Why Run Your Own VPN?
Commercial VPN providers promise privacy, but you are still trusting a third party with all your traffic. Running your own VPN server means zero trust required — you control the encryption keys, the logs, and the exit IP.
With Panelica and Docker, deploying OpenVPN Access Server takes about two minutes.
What You Will Need
| Requirement | Details |
|---|---|
| Server | Any VPS or dedicated server running Panelica |
| RAM | 512 MB minimum (1 GB recommended) |
| Ports | 443/TCP and 1194/UDP must be open |
| License | OpenVPN AS includes 2 free concurrent connections |
Step 1: Deploy via Docker App Templates
In your Panelica panel, navigate to Docker → App Templates and find OpenVPN Access Server. Click Deploy.
Panelica automatically configures the container with the correct port mappings (943 for admin UI, 443 for VPN, 1194/UDP for OpenVPN protocol).
Step 2: Wait for First Boot
Important: OpenVPN Access Server needs 1–2 minutes on first start to initialize its configuration database and generate certificates. Do not skip this step.
You can monitor the container logs from Docker → Containers → Logs until you see the initialization complete message.
Step 3: Access the Admin Interface
Open your browser and navigate to:
https://your-server-ip:943/admin
Log in with the credentials shown in the deployment summary. The admin interface lets you configure user accounts, authentication methods, VPN topology, and routing rules.
Step 4: Connect Your Devices
The user portal is available at:
https://your-server-ip:943
From here, users can download the OpenVPN Connect client for their platform (Windows, macOS, Linux, iOS, Android) along with their personal connection profile.
- Download the OpenVPN Connect app for your device
- Import the connection profile from the user portal
- Connect — all traffic now routes through your server
Security Best Practices
- Change the default admin password immediately after first login
- Enable two-factor authentication for the admin interface
- Use certificate-based authentication instead of password-only
- Review the VPN Settings → Routing page to control what traffic goes through the tunnel
- Set up auto-login profiles only for trusted devices
Troubleshooting
| Issue | Solution |
|---|---|
| Cannot reach admin UI | Wait 2 minutes after deploy. Check port 943 is open in your firewall. |
| VPN connects but no internet | Check NAT settings in the admin panel under VPN Settings → Routing. |
| Certificate warnings | Expected with self-signed certs. You can upload your own SSL certificate in the admin UI. |
Summary
With Panelica's Docker integration, you can have a fully functional private VPN server running in minutes. No command line needed, no complex configuration files — just deploy from the template and connect your devices.