How to choose, use and configure a VPN in BlueOnyx (Comparison)

Choosing the Right VPN for BlueOnyx

BlueOnyx is an enterprise-grade, RPM-based server distribution built atop CentOS/RHEL. It primarily serves system administrators and hosting professionals who interact with their servers via SSH or BlueOnyx’s own CCE web interface. Desktop environments are rarely used in production, though some users deploy lightweight GUIs like XFCE for local testing. Package management is handled through yum (or its successor dnf), and strict SELinux policies are usually in place. Given this environment, you’ll want a VPN solution that:

  • Provides official RPM repositories or straightforward CLI installers
  • Supports both OpenVPN and WireGuard for flexibility
  • Can run headlessly or integrate into existing network-config tools
  • Offers robust DNS leak protection and autoboot on system start

Based on these requirements, the most suitable VPNs for BlueOnyx are:

  1. NordVPN – Official RPM repo, proven CLI tool, strong WireGuard support.
  2. ProtonVPN – Open-source CLI, excellent privacy focus, WireGuard OpenVPN.
  3. Mullvad – Minimal configuration, flat-file config for WireGuard/OpenVPN, easy to automate.
  4. ExpressVPN – RPM package, user-friendly CLI, proprietary Lightway protocol.

VPN Comparison Table

Provider RPM Repository CLI Client Protocols Auto-start Support SELinux Compatibility
NordVPN Yes Yes WireGuard, OpenVPN Systemd unit provided Pre-labelled policies
ProtonVPN No (script installer) Yes (open-source) WireGuard, OpenVPN Systemd unit examples Works out-of-the-box
Mullvad No Yes WireGuard, OpenVPN Custom systemd templates Manual policy setup
ExpressVPN Yes Yes Lightway, OpenVPN Built-in Pre-configured

Installation Configuration Guides

1. NordVPN

NordVPN offers an official RPM repository that makes installation straightforward on BlueOnyx.

  • Step 1: Add the NordVPN repository
  • Step 2: Install the client
  • Step 3: Authenticate and connect
# Import the GPG key and add the repo
sudo rpm --import https://repo.nordvpn.com/gpg/nordvpn_public.asc
sudo tee /etc/yum.repos.d/nordvpn.repo ltlt EOF
[nordvpn]
name=NordVPN Repository
baseurl=https://repo.nordvpn.com/yum/repos/nordvpn/releasever/basearch
gpgcheck=1
enabled=1
EOF

# Install NordVPN client
sudo yum clean expire-cache
sudo yum install -y nordvpn

# Login and connect to a server
nordvpn login
nordvpn set technology wireguard
nordvpn connect

By default, NordVPN’s systemd service nordvpnd will handle connections. Enable auto-start:

sudo systemctl enable nordvpnd
sudo systemctl start nordvpnd

2. ProtonVPN

ProtonVPN relies on an open-source Python CLI client. It doesn’t have an RPM, but the installer script works seamlessly on BlueOnyx.

  • Step 1: Install prerequisites
  • Step 2: Run the official installer
  • Step 3: Configure auto-connect via systemd
# Install EPEL and dependencies
sudo yum install -y epel-release
sudo yum install -y python3-pip python3-psutil

# Download and run ProtonVPN CLI installer
curl -s -O https://protonvpn.com/download/protonvpn-cli.sh
chmod  x protonvpn-cli.sh
sudo ./protonvpn-cli.sh --install

# Initialize and login
protonvpn init

# Sample connect command
protonvpn c --sc

To enable automatic connection at boot, create a systemd unit:

sudo tee /etc/systemd/system/protonvpn.service ltlt EOF
[Unit]
Description=ProtonVPN Auto Connect
After=network-online.target
Wants=network-online.target

[Service]
Type=oneshot
ExecStart=/usr/local/bin/protonvpn c --sc
RemainAfterExit=yes

[Install]
WantedBy=multi-user.target
EOF

sudo systemctl daemon-reload
sudo systemctl enable protonvpn.service
sudo systemctl start protonvpn.service

3. Mullvad

Mullvad’s strength is simplicity, with flat-file configuration for WireGuard. You can drop the config into /etc/wireguard and use wg-quick.

  • Step 1: Install WireGuard tools
  • Step 2: Download your .conf file from the Mullvad account page
  • Step 3: Bring the interface up
# Enable EPEL and install WireGuard
sudo yum install -y epel-release
sudo yum install -y kmod-wireguard wireguard-tools

# Place your Mullvad config
sudo cp mullvad-wireguard.conf /etc/wireguard/mullvad.conf
sudo chmod 600 /etc/wireguard/mullvad.conf

# Start the VPN
sudo wg-quick up mullvad

# Enable at boot
sudo systemctl enable wg-quick@mullvad

With these tailored instructions, your BlueOnyx server will maintain both the robust security posture it’s known for and the privacy benefits of a top-tier VPN service.

Download TXT



Leave a Reply

Your email address will not be published. Required fields are marked *