If you want to set up your VPN with Ubuntu or Kali, then you're in the right place. In this article, is a simple how-to guide to installing a VPN in Linux using Linux VPN GUIs, Network manager, and other methods.
Thanks to its popularity, this article focuses on installing a VPN on Ubuntu. The same instructions should also work just fine for Linux Mint, Debian, and Kali (which is based on Debian), and should provide useful guidelines for users of other Linux distros.
Use a VPN’s custom Linux software
In most Operating Systems, the easiest way to set up a VPN is to use a VPN provider’s custom software. This also true in Linux, but very few VPN providers offer a custom Linux VPN client.
AirVPN’s “Eddie” client supports a range of Linux configurations and is open source.
ExpressVPN also offers a custom Linux client, but it is command-line only and is not very fully-featured. It is available for Ubuntu, Fedora, and Raspbian, but is not open source.
OpenVPN For Linux via NetworkManager
Outside of dedicated clients, probably the easiest way to install and use OpenVPN on most Linux systems is via the NetworkManager daemon.
It is worth noting that AirVPN recommends against using NetworkManager “due to multiple, critical problems.” I have not, however, been able to establish any more details regarding this, and most VPNs seem happy to use it.
Installing OpenVPN in Ubuntu GNOME
1. Register an account with your chosen VPN provider.
2. Download your provider’s .ovpn config files for servers you wish to connect to. These can often be batch-downloaded as a .zip file, in which case you will need to it unzip before use.
In the past, NetworkManager did not like inline certificates and keys. Because of this, many VPNs recommend downloading them separately. But this no longer appears to be necessary.
3. Download and install the Ubuntu OpenVPN packages for NetworkManager by opening a Terminal window and typing:
sudo apt-get install network-manager-openvpn-gnome
4. Check that OpenVPN is correctly installed by clicking on the NetworkManager Icon in the notification bar.
Then go to VPN Off -> VPN Settings -> VPN -> and click the + button.
In the Add VPN box you should see an OpenVPN option. If you don’t see OpenVPN, then restart your PC.
5. Assuming you see the OpenVPN option, don’t click on it. Click on “Import from file…” instead. Navigate to where you downloaded the .ovpn files and double-click on one.
6. An Add VPN box will appear populated by the server’s VPN settings. Simply fill in your Username and Password and hit “Add”.
7. The VPN is now set up. Yay! To start it, go to NetworkManager -> VPN off -> and select the server you wish to connect to.
OpenVPN directly via the Linux Terminal
As a Linux user, I find nothing sexier than a blinking command-line curser! Yeah, baby! According to AirVPN, using OpenVPN via Linux Terminal is also more secure than using NetworkManager, although I have not been able to independently confirm this or uncover the details.
Unfortunately, I cannot do a general setup guide for this as the specifics vary too much by VPN and by which flavor of Linux you use. Most good providers, however, have guides.
Alternatively, you can manually configure the iptables firewall to ensure all traffic (including DNS requests) must go via the VPN server. This will, at least, ensure all DNS requests are proxied by your VPN. It will also act as a kill switch.
The documentation on your VPN’s website may give you further guidance on these issues.
Manually Configure VPN for Linux using PPTP via NetworkManager
PPTP is not a secure VPN protocol, so we generally recommend that you avoid it. NetworkManager comes with PPTP support “out of the box,” however, which can make PPTP a useful “quick and dirty” solution when security is not a high priority.
1. Go to Network Manager -> VPN Settings. Click the + icon next to the VPN box -> Point-to-Point Tunneling Protocol (PPTP)
2. Fill in the PPTP setting given to you by your VPN. Note that these settings are not specific to Linux, so you can use generic settings or settings given for another platform.
Manually Configure VPN for Linux using L2TP/IPsec
As disused in the Complete VPN Encryption Guide, L2TP is a tunneling protocol that does not provide any encryption or confidentiality to traffic that passes through it, so it is usually implemented with the IPsec authentication suite (L2TP/IPsec).
How to install L2TP/IPsec for NetworkManager
NetworkManager-l2tp is a VPN plugin for NetworkManager 1.2+ which includes support for L2TP/IPsec.
To install, fire up Terminal and enter the following commands:
sudo add-apt-repository ppa:nm-l2tp/network-manager-l2tp
sudo apt-get update
sudo apt-get install network-manager-l2tp
You may be prompted to install additional binaries (e.g. for GNOME), in which case go ahead. Restart your PC and L2TP should now be enabled in NetworkManager.
Setup is very similar to using PPTP (see above), except that you will need to enter some additional IPSec authentication details. Again, your VPN should be able to provide these, and generic settings are fine.
Update May 2018: There is currently a bug in xl2tpd which may compromise its use with the IPSec protocol. The issue has already been fixed in Fedora, so I would expect it to be patched in Ubuntu and Debian soon. Please see here for the details and latest updates.
Manually Configure VPN for Linux using IKEv2
IKEv2 is a secure and fast VPN protocol that is rapidly gaining popularity with VPN services. It is supported in Linux via strongSwan. strongSwan packages are available for most versions of Linux, or you can compile it yourself.
How to install IKEv2 for NetworkManager. You can build this from source, or Debian/Ubuntu users can open Terminal and enter:
sudo apt-get install network-manager-strongswan
In use, the plugin works just like the L2PT NetworkManager plugin described above.
Simply enter the IKEv2 settings provided by your VPN (if it supports IKEv2).
How to Test a VPN for Linux
If using NetworkManager, a small network lock icon in the notification bar lets you know at-a-glance that you are connected.
For further confirmation the VPN is connected and working correctly, you can run an IP leak test…
Check Linux VPN for IP leaks
Once connected to the VPN (using whatever method), it is a good idea check for IP leaks.
The example above shows a bad case of IPv6 leaks. The IPv4 DNS result correctly shows that I am connected to a VPN server in the US, but the website can see my real UK IPv6 address via both a regular DNS leak and WebRTC. Fail!
For more information about staying secure with a VPN in the UK or US check out the guides below:
Note that Private-Use – [RFCxxxx] IPs are local IPs only. They cannot be used to identify an individual or device, and so do not constitute an IP leak.
Setup VPN for Linux: Conclusion
As with most things Linux, things are never quite as easy as they are on more mainstream platforms. That said, even inexperienced Debian/Ubuntu users should have no problems setting up a VPN using NetworkManager.
Image credit: By Profit_Image/Shutterstock.