{"id":8286,"date":"2020-05-05T12:45:02","date_gmt":"2020-05-05T09:45:02","guid":{"rendered":"https:\/\/top.host\/blog\/?p=8286"},"modified":"2020-05-14T14:44:48","modified_gmt":"2020-05-14T11:44:48","slug":"create-your-own-vpn","status":"publish","type":"post","link":"https:\/\/top.host\/blog\/create-your-own-vpn\/","title":{"rendered":"Create your own VPN: how to work from home securely"},"content":{"rendered":"<p>In recent months due to the Covid-19 crisis, the need for remote work has knocked on the door of many companies. In order to keep their teams functioning they adapted to safety measures by urgently transitioning to work from home. They have started communicating mainly through Skype, Zoom, Webex, Google Meet and more while getting organised through Trello, Jira or Asana. At the same time, security should always be number one priority that&#8217;s where VPN comes in.<\/p>\n<p>In order to protect its systems and communications, a company should allow admission exclusively to its employees, excluding everyone else. This can be achieved through VPN! What is VPN and how can a company create a basic VPN service while using exclusively free software? Read this blog post to find out all you need to know.<\/p>\n<h2>What is a VPN<\/h2>\n<p>Imagine a virtual bridge which connects the user (employee) with the company (system). To be able to cross this bridge, you need a username and a password while all the communication is encrypted. This network is called VPN (Virtual Private NetWork).<br \/>\nThe majority of domestic networks (where we mainly work these days) don\u2019t support a static IP -it constantly changes. Consequently, a company cannot allow or exclude from its firewall a specific IP or network. In order for someone to be able to work remotely, there are huge compromises concerning security. <\/p>\n<h2>VPN step by step<\/h2>\n<p>If you\u2019ve got some technical skills, this manual will help you create a small VPN server with a static IP, so that each one of your employees can work remotely as securely as possible. A VPN\u2019s ingredients are a client, a proxy server and a domain.<br \/>\nWe picked the <a href=\"https:\/\/www.strongswan.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">strongSwan<\/a> IKEv2 because its client is compatible with Windows \u03ba\u03b1\u03b9 MacOS and can be easily installed to all linux distributions.<br \/>\nAs far as a proxy server is concerned, we need a small <a href=\"https:\/\/top.host\/el\/vps-hosting\" target=\"_blank\" rel=\"noopener noreferrer\">VPS<\/a> such as a NASH with Centos 8. Finally, we need a <a href=\"https:\/\/top.host\/domain-names.htm\">domain<\/a> or a subdomain. Our domain or our subdomain makes things easier since we can activate a Let\u2019s Encrypt and avoid issuing certificates ourselves. <\/p>\n<p>But let us get things in the right order. <\/p>\n<h5>Requirements:<\/h5>\n<ul>\n<li>VPS with Centos 8<\/li>\n<li>Root access<\/li>\n<li>with A record on its VPS\u2019 IP<\/li>\n<\/ul>\n<h5>Steps:<\/h5>\n<ul>\n<li>Install strongSwan IKEv2<\/li>\n<li>Issue certificates<\/li>\n<li>Set strongSwan<\/li>\n<li>Set NAT Firewall<\/li>\n<li>Set Port Portwarding<\/li>\n<li>Certificates auto renewa<\/li>\n<\/ul>\n<h2>Installing strongSwan IKEv2<\/h2>\n<p>At first, we install the epel repo included in strongSwan and then we install the strongSwan plan itself. <\/p>\n<pre>dnf install epel-release\r\ndnf install strongswan\r\n<\/pre>\n<h2>Issuing certificates<\/h2>\n<p>Once we own a domain or a subdomain, we can use Let\u2019s Encrypt in order to issue certificates. If this is not the case, we will need to issue and sign our own certificates ourselves while also installing the CA certificate to our local computer. <\/p>\n<pre>wget https:\/\/dl.eff.org\/certbot-auto -O \/usr\/local\/bin\/certbot-auto\r\nchmod +x \/usr\/local\/bin\/certbot-auto\r\n<\/pre>\n<p>We set the firewall to accept http and https connections so that it can confirm the Let\u2019s encrypt domain or subdomain. <\/p>\n<pre>firewall-cmd --add-service=http --permanent\r\nfirewall-cmd --add-service=https --permanent\r\nfirewall-cmd --reload\r\n<\/pre>\n<p>We issue a certificate. For