provides a Vultr Marketplace App that you can get up and running within minutes.
Working with Vultr, you use their appliances, which are Linux-based virtual machines running on virtualized hardware. By using the Access Server offering in the Vultr Marketplace, you can launch a VPN hosted in the cloud with the following benefits:
Follow this quick start guide to launch your VPN server in the cloud.
🚀 Launch the server
To launch a new VM with Access Server software:
Sign in to the Access Server portal on our site or create a new account.
Click Deploy Access Server and click the Vultr option.
Click Launch from Vultr Marketplace and sign in to your Vultr account if necessary.
On the Vultr marketplace listing page, click Deploy.
Configure step 1 for Location & Plan:
Parameter
Description
Choose Type
Select the server type that best fits your expected performance needs from Dedicated CPU, Cloud GPU, Shared CPU, or Bare Metal.
Location
Select the location closest to you.
Plan
Select a plan that fits your expected performance needs based on vCPU, memory, storage, and price per hr options. Ensure the plan uses Local NVMe storage (not Block Storage), as this is required for Access Server to be available in the Vultr Marketplace.
Click to configure step 2 for Configure Software & Deploy Instance:
Parameter
Marketplace Apps
Switch to the Marketplace Apps tab, search for, and select the OpenVPN Access Server (BYOL) app.
Server Settings
SSH Key: Select an SSH key for SSH access to the instance.
Tip
If you don't have a key configured, click the drop-down near your name at the top, click SSH keys → Add SSH Key and add your public SSH key to your instance.
Startup Script: Leave blank.
Firewall Group: Leave blank.
Server Hostname and Label
Server 1 Hostname: (Optional) Configure the hostname of your instance, such as openvpnas.
Server 1 Label: Leave blank.
Instance Connectivity
Select Instance(s) with Public IP. Then, select or add a VPC Network.
Click Deploy.
Note
We used the default options for the quick start guide, which are already optimal. Feel free to configure settings as you see fit.
When your deployment is complete, the Instance Status will show as Running.
Click on your instance in the Vultr dashboard.
Under Overview, note the following for Location:
IP address
Username
Password
By default, Vultr instances are created with SSH access using a username and password. You can connect with your server immediately using those credentials.
If you enabled SSH Keys during deployment, you have two ways to connect:
SSH with password (default)
SSH with SSH keys (optional, more secure)
Recommendation:
While password authentication is available by default on Vultr, we strongly recommend using SSH keys for improved security.
The Access Server appliance is a Linux-based appliance managed via SSH. You can connect using any SSH client:
Use the username and password shown in the Overview tab, or
Use your SSH key if you configured it during deployment.
For detailed instructions, refer to:
We provide instructions on how to connect to a common use case for Windows OS users with the PuTTY SSH Client: Connect to Access Server via SSH using PuTTY.
Important
Vultr is unique in that it enables SSH password authentication by default, while also allowing SSH keys as an additional option. Other cloud providers typically require choosing one method or the other. Using SSH keys helps protect your server from unauthorized access and is considered best practice.
The initial Access Server configuration tool runs automatically the first time you sign into the instance.
Click on your instance in the Vultr dashboard.
Under the Overview tab, scroll down to App Instructions.
Locate the Admin UI URL, openvpn username, and generated password.
Open the Admin Web UI in your browser (
https://[youripaddress]/admin) and sign in with the credentials.Tip
Replace "[youripaddress]" with the static IP address of your server.
Now that you've installed Access Server, follow these next steps.
When you complete the installation process on the command line, the output displays the URLs for your admin UI and client UI as well as the username and randomly generated password for the admin account.
Admin UI | The Admin UI is the web-based GUI for managing your Access Server. We refer to it as the Admin Web UI. Typically, it is the address of your server with /admin/ appended, for example https://192.168.70.222/admin/. When you sign in to the Admin Web UI, you can manage the configuration, certificate, users, and so on as an administrative user. The web-based GUI provides simplified management of complex VPN features rather than having to run Linux-based commands and scripts. |
Client UI | The Client UI is the web-based GUI where users sign in to download clients or configuration files. Typically, it is the address of your server, https://192.168.70.222 as an example. TipThe web services run on port TCP 943, by default, so you can visit them at https://192.168.70.222:943/ and https://192.168.70.222:943/admin/ as well. The OpenVPN TCP daemon that runs on TCP port 443 redirects incoming browser requests so that it is slightly easier for users to open the web interface by leaving the :943 part out. |
Administrative User
For the first use of the Admin Web UI, sign in with the openvpn user created during setup. The user’s password is randomly generated and displays in the output at the completion of setup.
You can now open a browser and enter your Admin Web UI address.
Invalid Certificate
Access Server’s web interface comes with a self-signed certificate. This allows you to sign in to the Admin Web UI right away. Since it’s self-signed, it triggers an expected warning. We recommend adding your own SSL certificate in the Admin Web UI to resolve this.
By clicking through to the site, you can continue to the web interface. At the login screen, enter the username and password for your openvpn user.
We recommend using a hostname for your web interfaces and client connections, rather than the IP address of your server. It’s easier for clients and users to sign in with a domain such as vpn.example.com than to use an IP address.
Refer to Hostname and follow the steps.
Once signed in to the Admin Web UI, you can configure user authentication. Access Server supports local authentication, where you configure users in the Admin Web UI. You can also use an external authentication system with PAM, RADIUS, LDAP, or SAML.
Access Server supports using multiple authentication systems simultaneously. Refer to Authentication System for more information.
With your VPN server configured, your users can get connected. Choose one of the options below to connect to the server.
Option to connect | Procedure |
|---|---|
Download a bundled VPN client to connect | A user follows these steps to download a pre-configured OpenVPN Connect app:
|
Download a connection profile | A user follows these steps to download a connection profile. They can then load this file into an installed VPN client like OpenVPN Connect:
|
Admin provides users with ways to connect | Alternatively, as an admin, you can use these ways to connect your users:
|
Tip
Once connected, a simple test the user can perform is checking their IP address. If internet traffic travels over your encrypted VPN tunnel, the user's IP address changes when they connect to Access Server. If you configure split-tunnel traffic, their IP address remains the same for internet traffic.
The default time zone may not be the time zone that you're in. If you are in a different time zone, you can change this setting by running this command, then choose your appropriate time zone:
sudo dpkg-reconfigure tzdata
We recommend installing the NTP client to keep the time synchronized, but it's especially important for those that plan on using multi-factor authentication with TOTP. Run this command:
apt-get install ntp
We recommend updating your Linux OS. From the time we've generated the appliance and you've downloaded and are using it, there are likely a number of updates. To make sure your appliance OS is up to date, execute the following commands:
sudo apt-get update sudo apt-get upgrade
