Introducing PureSquare – for security beyond VPNs

Visit our website

The newly launched password manager is a secure way to store, share, and generate strong passwords. Try PureKeep!

How to Setup PureVPN on Parrot OS 5.0

Dec 14, 2021
Jan 04, 2023
0 Comments
Download PDF

If you’re having a hard time setting up PureVPN on Linux Parrot supported devices, here’s a guide on how you can do it in the right and easiest way. Connect and stay secure on the web.

Things to Consider:

  1. You have a working internet connection
  2. Linux Cent OS Supported Device.
  3. A Premium PureVPN account (If you haven’t bought yet click 👉here to buy)
Find your VPN credentials for manual configuration.

To find your VPN credentials log into the PureVPN members area. Click 👉 here to visit member area.

  • Login to the Member area using your PureVPN registered email address and password.
  • From manage account section, go to the Subscriptions tab.
  • On Subscription tab scroll down to be able to view your VPN credentials
  • You will be able to see and copy your VPN credentials.
  • Note down your PureVPN username and click the Eye icon to make your password visible and use it in the manual configuration.
PPTP Configuration Guide for Parrot OS 5.0
  • Go to the Terminal window and type the following commands one by one:
1. sudo apt-get update
2. sudo apt-get install pptpd
  • Now Select the following options:
    1. Click Wired Connection
    2. Go to VPN Connections
    3. Select Add a VPN Connection
  • Select Point-to-Point Tunneling Protocol (PPTP) option from the list and then click Create button.
  • When a new window appears, complete the fields as below:
  • Connection name: PureVPN
  • Gateway: ukl1.pointtoserver.com (you can use the servers provided in the above note)
    1. Germany: de1.pointtoserver.com
    2. Netherlands: nl1.pointtoserver.com
    3. United Kingdom: ukl1.pointtoserver.com
    4. United States: usil1.pointtoserver.com
    5. United States: ustx1.pointtoserver.com
    6. United States: usca1.pointtoserver.com
    7. United States: usfl1.pointtoserver.com
    8. United States: usny1.pointtoserver.com
    9. United States: uswdc1.pointtoserver.com
    10. Australia: au-sd1.pointtoserver.com
  • Enter your PureVPN credentials. Here is how you can 👉find your VPN credentials.
  • Now, go to the Advanced option.
  • Only check/ Allow the following options
    1. MSCHAP
    2. MSCHAPV2
  • Also, select the following:
    1. Allow BSD data compression
    2. Allow Deflate data compression
  • Use TCP header compression
  • Click OK and then click Save button.
  • Now go to the Wired Connections option and under VPN Connections click the newly created PureVPN connection to activate the VPN connection.

You are connected now!

L2TP Configuration Guide for Parrot OS 5.0
  • Go to the Terminal window and type the following commands one by one:
1. sudo apt-get update
2. sudo apt-get install xl2tpd
3. sudo apt-get install network-manager-l2tp
4. sudo apt-get install network-manager-l2tp-gnome
  • Now Select the following options:
    1. Click Wired Connection
    2. Go to VPN Connections
    3. Select Add a VPN Connection.
  • Select Layer 2 Tunneling Protocol (L2TP) option from the list and then click Create button.
  • When a new window appears, complete the fields as below:
  • Connection name: PureVPN
  • Gateway: ukl1.pointtoserver.com (you can use the servers provided in the above note)
    1. Germany: de1.pointtoserver.com
    2. Netherlands: nl1.pointtoserver.com
    3. United Kingdom: ukl1.pointtoserver.com
    4. United States: usil1.pointtoserver.com
    5. United States: ustx1.pointtoserver.com
    6. United States: usca1.pointtoserver.com
    7. United States: usfl1.pointtoserver.com
    8. United States: usny1.pointtoserver.com
    9. United States: uswdc1.pointtoserver.com
    10. Australia: au-sd1.pointtoserver.com
  • Enter your PureVPN credentials. Here is how you can 👉find your VPN credentials.
  • Now, go to the IPsec Settings button.
    1. Check the Enable Ipsec tunnel to IPsec host
    2. Pre-share key: 12345678
    3. Under the Advanced section, specific the connection algorithms:
    4. Phase 1 algorithms: 3des-sha1-modp1024
    5. Phase 2 algorithms: 3des-sha1
  • Click OK.
  • Now, go to the PPP Settings button.
  • Only check/ allow the following options:
    1. MSCHAP
    2. MSCHAPV2
  • Also, select the following:
    1. Allow BSD data compression
    2. Allow Deflate data compression
    3. Use TCP header compression
  • Click OK and then click Save button.
  • Now go to the Wired Connections option and under VPN Connections click the newly created PureVPN connection to activate the VPN connection.

You are connected now!

OpenVPN Configuration Guide for Cent OS

As a first step, it is recommended to download the OpenVPN config files for that you can go to your desired web browser, download 👉PureVPN OpenVPN configuration files and extract them.

  • Go to the Terminal window and type the following commands one by one:
1. sudo apt-get update
2. sudo apt-get install openvpn
4. sudo apt-get install network-manager-openvpn
5. sudo apt-get install network-manager-openvpn-gnome
  • Now Select the following options
    1. Click Wired Connection
    2. Go to VPN Connections
    3. Select Add a VPN Connection
  • Select Import a saved VPN configuration. option from the list and then click Create button.
  • Go to the folder where you have downloaded the OpenVPN files and select your desired .ovpn file to connect.
  • When the new window appears, complete the fields as below:
  • Insert Connection name: PureVPN
  • Insert Gateway: (already selected/entered)
  • Connection Type: Password from drop down menu
  • Enter your PureVPN credentials. Here is how you can 👉find your VPN credentials.
  • CA Certificate: Already uploaded.
  • Click Save button.
  • Now go to the Wired Connections option and under VPN Connections click the newly created PureVPN connection to activate the VPN connection.

You are connected to PureVPN now!

Was this article helpful? Rate and share your comments below. Your input matters to us and everyone else in the Cyber Security Community.

How helpful did you find this answer?

Comments (0 )