example our domain in this case would be  ikev2.mydomain.tld<\/p>\n<pre>certbot-auto certonly --rsa-key-size 2048 --standalone --agree-tos --no-eff-email --email admin@mydomain.tld -d ikev2.mydomain.tld<\/pre>\n<p>Then, we copy the certificates to the respective strongSwan files<\/p>\n<pre>cp \/etc\/letsencrypt\/live\/ikev2.mydomain.tld\/fullchain.pem \/etc\/strongswan\/ipsec.d\/certs\/\r\ncp \/etc\/letsencrypt\/live\/ikev2.mydomain.tld\/privkey.pem \/etc\/strongswan\/ipsec.d\/private\/\r\ncp \/etc\/letsencrypt\/live\/ikev2.mydomain.tld\/chain.pem \/etc\/strongswan\/ipsec.d\/cacerts\/\r\n<\/pre>\n<h2>Setting strongSwan<\/h2>\n<p>First, we keep a copy of the service\u2019s default settings <\/p>\n<pre>cd \/etc\/strongswan\/\r\nmv ipsec.conf ipsec.conf.bak\r\n<\/pre>\n<p>Then, we open the empty  ipsec.conf file<\/p>\n<pre>vim ipsec.conf<\/pre>\n<p>And inside it, we copy the below<\/p>\n<pre>config setup\r\ncharondebug=\"ike 1, knl 1, cfg 0\"\r\nuniqueids=no\r\n\r\n#define new ipsec connection\r\nconn my-vpn\r\nauto=add\r\ncompress=no\r\ntype=tunnel\r\nkeyexchange=ikev2\r\nike=aes128-sha1-modp1024,aes128-sha1-modp1536,aes128-sha1-modp2048,aes128-sha256-ecp256,aes128-sha256-modp1024,aes128-sha256-modp1536,aes128-sha256-modp2048,aes256-aes128-sha256-sha1-modp2048-modp4096-modp1024,aes256-sha1-modp1024,aes256-sha256-modp1024,aes256-sha256-modp1536,aes256-sha256-modp2048,aes256-sha256-modp4096,aes256-sha384-ecp384,aes256-sha384-modp1024,aes256-sha384-modp1536,aes256-sha384-modp2048,aes256-sha384-modp4096,aes256gcm16-aes256gcm12-aes128gcm16-aes128gcm12-sha256-sha1-modp2048-modp4096-modp1024,3des-sha1-modp1024!\r\nesp=aes128-aes256-sha1-sha256-modp2048-modp4096-modp1024,aes128-sha1,aes128-sha1-modp1024,aes128-sha1-modp1536,aes128-sha1-modp2048,aes128-sha256,aes128-sha256-ecp256,aes128-sha256-modp1024,aes128-sha256-modp1536,aes128-sha256-modp2048,aes128gcm12-aes128gcm16-aes256gcm12-aes256gcm16-modp2048-modp4096-modp1024,aes128gcm16,aes128gcm16-ecp256,aes256-sha1,aes256-sha256,aes256-sha256-modp1024,aes256-sha256-modp1536,aes256-sha256-modp2048,aes256-sha256-modp4096,aes256-sha384,aes256-sha384-ecp384,aes256-sha384-modp1024,aes256-sha384-modp1536,aes256-sha384-modp2048,aes256-sha384-modp4096,aes256gcm16,aes256gcm16-ecp384,3des-sha1!\r\n\r\nfragmentation=yes\r\nforceencaps=yes\r\ndpdaction=clear\r\ndpddelay=300s\r\nrekey=no\r\nleft=%any\r\nleftid=@ikev2.mydomain.tld  <strong># \u2190 \u03a0\u03c1\u03bf\u03c3\u03bf\u03c7\u03ae \u03b5\u03b4\u03ce \u03bd\u03b1 \u03bc\u03c0\u03b5\u03b9 \u03c4\u03bf domain<\/strong> \r\nleftcert=fullchain.pem\r\nleftsendcert=always\r\nleftsubnet=0.0.0.0\/0\r\nright=%any\r\nrightid=%any\r\nrightauth=eap-mschapv2\r\nrightsourceip=10.255.250.0\/24\r\nrightdns=1.1.1.1,8.8.8.8\r\nrightsendcert=never\r\neap_identity=%identity\r\n<\/pre>\n<p>Following that, we open the ipsec.secrets file and we add the following lines with the users that we want. <\/p>\n<pre>: RSA \"privkey.pem\"\r\nuser1 : EAP \"password1\"\r\nuser2 : EAP \u201cpassword2\u201d\r\n<\/pre>\n<p>By choosing to keep the users into a text file, locally, makes things easier and faster. StrongSwan though has extra <a href=\"https:\/\/wiki.strongswan.org\/projects\/strongswan\/wiki\/PluginList\" target=\"_blank\" rel=\"noopener noreferrer\">plugins<\/a> for a radius and a mysql connection. They can be used for the connection of the service to centralised systems of users administration.<br \/>\nWe activate the service in the boot and we run it so it gets the above settings.<\/p>\n<pre>systemctl enable strongswan\r\nsystemctl restart strongswan\r\n<\/pre>\n<h2>Setting NAT Firewall<\/h2>\n<p>We activate the nat and set the respective firewall<\/p>\n<pre>firewall-cmd --zone=public --permanent --add-rich-rule='rule protocol value=\"esp\" accept'\r\nfirewall-cmd --zone=public --permanent --add-rich-rule='rule protocol value=\"ah\" accept'\r\nfirewall-cmd --zone=public --permanent --add-port=500\/udp\r\nfirewall-cmd --zone=public --permanent --add-port=4500\/udp\r\nfirewall-cmd --zone=public --permanent --add-service=\"ipsec\"\r\nfirewall-cmd --zone=public --permanent --add-masquerade\r\nfirewall-cmd --reload\t\r\n<\/pre>\n<h2>Setting Port Portwarding<\/h2>\n<p>We activate the port forward to the core by adding to the file \/etc\/sysctl.conf the following lines,<\/p>\n<pre>net.ipv4.ip_forward = 1\r\nnet.ipv4.conf.all.accept_redirects = 0\r\nnet.ipv4.conf.all.send_redirects = 0\r\n<\/pre>\n<p>We then run the following command so that the changes pass in the core<\/p>\n<pre>sysctl -p<\/pre>\n<p>Then, we restart our service<\/p>\n<pre>systemctl restart strongswan<\/pre>\n<p>Everything is now ready and our service is running with the possibility of accepting connections. We can verify it by running at first, <\/p>\n<pre>systemctl status strongswan<\/pre>\n<p>And then<\/p>\n<pre>dnf install net-tools\r\nnetstat -plntu\r\n<\/pre>\n<p>There we are expecting to see the 68, 4500 and 500 udp gates open. <\/p>\n<h2>Certificates auto renewal<\/h2>\n<p>The Let&#8217;s Encrypt certificates expire every 3 months. \u0399n order for it to be renewed automatically but also update the service when needed, we will create a cron job. We open the file \/etc\/crontab and add the line below,<\/p>\n<pre>* *\/12 * * * \/usr\/local\/bin\/certbot-auto renew --post-hook \"\/usr\/local\/bin\/renew.sh\" --quiet<\/pre>\n<p>We then create the file \/usr\/local\/bin\/renew.sh and add the below,<\/p>\n<pre>#!\/bin\/bash\r\ncp -f \/etc\/letsencrypt\/live\/ikev2.mydomain.tld\/fullchain.pem \/etc\/strongswan\/ipsec.d\/certs\/\r\ncp -f \/etc\/letsencrypt\/live\/ikev2.mydomain.tld\/privkey.pem \/etc\/strongswan\/ipsec.d\/private\/\r\ncp -f \/etc\/letsencrypt\/live\/ikev2.mydomain.tld\/chain.pem \/etc\/strongswan\/ipsec.d\/cacerts\/\r\nsystemctl restart strongswan\r\n<\/pre>\n<p>To finish, we make the file executable so that cron can run it.<\/p>\n<pre>chmod +x \/usr\/local\/bin\/renew.sh<\/pre>\n<h2>A few words<\/h2>\n<p>Creating a VPN is very important especially if your team is working and communicating remotely. We hope that this manual is helpful and that you will enjoy creating your own VPN with free software! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent months due to the Covid-19 crisis, the need for remote work has knocked&hellip;<\/p>\n","protected":false},"author":33,"featured_media":8294,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mc4wp_mailchimp_campaign":[],"footnotes":""},"categories":[2436],"tags":[2389,2277,2239],"coauthors":[3255],"class_list":["post-8286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials-en","tag-how-to-en","tag-remote-work-en","tag-vpn-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Create your own VPN: how to work from home securely - Top.Host Blog<\/title>\n<meta name=\"description\" content=\"Creating a VPN is really important when your team works and communicates from home. Here is a manual so that you can create your own VPN with free software!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/top.host\/blog\/create-your-own-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Create your own VPN: how to work from home securely\" \/>\n<meta property=\"og:description\" content=\"Creating a VPN is really important when your team works and communicates from home. Here is a manual so that you can create your own VPN with free software!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/top.host\/blog\/create-your-own-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"Top.Host Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tophostGR\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-05T09:45:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-14T11:44:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/05\/Blogimages-Tophost-VPN2020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"486\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Panagiotis Vavilis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TophostExtreme\" \/>\n<meta name=\"twitter:site\" content=\"@TophostExtreme\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Panagiotis Vavilis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/\"},\"author\":{\"name\":\"Panagiotis Vavilis\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/person\\\/2893a10e0682078306ac216e4dfc4bdf\"},\"headline\":\"Create your own VPN: how to work from home securely\",\"datePublished\":\"2020-05-05T09:45:02+00:00\",\"dateModified\":\"2020-05-14T11:44:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/\"},\"wordCount\":821,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blogimages-Tophost-VPN2020.jpg\",\"keywords\":[\"how-to\",\"remote work\",\"vpn\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/\",\"name\":\"Create your own VPN: how to work from home securely - Top.Host Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blogimages-Tophost-VPN2020.jpg\",\"datePublished\":\"2020-05-05T09:45:02+00:00\",\"dateModified\":\"2020-05-14T11:44:48+00:00\",\"description\":\"Creating a VPN is really important when your team works and communicates from home. Here is a manual so that you can create your own VPN with free software!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#primaryimage\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blogimages-Tophost-VPN2020.jpg\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blogimages-Tophost-VPN2020.jpg\",\"width\":730,\"height\":486},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/create-your-own-vpn\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/top.host\\\/blog\\\/el\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Create your own VPN: how to work from home securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/\",\"name\":\"Top.Host Blog\",\"description\":\"Extreme Support\",\"publisher\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/top.host\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#organization\",\"name\":\"Top.Host\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/logo-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/logo-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Top.Host\"},\"image\":{\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/tophostGR\\\/\",\"https:\\\/\\\/x.com\\\/TophostExtreme\",\"https:\\\/\\\/www.instagram.com\\\/tophostgr\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/752527\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/TophostXtremeSupport\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/#\\\/schema\\\/person\\\/2893a10e0682078306ac216e4dfc4bdf\",\"name\":\"Panagiotis Vavilis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Vavilis-140x140.jpg09f452125ac92814b3238823ab3c706c\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Vavilis-140x140.jpg\",\"contentUrl\":\"https:\\\/\\\/top.host\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Vavilis-140x140.jpg\",\"caption\":\"Panagiotis Vavilis\"},\"description\":\"Panagiotis is the Chief Technology Officer of Top.Host.\",\"url\":\"https:\\\/\\\/top.host\\\/blog\\\/author\\\/vavilis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Create your own VPN: how to work from home securely - Top.Host Blog","description":"Creating a VPN is really important when your team works and communicates from home. Here is a manual so that you can create your own VPN with free software!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/top.host\/blog\/create-your-own-vpn\/","og_locale":"en_US","og_type":"article","og_title":"Create your own VPN: how to work from home securely","og_description":"Creating a VPN is really important when your team works and communicates from home. Here is a manual so that you can create your own VPN with free software!","og_url":"https:\/\/top.host\/blog\/create-your-own-vpn\/","og_site_name":"Top.Host Blog","article_publisher":"https:\/\/www.facebook.com\/tophostGR\/","article_published_time":"2020-05-05T09:45:02+00:00","article_modified_time":"2020-05-14T11:44:48+00:00","og_image":[{"width":730,"height":486,"url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/05\/Blogimages-Tophost-VPN2020.jpg","type":"image\/jpeg"}],"author":"Panagiotis Vavilis","twitter_card":"summary_large_image","twitter_creator":"@TophostExtreme","twitter_site":"@TophostExtreme","twitter_misc":{"Written by":"Panagiotis Vavilis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#article","isPartOf":{"@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/"},"author":{"name":"Panagiotis Vavilis","@id":"https:\/\/top.host\/blog\/#\/schema\/person\/2893a10e0682078306ac216e4dfc4bdf"},"headline":"Create your own VPN: how to work from home securely","datePublished":"2020-05-05T09:45:02+00:00","dateModified":"2020-05-14T11:44:48+00:00","mainEntityOfPage":{"@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/"},"wordCount":821,"commentCount":0,"publisher":{"@id":"https:\/\/top.host\/blog\/#organization"},"image":{"@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/05\/Blogimages-Tophost-VPN2020.jpg","keywords":["how-to","remote work","vpn"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/top.host\/blog\/create-your-own-vpn\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/","url":"https:\/\/top.host\/blog\/create-your-own-vpn\/","name":"Create your own VPN: how to work from home securely - Top.Host Blog","isPartOf":{"@id":"https:\/\/top.host\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#primaryimage"},"image":{"@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/05\/Blogimages-Tophost-VPN2020.jpg","datePublished":"2020-05-05T09:45:02+00:00","dateModified":"2020-05-14T11:44:48+00:00","description":"Creating a VPN is really important when your team works and communicates from home. Here is a manual so that you can create your own VPN with free software!","breadcrumb":{"@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/top.host\/blog\/create-your-own-vpn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#primaryimage","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/05\/Blogimages-Tophost-VPN2020.jpg","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/05\/Blogimages-Tophost-VPN2020.jpg","width":730,"height":486},{"@type":"BreadcrumbList","@id":"https:\/\/top.host\/blog\/create-your-own-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/top.host\/blog\/el\/"},{"@type":"ListItem","position":2,"name":"Create your own VPN: how to work from home securely"}]},{"@type":"WebSite","@id":"https:\/\/top.host\/blog\/#website","url":"https:\/\/top.host\/blog\/","name":"Top.Host Blog","description":"Extreme Support","publisher":{"@id":"https:\/\/top.host\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/top.host\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/top.host\/blog\/#organization","name":"Top.Host","url":"https:\/\/top.host\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2016\/03\/logo-300x300-1.png","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2016\/03\/logo-300x300-1.png","width":300,"height":300,"caption":"Top.Host"},"image":{"@id":"https:\/\/top.host\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tophostGR\/","https:\/\/x.com\/TophostExtreme","https:\/\/www.instagram.com\/tophostgr\/","https:\/\/www.linkedin.com\/company\/752527\/","https:\/\/www.youtube.com\/user\/TophostXtremeSupport"]},{"@type":"Person","@id":"https:\/\/top.host\/blog\/#\/schema\/person\/2893a10e0682078306ac216e4dfc4bdf","name":"Panagiotis Vavilis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/04\/Vavilis-140x140.jpg09f452125ac92814b3238823ab3c706c","url":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/04\/Vavilis-140x140.jpg","contentUrl":"https:\/\/top.host\/blog\/wp-content\/uploads\/2020\/04\/Vavilis-140x140.jpg","caption":"Panagiotis Vavilis"},"description":"Panagiotis is the Chief Technology Officer of Top.Host.","url":"https:\/\/top.host\/blog\/author\/vavilis\/"}]}},"_links":{"self":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/8286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/comments?post=8286"}],"version-history":[{"count":7,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/8286\/revisions"}],"predecessor-version":[{"id":8293,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/posts\/8286\/revisions\/8293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/media\/8294"}],"wp:attachment":[{"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/media?parent=8286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/categories?post=8286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/tags?post=8286"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/top.host\/blog\/wp-json\/wp\/v2\/coauthors?post=8286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}