To allow each of our phones to access the PhilTel network, we set up a Virtual Private Network (VPN) to allow a secure connection between each of our sites and our server running Asterisk.

We use OpenVPN to facilitate connection between our main C&C server and each client site. Using this VPN, we can also easily administer the hardware at each site as we need.

OpenVPN is now favored over WireGuard as our ATAs natively support it. WireGuard also had some stability issues in our testing, though it could become a viable candidate again in the future for some use-cases.

IP Forwarding

We must enable IPv4 forwarding on the server by modifying /etc/sysctl.conf and uncommenting net.ipv4.ip_forward=1. This will make sure that traffic can flow from our OpenVPN peers through the server:

$ sudo cat /etc/sysctl.conf | grep 'net.ipv4.ip_forward=1'


$ wget -O 
$ chmod +x 
$ sudo ./ 

The script will automatically add the server port to the firewall and save the client .ovpn config file to your home directory. To revoke an existing client or add a new client, simply run the script again.

Set a Static Client IP

It is useful to set a static IP for each client so we can easily identify them. We can extract the client name from the certificate and then add the needed IP info into a file in the ccd directory with the same name. Then, we restart the OpenVPN server.

$ sudo openssl x509 -subject -noout -in /etc/openvpn/easy-rsa/pki/issued/philtel-iffybooks.crt
subject=CN = philtel-iffybooks
$ sudo echo "ifconfig-push" > /etc/openvpn/ccd/philtel-iffybooks
$ sudo systemctl restart openvpn@server


If needed we can always restart the server

$ sudo systemctl stop openvpn@server