Adfolks LLC has formally joined the ZainTECH family Learn more
Blogs Having light privacy with self owned private VPN servers for FREE
banner adfolks
blog adfolks

Having light privacy with self owned private VPN servers for FREE


As we know, trusting the public networks might be hard at some point, we never knew who’s eavesdropping our packets and for what. I will be helping you to configure a simple OpenVPN server with decent bandwidth in the cloud.

At the time when I was writing the article, Oracle Cloud was running a tier called “Alway Free” which allows us to span 2 instances for free. Get an account from and get it verified by giving your card details.

Choose a region which feels comfortable to be, like specific geo that you need to access service,

Span an ubuntu minimum config instance


upload or paste your pub-key and create the instance

Once the machine is created, goto

Virtual Cloud Networks (VCN) -> Security List -> Default Security List (Looks similar to AWS, more alike reverse hierarchy )

Create an ingress rule for OpenVPN port


The protocol should be TCP/UDP which you are planning to configure the OpenVPN, I prefer to use TCP since I am looking more into reliability rather than performance, make your choice.

Yeah, Half did… almost there.

SSH to your new instance (username will be ubuntu, grab the IP from the instance page)

The next part is clean-up the iptables rules (i prefer)

run as root iptables -P INPUT ACCEPT iptables -P FORWARD ACCEPT iptables -P OUTPUT ACCEPT iptables -F

The hardest part for some may be the OpenVPN configuration/manageability, But I find something specially crafted against this problem from the Github community,

This script will let you set up your secure VPN server in just a few seconds, and by default OpenVPN-install script enables to have secure configurations from known “good” practices

curl -O chmod +x run as root ./

for the first time, it will prompt you for the configurations


For the IP address param, either Instance public IP can be given or any DNS name if you have any, select the default port (1194 which you opened in security groups) either TCP/UDP (which you configured in security group)

Once it is done, the script drives you to create a client profile (password and password-less).


Profile file will be saved in ubuntu home directory, either cat the file-content or SCP to your host machine

Optional If you wish to have some “control’s” over the VPN like restricting from accessing certain IP’s, you can have your own iptables forward policies which do, like

Client Installation, play store

Import the profile. Done You can create additional clients and distribute them to your “loved” one’s.