We've been using OpenVPN Access Server for node accessing.
Chief Executive Officer at a tech services company with 1-10 employees
Is open source and stable, but the scalability could be better
Pros and Cons
- "OpenVPN Access Server is cheap, and we get to use it ourselves. It is also a stable solution."
- "It is not scalable."
What is our primary use case?
What is most valuable?
For us, it's important that OpenVPN Access Server is cheap and that we get to use it ourselves. It is also a stable solution.
What needs improvement?
The scalability of the solution could be improved.
For how long have I used the solution?
I've been using it for nine years.
Buyer's Guide
OpenVPN Access Server
October 2025
Learn what your peers think about OpenVPN Access Server. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
It is not scalable. We have 20 people who use this solution. Most of them are developers, one is a system admin person, and one is a DevOps person.
How was the initial setup?
I'm the CEO of the company, and there is a technical team that takes care of the installation. As far as I know, it was straightforward and easy enough for them. I think it took a day to install it.
What about the implementation team?
We have internal staff who implemented it.
What's my experience with pricing, setup cost, and licensing?
It is an open-source solution, so we don't pay for anything.
What other advice do I have?
On a scale from one to ten, I would rate OpenVPN Access Server at seven.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Owner at a outsourcing company with 1,001-5,000 employees
Very easy to set up users, but needs simpler high availability deployment and support for additional protocols
Pros and Cons
- "It was very easy to set up users."
- "The high availability deployment is not very straightforward. They can make it simpler. OpenVPN does not support some of the additional protocols that Pulse Secure and Cisco AnyConnect support. They can include support for these additional protocols."
What is most valuable?
It was very easy to set up users.
What needs improvement?
The high availability deployment is not very straightforward. They can make it simpler.
OpenVPN does not support some of the additional protocols that Pulse Secure and Cisco AnyConnect support. They can include support for these additional protocols.
For how long have I used the solution?
I have been using this solution for close to a year. I set it up and configured it. I also supported it from time to time and documented standard operating procedures because there were other people who were going to maintain it and operate it. We have about 15 users of this solution.
How was the initial setup?
It was not very complicated. I did it for the first time, and for somebody who was doing it for the first time, it was okay. I could do it.
What other advice do I have?
It is important to document the steps so that if one person is not available, another person can continue the work.
I would rate OpenVPN Access Server a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
OpenVPN Access Server
October 2025
Learn what your peers think about OpenVPN Access Server. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.
Enterprise Architect at a tech services company with 201-500 employees
Easy to set up and use, offers multi-factor authentication, and technical support is good
Pros and Cons
- "There is support for multi-factor authentication."
- "The security needs to be improved because it was a complaint that our customers had."
What is our primary use case?
We are a solution provider and the OpenVPN Access Server was one of the products that we used for our customers. It is used to create remote desktop connections into the cloud network, where people who are working from home can share resources with people in the office. When people are working in an office then they have a local network, and OpenVPN expands the network for use externally.
We are no longer using this solution because of complaints raised by our customers about security vulnerabilities. The server is now shut down.
How has it helped my organization?
This server allows you to connect to a network that does not have any public IP addresses. You first dial-up the OpenVPN to get onto the network, then directly use the private IP for the local device. Once the connection is made, we can do development work, maintenance, or whatever is required.
What is most valuable?
The most valuable feature is the remote connection capability.
It is easy to use.
There is support for multi-factor authentication.
What needs improvement?
We would like to be able to access the parts of the network that belong to other virtual LANs, which is not currently possible. For example, if an organization has different VLANs for sales, developers, and production, then we can only connect and view one of these segments. If you can access sales then you will have visibility of that particular subnet and not be able to see the developer VLAN resources.
The security needs to be improved because it was a complaint that our customers had. I'm not sure exactly what the specific issue is, other than they told us that it was not compliant with their organizational policies.
It is not possible to scale this solution horizontally, which is something that should be improved. They could allow multiple instances to run in different zones, synchronizing with each using a round-robin scheduler.
