Sanjai
Junior DevOps Engineer

Let's start with the real problem.
Most businesses and developers face at least one of these situations every day:
The Remote Work Problem Your team works from home, cafes, and co-working spaces. They connect to company servers and databases over public Wi-Fi — completely exposed. Anyone on the same network can potentially intercept that traffic.
The Developer Problem You built a staging server on Vultr. To keep it secure, you want only your team to access it. But opening it to the public internet means anyone can try to break in. Restricting by IP doesn't work because your team's IPs keep changing.
The Business Owner Problem Your employees access internal tools, CRMs, and databases remotely. You have no way to ensure that connection is secure. A data breach could cost you customers, reputation, and compliance.
The Privacy Problem You use commercial VPN services — but they log your data, throttle your speed, and you have no idea what they do with your information.
The Solution to All Four Problems A self-hosted OpenVPN Access Server on your own Vultr cloud server.
Here is what it gives you:
This guide shows you exactly how to set it up — from a blank Vultr server to a fully working VPN your team can connect to today.
Before we get into the installation, let's quickly address two common questions.
Why OpenVPN Access Server and not regular OpenVPN?
There are two versions of OpenVPN:
Regular OpenVPN (Community Edition)
OpenVPN Access Server
For most real-world use cases — especially when you need non-technical team members to connect — Access Server wins easily.
Why Vultr specifically?
At CloudHouse, we recommend Vultr for most client cloud setups because:
Who is this guide for?
This guide is written for all three audiences:
Developers — set up a private network for your servers and projects in under an hour.
Business Owners — give your remote team secure access to company resources without expensive enterprise VPN solutions.
Beginners — every step is explained clearly with no assumed knowledge required.
Getting this right before you begin saves hours of troubleshooting later.
Your Vultr Server Checklist
Firewall Ports — Open These Before Starting
This is where most first-time setups fail. Open these ports in your Vultr firewall settings before doing anything else:
How to open ports in Vultr:
Your Local Setup Checklist
Optional but Recommended
Free vs Paid — Know This Before Starting
OpenVPN Access Server is free for up to 2 simultaneous VPN connections.
If your team needs more than 2 people connected at the same time — you will need to purchase additional licences from openvpn.net before deploying to production.
For testing and small teams — 2 connections is enough to get started right now.
Here is the complete installation process. Follow each step in order — do not skip any.
Step 1 — Connect to Your Vultr Server
Open your terminal and connect via SSH: ssh root@your-server-ip
Replace your-server-ip with the IP from your Vultr control panel.
Step 2 — Update Your Server
sudo apt update && sudo apt upgrade -y
Always do this first on a fresh server. This ensures all existing packages are current before you add anything new.
Step 3 — Install Required Dependencies
sudo apt install -y ca-certificates wget
net-tools gnupg curl
These tools are needed to add the official OpenVPN repository securely.
Step 4 — Add the Official OpenVPN Repository
sudo mkdir -p /etc/apt/keyrings
curl -fsSL https://as-repository.openvpn.net/as-repo-public.gpg
| sudo gpg --dearmor
-o /etc/apt/keyrings/as-repository.gpg
echo "deb [arch=amd64
signed-by=/etc/apt/keyrings/as-repository.gpg]
https://as-repository.openvpn.net/as/debian
jammy main"
| sudo tee /etc/apt/sources.list.d/openvpn-as-repo.list
Why do this? Installing from the official OpenVPN repository ensures you always get the latest verified version — not an outdated package from Ubuntu's default repos.
Step 5 — Install OpenVPN Access Server
sudo apt update sudo apt install -y openvpn-as
This will take a minute or two. When it finishes, OpenVPN will print important information on your screen.
Step 6 — Save Your Login Details
Immediately after installation completes, your terminal will show something like this:
Admin UI: https://your-server-ip:943/admin Client UI: https://your-server-ip:943/
Login as "openvpn" with this password: [auto-generated password displayed here]
Copy and save this password right now. If you miss it, you will need to reset it.
Step 7 — Change the Default Password
Never keep the auto-generated password. Change it immediately: sudo passwd openvpn
Enter and confirm your new strong password.
Step 8 — Verify OpenVPN is Running
sudo systemctl status openvpnas
Look for: active (running) shown in green.
If it is not running: sudo systemctl start openvpnas sudo systemctl enable openvpnas
ssh root@your-server-ip
sudo apt update && sudo apt upgrade -y
sudo apt install -y ca-certificates wget net-tools gnupg curl
sudo apt update && sudo apt install -y openvpn-as
sudo passwd openvpn
sudo systemctl status openvpnas
sudo systemctl start openvpnas
sudo systemctl enable openvpnas
OpenVPN is installed. Now let's configure it so your team can actually connect.
