Fix OpenVPN Firewall Rule Configuration sudo nano /etc/systemd/system/rvice Look for 10.8.0.0 and change it to 10.10.10.0 or your own preferred private subnet IP address. We'll configure 10.10.10.0/24 subnet instead which looks fanatastic. If you wish to change the default subnet on 10.8.0.0/24 for IP addresses given to OpenVPN clients by the server, then you can follow the instructions below, otherwise you can completely skip this section. I recommend that you use defaults for all settings by pressing Enter on your keyboard except for one, when it asks you to enter the first client certificate name which is preferably pfSense in my case or any other descriptive name for your use case. Well, now we can run the script which is going to ask some information to input. nano openvpn-install.sh Run Installation Script
If you are curious about its content do not hesitate to check it out. Once downloaded into your home directory you should make it executable.
#Install openvpn access server ubuntu install
This bash script will automatically install and configure OpenVPN and here's how you can pull it. We will make use of a bash script in the process, I am running Ubuntu 20.04 LTS on my end. To be precise, I will explain the easiest and most automated method you will ever find to configure and set up an OpenVPN server in less than a minute on the following Linux distributions: However, anyone as a Homelab enthusiast can definitely use this to benefit from the staic IP address provided on a VPS instance, and then you can host hour own services through pfSense firewall from home in case your Internet Service Povider (ISP) doesn't offer you a public IP address, which is awesome. The idea is allowing your home network to be a part of another network, which is in my case helping to bypass the Carrier Grade NAT (CGN or CGNAT) that is restricting me from self hosting my own services, that is one benefit for VPN but many people will want to use it for privacy purposes especially hiding your own identity.