Linux

CentOS 7.0 Set Up OpenVPN Server In 5 Minutes

I am a new CentOS Linux 7.0 server user. How do I set up an OpenVPN Server on CentOS Linux version 7.0 server to shield my browsing activity from bad guys on public Wi-Fi, and more?

Introduction OpenVPN is a full-featured SSL VPN (virtual private network). It implements OSI layer 2 or 3 secure network extension using the SSL/TLS protocol. It is an open source software and distributed under the GNU GPL. A VPN allows you to connect securely to an insecure public network such as wifi network at the airport or hotel. VPN is also required to access your corporate or enterprise or home server resources. You can bypass the geo-blocked site and increase your privacy or safety online. This tutorial provides step-by-step instructions for configuring an OpenVPN server on CentOS Linux 7.0 server.

Procedure: CentOS 7.0 Set Up OpenVPN Server In 5 Minutes

The steps are as follows:

Step 1 – Update your system

Run the yum command :
{[email protected]:~ }$ sudo yum update

Step 2 – Find and note down your IP address

Use the ip command as follows:
{[email protected]:~ }$ ip a
{[email protected]:~ }$
ip a show eth0
ip command get my IP address on CentOS Linux 7.0
Another option is to run the following dig command/host command to find out your public IP address from Linux command line:
{[email protected]:~ }$ dig +short myip.opendns.com @resolver1.opendns.com
OR
{[email protected]:~ }$ dig TXT +short o-o.myaddr.l.google.com @ns1.google.com | awk -F'”‘ ‘{ print $2}’

AWS EC2 or Lighsail find and note down your NAT IP address
Finding out AWS/EC2 or Lighsail NAT IP address from the CLI

A note about IP address

Most CentOS Linux cloud servers have two types of IP address:

  1. Public static IP address directly assigned to your box and routed from the Internet. For example, Linode, Digital Ocean, and others gives you direct public IP address.
  2. Private static IP address directly attached to your server and your server is behind NAT with public IP address. For example, AWS EC2/Lightsail give you this kind of NAT public IP address.

The script will automatically detect your networking setup. All you have to do is provide correct IP address when asked for it.

Step 3 – Download and run centos7-vpn.sh script

I am going to use the wget command:
{[email protected]:~ }$ wget https://raw.githubusercontent.com/Angristan/openvpn-install/master/openvpn-install.sh -O centos7-vpn.sh
Download centos7-vpn.sh script to setup OpenVPN server in 5 minutes on CentOS
Setup permissions using the chmod command
{[email protected]:~ }$ chmod +x centos7-vpn.sh
One can view the script using a text editor such as vim/vi :
{[email protected]:~ }$ vi centos7-vpn.sh

Run centos7-vpn.sh to install OpenVPN server

Now all you have to do is:
{[email protected]:~ }$ sudo ./centos7-vpn.sh
Sample session from AWS/Lightsail where my cloud server is behind NAT:
CentOS 7.0 Set Up OpenVPN Server in 5 minutes
Sample session from Linode/DO server where cloud server has direct public IPv4 address:
How To Setup OpenVPN Server In 5 Minutes on CentOS Linux
To avoid problem always choose DNS as 1.1.1.1 or Google DNS. Those are fast DNS server and reached from anywhere on the Internet.

How do I start/stop/restart OpenVPN server on CentOS 7.0 ?

{[email protected]:~ }$ sudo systemctl stop [email protected] # <--- stop server
{[email protected]:~ }$
sudo systemctl start [email protected] # <--- start server
{[email protected]:~ }$
sudo systemctl restart [email protected] # <--- restart server
{[email protected]:~ }$
sudo systemctl status [email protected] # <--- get server status

Step 4 – Connect an OpenVPN server using IOS/Android/Linux/Windows client

On server your will find a client configuration file called ~/desktop.ovpn. All you have to do is copy this file to your local desktop using the scp command:
{[email protected]:~ }$ scp [email protected]:~/deskcop.ovpn .
Next, provide this file to your OpenVPN client to connect:

  1. Apple iOS client
  2. Android client
  3. Apple MacOS (OS X) client
  4. Windows 8/10 client

Linux Desktop: OpenVPN client configuration

First, install the openvpn client for your desktop, enter:
{[email protected]:~ }$ sudo yum install openvpn
OR
{[email protected]:~ }$ sudo apt install openvpn
Next, copy desktop.ovpn as follows:
{[email protected]:~ }$ sudo cp desktop.ovpn /etc/openvpn/client.conf
Test connectivity from the CLI:
{[email protected]:~ }$ sudo openvpn –client –config /etc/openvpn/desktop.conf
Your Linux desktop system will automatically connect when computer restart using openvpn script/service:
{[email protected]:~ }$ sudo systemctl enable [email protected]
{[email protected]:~ }$
sudo systemctl start [email protected]

Step 5 – Verify/test the connectivity

Execute the following commands after connecting to OpenVPN server from your Linux desktop:
{[email protected]:~ }$ ping 10.8.0.1 #Ping to the OpenVPN server gateway
{[email protected]:~ }$
ip route #Make sure routing setup working
{[email protected]:~ }$
dig TXT +short o-o.myaddr.l.google.com @ns1.google.com #Must return public IP address of OpenVPN server

A note about trouble shooting OpenVPN server and client issues

Check OpenVPN server for errors:
{[email protected]:~ }$ journalctl –identifier openvpn

OpenVPN server log files and error
Click to enlarge image

Is firewall rule setup correctly on your server? Use the cat command to see rules:
{[email protected]:~ }$ cat /etc/iptables/add-openvpn-rules.sh

Another option is to run iptables command and sysctl command commands to verify NAT rule setup on your server:
{[email protected]:~ }$ sudo iptables -t nat -L -n -v
{[email protected]:~ }$
sysctl net.ipv4.ip_forward
NAT Firewall OpenVPN Rules Verification
Insert the rules if not inserted from /etc/iptables/add-openvpn-rules.sh
{[email protected]:~ }$ sudo sh /etc/iptables/add-openvpn-rules.sh
{[email protected]:~ }$
sudo sysctl -w net.ipv4.ip_forward=1
Is OpenVPN server running and port is open? Use the ss command or netstat command and pidof command/ps command:
{[email protected]:~ }$ netstat -tulpn | grep :1194 ## 1194 is the openvpn server port ##
{[email protected]:~ }$
ss -tulpn | grep :1194 ## 1194 is the openvpn server port ##
{[email protected]:~ }$
ps aux | grep openvpn ## is the openvpn server running? ##
{[email protected]:~ }$
ps -C openvpn ## is the openvpn server running? ##
{[email protected]:~ }$
pidof openvpn ## find the openvpn server PID ##
Verify that OpenVPN server runnign and Port is Open on CentOS Linux
If not running, restart the OpenVPN server:
{[email protected]:~ }$ sudo systemctl restart [email protected]
Look out for errors:
{[email protected]:~ }$ sudo systemctl status [email protected]
Can the Linux desktop client connect to the OpenVPN server machine? First you need to run a simple test to see if the OpenVPN server port (UDP 1194) accepts connections:
{[email protected]:~ }$ nc -vu 139.162.60.234 1194
Connection to 139.162.60.234 1194 port [udp/openvpn] succeeded!

If not connected it means either a Linux desktop firewall or your router is blocking access to server. Make sure both client and server using same protocol and port, e.g. UDP port 1194.

Conclusion

Congratulations. You successfully set up an OpenVPN server on CentOS Linux 7.0 server running in the cloud. See the OpenVPN website here and script site here for additional information.

Show More

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Close