Open [Certificate Manager] in menu [System]
In tab [CAs] click [Add] button
Enter PrivateVPN as [Descriptive name]
Enter this in [Certificate data] field and click [Save] button
Open [OpenVPN] from [VPN] menu, switch to tab [Clients] and click [Add] button
Fill in the data for: Server mode: Select [Peer to Peer ( SSL/TLS )] Protocol: UDP Device mode: tun Server host or address: You'll find the server list here: Server list Server port: 1194 Proxy Auth. - Extra options: none Description: Name of the country, city and server address Username: Enter your email address for PrivateVPN Password: Enter your PrivateVPN password TLS authentication: Enable Key:
-----BEGIN OpenVPN Static key V1-----
f035a3acaeffb5aedb5bc920bca26ca7
ac701da88249008e03563eba6af6d262
5ac8ba1e5e0921f76be004c24ae4fd43
e42caf0f84269ad44d8d4c14ba45b138
6f251c7330d8cc56afd16d5168356456
51ef7e87a723ac78ae0d49da5b2f2d78
ceafcff7a6367d0712628a6547e5fc8f
ef93c87f7bcd6107c7b1ae68396e944a
adae50111d01a5d0c67223d667bdbf1b
f434bdef03644ecc5386e102724eef38
72f66547eb66dc0fea8286069cb082a4
1c89083b28fe9f4cec25d48017f26c4f
d85b25ddf2ae5448dd2bccf3eef2aacf
42ef1e88c3248c689423d0b05a641e9e
79dd6b9b5c40f0cc21ffdc891b9eee95
1477b537261cb56a958a4f490d961ecb
-----END OpenVPN Static key V1----- Peer Certificate Authority: Select [PrivateVPN] Client Certificate: Select [None (Username and/or Password required)] Encryption Algorithm: Select [AES-256-CBC (256 bit key, 128 bit block)] Auth digest algorithm: Select [SHA256 (256-bit)] Hardware Crypto: If your device do not support hardware crypto please select [No Hardware Crypto Acceleration] Compression: Select [Enable with Adaptive Compression] Topology: Select [Subnet - One IP address per client in a common subnet] Custom options:
remote-cert-tls server;
client;
comp-lzo;
persist-key;
persist-tun;
auth-nocache;
connection retry -1;
route-delay;
keepalive 3 10;
Click [Save] button
Step 3
Open (Interface Assignments) from [Interfaces] menu and select the newly created tunnel [ovpn1 (Germany, Frankfurt - de-fra1.privatevpn.com)] from dropdown menu
Step 4
Open [NAT] from [Firewall] menu and switch to tab [Outbound]
Change to manual and duplicate outbound rules for VPN like this:
Step 5
Open [Rules] from [Firewall] menu and switch to tab [LAN]
Copy default LAN to any rule like this: (note Advanced Gateway Setting)
Step 6
Should look like this when saved: Default rules can be disabled or removed if wanted.
Step 7
Create Allow any rules on interfaces PrivatVPN and OpenVPN