It would be great if they added intrusion prevention and detection (IPS/IDS) features. If they had these then there would be less need to use other products, such as firewalls. It would allow everything to run under one umbrella with centralized control.
For how long have I used the solution?
We were using OpenVPN for about one year and we migrated away from it about three months ago.
What do I think about the scalability of the solution?
Horizontally, this solution is definitely not scalable. Vertically, it is possible but there will be some downtime. Scaling requires that we stop the server, upscale it, select a different instance, and then restart it. The downtime is approximately five minutes.
How are customer service and technical support?
I have been in contact with technical support and the experience was good. They have knowledgeable people.
Which solution did I use previously and why did I switch?
We have migrated to Fortinet because of security vulnerabilities.
How was the initial setup?
The initial setup is easy. Once we go to the marketplace for the license, we can install and start using it. This involves selecting an image, then selecting a VM, and deploying on that. You then install the certificate and create the users. Creating users is also easy to do.
One person is enough for this task and it will take between 15 and 30 minutes to deploy.
What about the implementation team?
Our in-house team deploys OpenVPN for our customers. After the deployment is complete, users will log in, download their profile, and then they can connect.
Which other solutions did I evaluate?
Before migrating to Fortinet, we looked at other vendors including Cisco. We found that based on the sizing we needed, the pricing of Cisco AnyConnect was not as competitive.
Personally, I have not found any differences between these products that affect what I need to do.
What other advice do I have?
Personally, I like this product and our decision to shut down the server is in response to decisions made by our customers. I have not found any issues with it, myself.
I would rate this solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at Scott Solutions LLC
My solution for connecting two DRBD farms
Pros and Cons
- "The features I have found to be most valuable are the levels of encryption I can enact and the compression I can apply to improve throughput."
- "If there was a Graphical User Interface to help streamline the configuration, I believe OpenVPN would probably venture more into the non-geek realm as it were."
What is our primary use case?
OpenVPN is an excellent candidate for establishing secure point-to-point connections between home office locations and satellite locations. It can be configured to limit exposure of the network, from just between the specific endpoints, all the way to full access between local area networks. Performance is consistent and positive. Security has been outstanding, passing some of the greatest tests we've put them to regulating bodies looking for vulnerabilities. If you're looking for a solid solution to establish VPN tunnels between sites, be sure to put OpenVPN on your list to check out.
How has it helped my organization?
OpenVPN has allowed me to have the ability to VPN into my environment from anywhere, using Open Source technologies, which helps me control my costs. My clients have capitalized on it when WAN alternatives were too expensive to consider. Yes, there are appliance equivalents out there, but for full customization and low cost, you can't beat it, in my opinion.
What is most valuable?
The features I have found to be most valuable are the levels of encryption I can enact and the compression I can apply to improve throughput. Obviously, the higher the level of encryption the more difficult it will be to intercept valuable content; and of course, the more we can compress data through the tunnel, the higher the level of relative throughput we can achieve.
What needs improvement?
The product is fully customized through configuration files, which is all achieved through manual data entry. This is where it becomes unattractive. If there was a Graphical User Interface to help streamline the configuration, I believe OpenVPN would probably venture more into the non-geek realm as it were. What I mean by this is, if there was a form-driven configuration process, like a "File -> Settings" kind of thing, where the end user can enter data into fields to specify the connection specifics, e.g. hostname/IP Address, protocols, etc. that could be written into the config file in the background, similar to what you see in YaST over in openSuSE in some of the services area, etc., and basically foolproof the VPN configuration, you may see more GUI-oriented folks using OpenVPN. Of course in saying this, I anticipate what's going to happen: "Well, give it a try, Elliott!" I'd love to, but my programming skills aren't there yet - I'm a "Edit the file" guy...
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
I have had a hard time trying to get OpenVPN to crash. I have achieved it on occasion when I am constantly breaking connectivity between the hosts, which I only do when I'm experimenting with things. Otherwise, once your configuration is stable, the tunnel remains stable.
What do I think about the scalability of the solution?
