Overview
Fully-preconfigured OpenVPN server on Debian for Internet access, with a web panel to manage users. This OpenVPN server uses two public IP addresses (Elastic IPs) when deployed via a CloudFormation template. The first IP is used for both the web interface and as the VPN Endpoint, which is the address specified in client configurations to connect to the VPN server. The second IP is used for the outbound connection - this is the address under which client traffic appears on the internet. This allows you to change or rotate the outbound IP at any time by replacing the second Elastic IP, without updating the client configuration or restarting the server.
This OpenVPN server is designed to provide secure VPN internet access for computers and mobile devices. It is ready to use - the VPN server is fully functional right after startup. Authentication uses certificates in the .ovpn file plus username and password. The OpenVPN server uses RADIUS/MySQL for authentication and accounting.
The efficiency of this OpenVPN server allows it to be used on low-performance VMs, reducing expenses. Even on t3.micro or t3.small instances, it delivers top-tier VPN performance. This OpenVPN server provides a stable, high-speed VPN connection with low latency and optimized throughput - ideal for personal and commercial use.
Areas of use:
- This OpenVPN server can provide secure internet access for computers, mobile devices, and routers.
- It can be used to provide internet access in countries where authorities restrict the Internet.
- Suitable for individuals and companies offering VPN services.
Key features of this OpenVPN server:
- Quick and easy deployment - fully functional OpenVPN server right after launch.
- Two Elastic IPs: one for the OpenVPN endpoint, one for outbound traffic.
- Ports: 443 TCP and 1194 UDP for OpenVPN communication.
- Dual authentication: embedded certificate in the .ovpn file + login/password.
- Web-based panel for managing users and monitoring sessions on the VPN server.
- This OpenVPN server uses RADIUS/MySQL for authentication and accounting.
- High-speed, stable VPN server performance with optimized network settings.
Disclaimer: OpenVPN® is a completely independent project and is not affiliated with ADEO Imaging OU.
Highlights
- Secure VPN internet access for individual users. After launching, the OpenVPN server is immediately fully operational. No server setup required.
- The OpenVPN server uses 2 separate public IP addresses for the VPN Endpoint and the Outbound connection when deployed via a CloudFormation template.
- The OpenVPN server uses TCP port 443 and UDP port 1194 for VPN communication, ensuring high-speed VPN performance.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Cost/hour |
---|---|
t3.small Recommended | $0.063 |
t3.micro AWS Free Tier | $0.063 |
t2.micro AWS Free Tier | $0.063 |
m5.4xlarge | $0.063 |
m4.4xlarge | $0.063 |
m5n.16xlarge | $0.063 |
m5n.large | $0.063 |
m3.large | $0.063 |
m5n.8xlarge | $0.063 |
t2.xlarge | $0.063 |
Vendor refund policy
You may terminate the instance at anytime to stop incurring charges.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
It is now possible to deploy using a CloudFormation template, which sets up a configuration with two IP addresses. The first IP is used for both the web interface and as the VPN Endpoint, which is the address specified in client configurations to connect to the VPN server. The second IP is used for the Outbound connection - this is the address under which client traffic appears on the internet. This allows you to change or rotate the outbound IP at any time by replacing the second Elastic IP, without updating the client configuration or restarting the server.
User management web panel has been modified.
Additional details
Usage instructions
After deploying this server using the Standalone AMI, you will get a fully functional OpenVPN server with a single IP address used for both the Endpoint and Outbound traffic.
If you want to run the OpenVPN server with separate IP addresses for the Endpoint and the Outbound connection - where the Endpoint IP is used by clients to connect to the VPN, and the Outbound IP is the address under which client traffic appears on the internet - you can deploy this server using a CloudFormation template. This configuration allows you, for example, to change or rotate the outbound IP address later simply by replacing the second Elastic IP, without needing to update the client configuration and without restarting the server.
Instructions for deploying the OpenVPN Server from the Standalone AMI:
Launch the server. This server does not require the powerful computing resources - you can choose a simple instance type. If the Elastic IP was assigned to a running instance, the instance must be restarted.
Linux username: admin
After launching the server, it is immediately ready for use, with no additional settings required.
OpenVPN ports:
- 443 - for TCP connection
- 1194 - for UDP connection
User management Web Panel:
- http://[Public IP address]/
- https://[Public IP address]:8443/ (recommended)
- Please use "admin" as username and your instance ID as password.
When accessing the Web Panel using HTTPS, your web browser may display a message about potential risks due to the use of an IP address in the URL. In this case, you should proceed and accept the risks, as our main objective is to encrypt traffic, and using an IP address in a web browser is safe for our purposes
User authentication: OVPN file, containing user certificate + username/password. Server certificates are automatically generated and installed on the server when the instance is launched for the first time. Client certificates are generated in the web panel when a user is created and are embedded into the client configuration OVPN file. A ZIP archive containing two OVPN files (for TCP and UDP connections) can be downloaded for each client from the web panel directly or via a QR code.
OpenVPN-CLIENT SETUP
Before creating a VPN connection, you will need to install the OpenVPN client application on the client side. OpenVPN client applications are available on the web for Windows, Linux, Android, iOS and macOS. To create a VPN connection, simply import the OVPN configuration file into the client application.
ADDITIONAL INFO
This server uses user authentication and traffic accounting via a RADIUS server, which relies on a MySQL database. Although the main information is available through the web panel, phpMyAdmin (database management) is also installed on this server for convenience:
- https://[Public IP address]:8443/phpmyadmin/
- Default username for phpMyAdmin: "administrator", initial password is your instance ID.
- By default, access to phpMyAdmin is denied in .htaccess file: /usr/share/phpmyadmin/.htaccess
Resources
Vendor resources
Support
Vendor support
If you have any questions regarding the deployment or use of this server, you can use the Contact Us form on our website or reach out via email. We guarantee a response within 24 hours.
Contact US: https://www.adeoclouds.eu/contact.php?id=4
E-mail: admin@adeoclouds.eu
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
