Openvpn on institute proxy
Following this article, you can create your own custom VPN for the cost of $0.005/hr ($3.6 per month) on Amazon Web Services Free Tier on which a maximum of 2 users can connect to the VPN.
Currently, there are many available Free VPNs which we can connect using TCP 443 protocol. And we get decent internet connection speed using those. Problem with that VPN is that if the load on the server hosting the VPN increases resulting in poor internet connectivity. And mostly the VPN servers that we connect are hosted outside our country, resulting in poor ping while gaming as well.
Let's get started:
- Follow this complete tutorial (read the Note before following the instructions in the tutorial) to setup your OpenVPN server link to the tutorial .
- Note : Do not forget to change your server location Default is N. Virginia change it to Asia Pasific (Mumbai). And while doing ssh use Mobile Data connection.
- When you will SSH You will need to enter the preferences for your OpenVPN server.
- While entering the preferences just go by default values except in some places, when you are asked : Please specify the network interface and IP address to be used by the Admin Web UI: [Select] 1. Should client traffic be routed by default through the VPN? : [Select] yes. Rest all will be default values.
- Now when you will try to connect the VPN server with your institute wifi it will not work. You need to make some changes in the config file.
- Lets say the elastic ip of your server is 18.104.22.168. Now go to the openvpn server page https://22.214.171.124 (your Elastic IP). And click on Yourself (user-locked profile) at the bottom to Download the config file.
- Open the .conf file in any Text editor now we just need to focus on the lines 40-64 in the .conf file. This will look something like this:
40 setenv FORWARD_COMPATIBLE 1 41 client 42 server-poll-timeout 4 43 nobind 44 remote [Your Elastic IP] 1194 udp 45 remote [Your Elastic IP] 1194 udp 46 remote [Your Elastic IP] 443 tcp 47 remote [Your Elastic IP] 1194 udp 48 remote [Your Elastic IP] 1194 udp 49 remote [Your Elastic IP] 1194 udp 50 remote [Your Elastic IP] 1194 udp 51 remote [Your Elastic IP] 1194 udp 52 dev tun 53 dev-type tun 54 ns-cert-type server 55 setenv opt tls-version-min 1.0 or-highest 56 reneg-sec 604800 57 sndbuf 0 58 rcvbuf 0 59 auth-user-pass 60 # NOTE: LZO commands are pushed by the Access Server at connect time. 61 # NOTE: The below line doesn't disable LZO. 62 comp-lzo no 63 verb 3 64 setenv PUSH_PEER_INFO
40 setenv FORWARD_COMPATIBLE 1 41 client 42 dev tun 43 proto tcp 44 remote [Your Elastic IP] 443 tcp 45 resolv-retry infinite 46 nobind 47 tun-mtu 1500 48 tun-mtu-extra 32 49 mssfix 1450 50 persist-key 51 persist-tun 52 auth-user-pass 53 comp-lzo 54 reneg-sec0 55 verb3