OpenVPN Access Server On CentOs Quick Start


Install ‘openvpn-as’ package


Set password for bootstrapped user: ‘passwd openvpn’


Set up in browser: https://[youripaddress]:943/admin (browser setup found here)

Setting up and deploying the OpenVPN Access Server Repository on CentOS

Beginning with Access Server 2.7.5, you can install Access Server software packages and the related Connect Client software through our official OpenVPN Access Server software repository. We recommend using the repository as it is a standardized and reliable method for delivering new versions and upgrading existing deployments. It provides you with more security, an industry-standard delivery method, easier upgrades, added flexibility, and an improved user experience. Here’s your quick start guide to rapidly deploy a VPN remote access solution for your business.

The following will give you helpful information about the benefits of OpenVPN Access Server as well as installation instructions. For more, read an overview of OpenVPN Access Server.

Using OpenVPN Access Server on CentOS

Extending your private network across different sites, devices, and users can be costly. That’s where OpenVPN Access Server comes in! It’s the ideal solution for your CentOS distro for a number of great reasons, including these:

  • Extends private network services while maintaining security
  • Creates an economical, isolated, and secure network using the public Internet
  • Prevents unauthorized access to specific network resources
  • Encryption provides complete privacy on public Wi-Fi
  • Extends centralized unified threat management to remote networks


Use Case Examples for Access Server with CentOS

Configuring Access Server as your CentOS VPN can provide your business with the ability to accomplish many secure use cases such as:

  1. Remote monitoring of worldwide locations
  2. Secure access for transactions through the cloud
  3. Secure access to private enterprise networks on the cloud or on premises
  4. End to end encryption
  5. Blocking unauthorized access
  6. Improving mobile workforce productivity
  7. Extending your Unified Threat Management to remote employees
  8. Providing a secure layer for accessing internal, unprotected applications
  9. Learn more!

Keep your employees work secure through OpenVPN Access Server, which keeps your company safe.

We provide you with next gen secure and scalable communication services. Our award-winning open source protocol is the industry standard for virtual private networks. Put our legacy to work for your business security. For advanced users, there is also an extensive CLI. Documentation on this can be found in our online documentation, under the Command Line sub-section.

Setting up OpenVPN Access Server on CentOS

OpenVPN Access Server fits seamlessly with CentOS. The repository provides you with the following three components: the popular OpenVPN open-source software; a user-friendly and intuitive admin web interface; and Connect Clients for Android, iOS, Windows, macOS, and Linux. Once set up, deploying VPN clients is simple.

Follow this high level overview to set up OpenVPN Server and OpenVPN Access Server Admin Web UI. More details, if necessary, can be found with the links in the Further Resources section below. Detailed instructions are included in the OpenVPN Documentation section and Installing OpenVPN Access Server on a Linux system, specifically.

1) Get Updates

Begin by logging on to your Linux system on the console or via SSH with root privileges.

Download and install updates:

yum update

If you do not already have ‘net-tools’ installed, we recommend doing so. Access Server relies on ifconfig to function. The ‘net-tools’ package provides ifconfig.

To install ‘net-tools’:

yum install net-tools

2) Install OpenVPN Access Server via repository

Copy and paste these commands and execute them with root privileges. They will add the repository to your system.

yum -y install
yum -y install openvpn-as

4) Configure Settings

The Access Server Admin Web Interface provides an intuitive tool to manage settings for OpenVPN Access Server. Within the configuration menu, you can manage licenses, TLS settings, network settings, VPN settings, advanced VPN settings, web server, client settings, and failover.

Helpful tips for configuration settings:
The following may be helpful configuration settings:

  • To reach OpenVPN Access Server via the internet, set the Hostname or IP address to one facing the public internet.
  • The default subnet for OpenVPN Access Server’s internal DHCP system is This may be changed to a subnet that better fits your network.
  • The routing section provides the option to push certain routes to networks accessed via the server to remote clients.
  • Forwarding client internet traffic through the OpenVPN Access Server is a toggleable option.
  • Settings can be changed per client from within user permissions.

5) Connect Client

To access a connect client via web browser, use the address below by replacing “openvpnasip” with the IP allocated to your openvpn-as instance:


Users have two options:

  1. Connect to the VPN: the user connects directly to the VPN through their web browser.
  2. Login to the Connect Client: they can download their user configuration files (client.ovpn) and use them to connect to the VPN with other OpenVPN Clients.

Helpful Linux and CentOS Tips

  • OpenVPN Access Server is not compatible with any version below the 2.1 OpenVPN community/Linux client.
  • Successfully running the Linux commands here requires that they are executed with root privileges logged in as a root user or sudo up
  • When connecting to the Admin web interface for the first time, you’ll likely see a big message about the site’s security certificate not trusted. This is because the server has a self-signed certificate so you will need to bypass this error.
  • If you’re installing a system manually from scratch, make sure the time and date on your CentOS server are correct. Access Server generates certificates with both a start and expiration date, using the system time and date. If needed, install a Network Time Protocol (NTP) client program on the server to correctly and automatically sync the time.
  • For configuring an Access Server without internet access, it requires contacting the OpenVPN team for an offline activation procedure
  • If you experience slowness with the web interface or attempting license key activation, check that DNS resolution is working as expected (e.g.: pinging should resolve this to an IP address)
  • The ovpn-init tool can be used to wipe all OpenVPN Access Server configurations with the -force option in case you make a mistake during initial setup. However, don’t use it unless you’re sure you want to delete all configuration and certificates to start over.