Access the Admin Panel
Open your browser and go to: https://your-server-ip:943/admin
Your browser will show a security warning because the certificate is self-signed. This is completely normal for a fresh install.
Click Advanced then Proceed to continue.
Login with: Username: openvpn Password: the password you set in Step 7
First Time Setup
Accept the licence agreement when prompted. Keep default settings for now — we will adjust the important ones below.
The 4 Settings That Actually Matter
Your Server's Public IP Go to: Configuration → Network Settings Make sure your Vultr server IP is correctly set here. If it was not auto-detected, enter it manually.
Traffic Routing Go to: Configuration → VPN Settings Turn ON "Route all client traffic through the VPN" if you want full privacy for your team's internet traffic. Leave it OFF if you only need access to your internal servers — not full routing.
DNS Settings Still in VPN Settings — set these DNS servers: Primary DNS: 8.8.8.8 Secondary DNS: 8.8.4.4 This prevents DNS leaks and keeps browsing private.
Adding Your Team Members Go to: User Management → User Permissions Click Add New User Set a username and password for each team member who needs VPN access.
Save and Apply Changes
After every change in the Admin panel:
This applies your changes without restarting the server.
Common Problem at This Stage
Problem: Admin panel shows 502 Bad Gateway Solution: OpenVPN service may have stopped. Run: sudo systemctl restart openvpnas Then try accessing the Admin panel again.
The server is set up. Now let's get your team connected — on any device.
Step 1 — Download OpenVPN Connect App
OpenVPN Connect is the free official client:
Windows and Mac: Visit openvpn.net/client and download the version for your operating system.
iOS: Search "OpenVPN Connect" in the App Store.
Android: Search "OpenVPN Connect" in the Play Store.
Linux: sudo apt install openvpn -y
Step 2 — Get Your Connection Profile
Each user logs into the Client UI:
Open browser and go to: https://your-server-ip:943/
Login with the username and password you set in the Admin panel
Download either: • Yourself (user-locked profile) — easiest option for most users • Auto-login profile — connects automatically without password prompt
Step 3 — Import and Connect
Windows, Mac, iOS, Android:
Linux via Terminal: sudo openvpn --config your-profile.ovpn
Step 4 — Verify It is Working
The fastest way to check:
If it shows your Vultr server IP — your VPN is working perfectly.
If it still shows your real IP:
Quick Connection Checklist
sudo apt install openvpn -y
sudo openvpn --config your-profile.ovpn
Installation is done. But the job is not finished. Here is what to do after your VPN is live to keep it secure and running.
Keep OpenVPN Updated
OpenVPN releases security patches regularly. Run this monthly on your server:
sudo apt update sudo apt upgrade openvpn-as -y sudo systemctl restart openvpnas
Never skip updates on a VPN server — security vulnerabilities in VPN software are a prime target for attackers.
The Most Important Security Rules
Change Passwords Regularly Update your openvpn admin password every few months: sudo passwd openvpn
Remove Users Who Leave When a team member leaves, immediately remove their VPN access: Go to Admin panel → User Management → Delete their account
Keep Port 22 Restricted Consider restricting SSH access to known IPs only in your Vultr firewall. This prevents brute force attacks on your server.
Monitor Connected Users In the Admin panel go to: Current Users → Connected Clients Regularly check who is connected. If you see an unknown user — remove them immediately.
Back Up Your Config After any Admin panel changes — export your configuration as a backup: Go to Admin panel → Maintenance → Backup/Restore → Download Backup
Quick Troubleshooting Reference
Problem: Cannot access Admin panel Fix: sudo systemctl restart openvpnas
Problem: Client connects but no internet Fix: Enable routing in VPN Settings and check DNS is set to 8.8.8.8
Problem: SSL certificate warning in browser Fix: Normal for self-signed cert — click Advanced then Proceed
Problem: Port 1194 not working Fix: Check Vultr firewall — ensure UDP port 1194 is open
Problem: User cannot connect Fix: Check their username and password in Admin panel → User Management
sudo apt update
sudo apt upgrade openvpn-as -y
sudo systemctl restart openvpnas
sudo passwd openvpn
You started with a real problem — insecure remote access, exposed servers, or privacy concerns. You now have a real solution — a self-hosted OpenVPN Access Server running on your own cloud server.
Here is what you accomplished:
This guide was prepared by Sanjai, Junior DevOps Engineer at CloudHouse Technologies, based on thorough research of official OpenVPN and Ubuntu latest 2026 documentation
If you need help with your cloud infrastructure or VPN setup, reach out to us at cloudhousetechnologies.com — our team is always happy to help.
Share this article
Loading comments...
© 2026 CloudHouse Technologies Pvt.Ltd. All rights reserved.