Jump to content
Not connected, Your IP: 216.73.216.40

Leaderboard


Popular Content

Showing content with the highest reputation on 07/28/25 in all areas

  1. 1 point
    Hello! We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Frankfurt, Germany, are available: Adhil and Fuyue. They will replace 1 Gbit/s servers Intercrus, Serpens, Tucana and Veritate, which will be decommissioned on 2025-07-31 as they run on hardware and lines that show first signs of inadequacy after a year of extraordinary userbase growth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor : https://airvpn.org/servers/Adhil https://airvpn.org/servers/Fuyue Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
  2. 1 point
    It would probably be faster for everyone to simply show you my stack: # This is a P2P demonstration stack template which has been tested to work well with AirVPN as of January 2025. # Use AirVPN's config generator to obtain your specific values (https://airvpn.org/generator). Make sure to specify your device. # Remember that the indentation of a Docker Compose file is important. services: gluetun: image: qmcgaw/gluetun:latest container_name: gluetun cap_add: - NET_ADMIN devices: - /dev/net/tun:/dev/net/tun environment: - VPN_SERVICE_PROVIDER=airvpn - VPN_TYPE=wireguard - WIREGUARD_PUBLIC_KEY= # copy from config file - WIREGUARD_PRIVATE_KEY= # copy from config file - WIREGUARD_PRESHARED_KEY= # copy from config file - WIREGUARD_ADDRESSES= # copy from config file - SERVER_REGIONS= # optional, comma seperated list, no spaces after commas, make sure it matches the config you created - SERVER_COUNTRIES= # optional, comma seperated list, no spaces after commas, make sure it matches the config you created - SERVER_CITIES= # optional, comma seperated list, no spaces after commas, make sure it matches the config you created - FIREWALL_VPN_INPUT_PORTS= # mandatory, the port number AirVPN forwarded for you (from pool #1) should appear here - TZ= # choose timezone value from list at https://en.wikipedia.org/wiki/List_of_tz_database_time_zones (e.g.: Asia/Tokyo) ports: - 8080:8080 # qbittorrent web GUI, port number can be changed BUT it must match WEBUI_PORT in qbittorrent service environment - (port forwarded from AirVPN):(port forwarded from AirVPN) # also place in TORRENTING_PORT field in qbittorrent service environment restart: unless-stopped qbittorrent: image: lscr.io/linuxserver/qbittorrent:latest container_name: qbittorrent depends_on: gluetun: condition: service_healthy restart: true environment: - PUID= # your desired user's number - PGID= # your desired user's group number - TZ= # choose timezone value from list at https://en.wikipedia.org/wiki/List_of_tz_database_time_zones - WEBUI_PORT=8080 # must match "qbittorrent web GUI" port number in gluetun's service above - TORRENTING_PORT=(port forwarded from AirVPN) # must match forwarded port number in gluetun's service above volumes: - /mnt/(your folder structure here):/config # directory you want to save your qbittorrent config files - /mnt/(your folder structure here):/downloads # qbittorrent download location restart: unless-stopped network_mode: "service:gluetun" # this is what forces qbittorrent to only use the VPN connection from gluetun Hope this helps!
×
×
  • Create New...