Tutorial

How to Set Up Your Own VPN Server with OpenVPN

March 12, 2026

Back to Blog

Why Run Your Own VPN?

Commercial VPN providers promise privacy, but you are still trusting a third party with all your traffic. Running your own VPN server means zero trust required — you control the encryption keys, the logs, and the exit IP.

With Panelica and Docker, deploying OpenVPN Access Server takes about two minutes.

What You Will Need

RequirementDetails
ServerAny VPS or dedicated server running Panelica
RAM512 MB minimum (1 GB recommended)
Ports443/TCP and 1194/UDP must be open
LicenseOpenVPN AS includes 2 free concurrent connections

Step 1: Deploy via Docker App Templates

In your Panelica panel, navigate to Docker → App Templates and find OpenVPN Access Server. Click Deploy.

Panelica automatically configures the container with the correct port mappings (943 for admin UI, 443 for VPN, 1194/UDP for OpenVPN protocol).

Step 2: Wait for First Boot

Important: OpenVPN Access Server needs 1–2 minutes on first start to initialize its configuration database and generate certificates. Do not skip this step.

You can monitor the container logs from Docker → Containers → Logs until you see the initialization complete message.

Step 3: Access the Admin Interface

Open your browser and navigate to:

https://your-server-ip:943/admin

Log in with the credentials shown in the deployment summary. The admin interface lets you configure user accounts, authentication methods, VPN topology, and routing rules.

Step 4: Connect Your Devices

The user portal is available at:

https://your-server-ip:943

From here, users can download the OpenVPN Connect client for their platform (Windows, macOS, Linux, iOS, Android) along with their personal connection profile.

  1. Download the OpenVPN Connect app for your device
  2. Import the connection profile from the user portal
  3. Connect — all traffic now routes through your server

Security Best Practices

  • Change the default admin password immediately after first login
  • Enable two-factor authentication for the admin interface
  • Use certificate-based authentication instead of password-only
  • Review the VPN Settings → Routing page to control what traffic goes through the tunnel
  • Set up auto-login profiles only for trusted devices

Troubleshooting

IssueSolution
Cannot reach admin UIWait 2 minutes after deploy. Check port 943 is open in your firewall.
VPN connects but no internetCheck NAT settings in the admin panel under VPN Settings → Routing.
Certificate warningsExpected with self-signed certs. You can upload your own SSL certificate in the admin UI.

Summary

With Panelica's Docker integration, you can have a fully functional private VPN server running in minutes. No command line needed, no complex configuration files — just deploy from the template and connect your devices.

Share: