Personal
Single Tunnel
One customer login with one region and two downloadable OpenVPN profiles.
- Profiles
- 2
- Region
- 1
- Devices
- 2
- Type
- .ovpn
Private tunnels from real servers, delivered as ready-to-import OpenVPN files for customers who need a clean connection without wrestling with certificates.
The storefront is built for a checkout flow where payment creates a customer account, then the manager generates a unique certificate and `.ovpn` file from the assigned server pool.
Personal
One customer login with one region and two downloadable OpenVPN profiles.
Popular
Five profiles, region switching by request, and manager access for profile rotation.
Global
Multi-region access for customers who need several server routes in one account.
Custom
Dedicated server pool, branded customer access, and admin-controlled certificate lifecycle.
After checkout, the customer sees a manager that can request or rotate an OpenVPN profile. The backend should talk to server-side provisioning scripts over SSH/SFTP with secrets stored outside the repo.
client
dev tun
proto udp
remote ca.wirenets.example 1194
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
cipher AES-256-GCM
auth SHA256
verb 3
# Certificate blocks are generated after checkout.
These are the production pieces that should sit behind the storefront before selling live VPN access.
Move server passwords into environment variables or a vault, rotate the pasted passwords, and use SSH keys with limited sudo commands.
Queue paid orders and generate certificates from EasyRSA/OpenVPN scripts on the assigned node.
Store generated config metadata, support profile downloads, rotation, revoke, and expiry notices.
Use processor webhooks to unlock generation only after payment succeeds and to pause accounts on failed renewal.