Network Manager is designed to provide automatic connectivity, through whatever channels are available. Once a VPN connection is established, all traffic is routed through the tunnel. After network interruptions, Network Manager will normally automatically restart OpenVPN to reconnect.
However, Network Manager occasionally kills the OpenVPN process after network interruptions. High network loading seems to increase the risk. And when connectivity returns, Network Manager doesn't restart OpenVPN.
Therefore, to ensure that you have no leaks when using OpenVPN with Network Manager, it's crucial to have firewall (iptables) rules that restrict traffic to the VPN tunnel, and that allow direct connections only to the VPN server. It's also prudent to block all IPv6 traffic.
- Install OpenVPN and the OpenVPN plugin for the Network Manager. Depending on your distro
you may also require the network-manager-openvpn-gnome package.
sudo apt-get install openvpn network-manager-openvpn
- Download the latest config files and extract contents to a temporary directory.
- Click on the Network Manager icon (normally top right menubar) and select Edit connections.. > "+" > Import a saved VPN configuration.. > Create.
- Select one of the .ovpn files you extracted from step 2 representing the server you would like to configure and click Open to import.
- The VPN configuration window will open on the VPN tab. Under the Authentication heading update the Type to Password.
- Enter your IVPN Account ID that begins with letters 'ivpn' and any password.
Only your account ID is used for the authentication. The password field can be empty or set to anything, like "ivpn", if your client requires a non-blank password.
- Click on the Network Manager icon in the toolbar and select the newly configured server under VPN Connections.
- Once connected you should see a a small lock next to the Network Manager icon. You can confirm that
by checking your external IP in the terminal.
sudo grep VPN /var/log/syslog