Set Up Your Own Free VPN

2 Sep 2024 | Cloud, Google Cloud, VPN

Due to the blocking of Instagram in Turkey and privacy concerns regarding VPN applications, setting up your own private VPN server can be an important solution. In this article, I will explain how you can secure your internet access for free and safely.

Setting up your own VPN server makes your internet connection more secure and private. By running your own VPN, you can protect your online activities and bypass access restrictions. Most VPN services operate in an environment where you don’t know who controls and accesses your data. However, by setting up your own VPN server, you can minimize these risks and experience a free, secure internet.

I will explain this setup using Outline VPN and Google Cloud’s free server. If the limitations of the free server are not sufficient, you can follow the same steps to set up your own VPN server on paid servers.

Step-by-Step Setup

  • Log In to Google Cloud Platform Go to the Google Cloud Platform. If you haven’t activated it before, first activate the “Compute Engine API” from the API library.
  • Create a VM Instance Go to “VM instances” and create a virtual machine.
    Google Cloud Create VM Instance
  • To be free, pay attention to the features specified in the Google Free Tier:A e2-micro virtual machine created in one of the Oregon, Iowa, or South Carolina regions with a maximum of 30GB standard disk.
    Google Cloud Free Tier
  • VM Instance Settings You can name the virtual machine as you wish. However, the name must start with a lowercase letter and can contain numbers afterward. For region selection, choose one of the 3 regions mentioned above to comply with the free tier limitation and Select E2-micro as the virtual machine.
    Google Cloud VM Instance Settings
  • Boot Disk Settings Don’t forget to change the disk type in the boot disk section. Choose Ubuntu 20.04 LTS as the operating system.
    Google Cloud Boot Disc Settings
  • Firewall Settings Check the boxes to allow HTTP and HTTPS traffic. In the “Advanced Options” -> “Networking” -> “Network Interfaces” section, select “Standard” for the “Network Service Tier”.
    Google Cloud Firewall Settings
  • Create the Virtual Machine
    Google Cloud Create VM

Outline Server Setup

  • Connect via SSH Click “SSH” next to your server in the Google Console to connect to the server. To perform the setup, run the following commands in order:
    sudo apt update -y
    sudo apt upgrade -y
    sudo bash -c "$(wget -qO- https://raw.githubusercontent.com/Jigsaw-Code/outline-server/master/src/server_manager/install_scripts/install_server.sh)"
    

    Since it needs to install missing packages, type “Y” in the installation questions and complete the installations.
    Google Cloud Outline Server Installation

  • After Installation When the installation is complete, copy the area written in green. Next, you need to allow the specified ports in the firewall.
    Google Cloud Outline Server Api URL
  • Create Firewall Rules Go to the firewall section by searching for “Firewall” in the Google Cloud Console. Create a new firewall rule:
    Targets = All instances in the network
    Source IPv4 Ranges = 0.0.0.0/0 

    Enter the ports specified at the end of the installation in the TCP and UDP fields. For example, for my setup, 34235 TCP for Management and 48302 TCP and UDP for Access.
    Google Cloud Outline Firewall Rules

  • Install Outline Manager Go to the Outline Manager page from your computer and install the application. Click the + button on the left side of the application and continue with the “Advanced” option. Paste the code you received at the end of the installation here.
    Outline Manager

You’re Ready to Use Your VPN Server Enter the generated keys into the Outline Client application on your phone or computer to start using your own VPN server.

#VPN #FreeVPN #InternetSecurity #Privacy #GoogleCloud #OutlineVPN #TechTips #CyberSecurity #VPNSetup #DigitalPrivacy

Categories

Recent Posts

Implementing Two-Tier PKI on Windows Server 2022 – Part 6

Implementing Two-Tier PKI on Windows Server 2022 – Part 6

Implementing Two-Tier PKI on Windows Server 2022 – Part 6 Active Directory Certificate Services offers numerous predefined templates for various uses. We’ll explore some of these templates, customize them, and discuss best practices. Key Points for Certificate...

Implementing Two-Tier PKI on Windows Server 2022 – Part 6

Implementing Two-Tier PKI on Windows Server 2022 – Part 5

In part five, we will cover Private Key Archive and Recovery. Backup is crucial, and we should implement it in this architecture. We will also explore Certificate Templates to enable Private Key Archival. Let’s begin. If there’s anything unclear, please refer to the...

Implementing Two-Tier PKI on Windows Server 2022 – Part 6

Implementing Two-Tier PKI on Windows Server 2022 – Part 4

In the first and second parts, we deployed PKI, and in the third part, we made these certificates available on our domain via group policy. Now, we will configure the Online Responder Role, which is crucial for the revocation of certificates. This guide will show you...

Implementing Two-Tier PKI on Windows Server 2022 – Part 6

Implementing Two-Tier PKI on Windows Server 2022 – Part 3

Configuring Root and Subordinate Certificates Deployment via Group Policy on Windows Server 2022 In the first two parts, we successfully set up our Two-Tier PKI infrastructure on Windows Server 2022. In this third part, we’ll configure the deployment of root and...

Share This