Note: we have a VPN client app for Ubuntu/Debian/Mint distros, please check the KB article.
This guide describes how to configure OpenVPN on Linux using the Network Manager tool, with AES 256-bit encryption and 4096-bit RSA authentication. The setup process should be identical/very similar on all distros because Network Manager is standard.
You can import the OpenVPN config files directly into Network Manager or create the connection from scratch.
Method 1
This method is the quickest, by importing the .ovpn server profile
- Download the .ovpn server profile(s) you want to use from our repository
The profiles are found in the subfolders, such as AES-256-UDP/
- Open the Network Settings and click on the “+” sign to add a new connection type, from the menu select
Import from file...
- Select the .ovpn server profile you downloaded earlier, add your VPN username and password, click
Add or Save to save it
- You can now find the VPN connection profile listed when you click on the network icon in the notifications bar
Method 2
This method should be used if the import feature doesn’t work as expected.
-
Open your browser and download our ca.crt and the tls-preshared-256.key from the repository (important: download the CA certificate file with Right click > Save as in Firefox; left click would auto-import the CA into the certificates store instead of downloading it)
-
Open the Network Settings > Add a new connection and select OpenVPN
-
In the settings window, you have to enter the following:
Connection name: choose a name to identify this connection or leave it unchanged
Gateway: the server hostname you want to connect to (list at https://vpn.ac/status) such as us1.vpn.ac
Authentication Type: Password
Enter your VPN username and password
CA Certificate: select the ca.crt file you downloaded earlier
Open the Advanced... section
- Choose port 8000 or 50000. If you use a TCP connection, use ports 8333 or 5900.
- Open the
Security tab and select Cipher AES-256-GCM and HMAC-Authentication SHA512
- Open the
TLS Authentication tab, check Verify peer (server), choose Server from the drop-down menu. Check Use additional TLS authentication and select the tls-preshared-256.key file. Select 1 for Key Direction
- Save it and connect.