Scalability, as far as I can tell thus far, is limited to the hardware capabilities of your Linux router or host from which you intend to run OpenVPN.
How are customer service and technical support?
I cannot recall whether I worked with customer support on OpenVPN; being an Open Source project, when you have questions, you really end up working with fellow users in the OSS community. That being said, I can also say that the documentation for OpenVPN is outstanding. It gives you a full explanation of the product and case examples of how it can be applied. From there, you really need to start experimenting with it and post questions to the forums. You will find that people will respond and help you through your issues. People are happy to help out with products they've come to enjoy, and OpenVPN is one of those, as I think you'll find out.
Which solution did I use previously and why did I switch?
Prior to OpenVPN, I've had some experience with SonicWALL VPN, Fortinet, and CiscoVPN. All of these are fine alternatives, and I rarely experienced a problem using them. The big push for me to look at OpenVPN came when I started to work in heterogeneous environments, using both Windows and Linux.
As I started to discover the options available through the Linux platform, I naturally continued to expand my curiosity and experiment with the options I found. In many cases, I found some that were okay, but too unstable to really consider, and in others, I found outstanding products developed by some brilliant people.
OpenVPN became the perfect solution for me when I tried to connect two DRBD farms together and needed to encrypt the data stream between the two. It made sense to use the product from the host responsible for managing the DRBD stack, and simply add the remote farm via the tunnel. I then began to see other opportunities where I could apply it, and finally jumped in full force.
How was the initial setup?
Going through the setup for the first time will be a challenge. What I have done is write down a procedure to follow, that I have used every time since. I make modifications from time to time, as new features have been introduced, or old features have been replaced. Having a working set of config files available to use as a basis to build out new tunnels have been a blessing, too!
What about the implementation team?
The project I described previously, I developed on my own. I was then hired by my clients to deploy the solution for them. To be honest, I knew nothing about OpenVPN when I started, but I was able to come up to speed pretty quickly. And if I was able to do it, I have no doubt you can be successful, too!
What was our ROI?
Overall, I believe the ROI is high. The initial investment can be costly, as you go through the process of learning the application. But in the long run, you gain more than just financial benefits; the intellectual knowledge gained can be invaluable.
What's my experience with pricing, setup cost, and licensing?
With regard to setup cost, pricing and/or licensing, the simple answer is that you'll need to set aside some time to learn it and experiment with it. That's the only cost you will incur, with the exception of freeing up some hardware on which you can install Linux. OpenVPN is freely available through all of the major distributions. My experience thus far has been with openSUSE, which is a great platform for you to explore.
Which other solutions did I evaluate?
In my DRBD example above, I couldn't find a solution without introducing additional hardware between the two farms that either complicated access from authorized hosts or potentially impacted performance. I really needed it to occur at the point of management: the DRBD master of the farm. So, when I am asked, "Did you evaluate other options?", the short answer is "Yes", but on paper only; none of them could accomplish what I needed to achieve.
What other advice do I have?
You can see a quick description of the DRBD project I mentioned on my website along with a graphic showing the layout of it. Visit http://www.scottsolutions.us/p... for more details.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Infrastructure Administrator at a financial services firm with 51-200 employees
Has the easiest UX for end-users and greatest interoperability with all operating systems we used
Pros and Cons
- "Provided the easiest UX for our end-users and had the greatest interoperability with all the operating systems we used, including but not limited to: iOS, Android, OS X, Windows, and Linux."
- "The upgrade path from older versions was more difficult than we wanted to tackle, so we ran an older version of the software for longer than I wanted. Patching, updating, and migrating to newer versions was a problem for us. That said, we were on a rather old version that I inherited yet it worked rock solid."
What is our primary use case?
Our primary use case was to give mobile knowledge workers a secure connection across the Internet to our LAN, whether by laptop, mobile tablet or smart phone.
How has it helped my organization?
It allowed people to remotely access files from their mobile devices. It was so easy for end-users to use that they were able to work more efficiently no matter where they were, whether at a client’s campus, home, traveling – wherever they had a device and internet access.
What is most valuable?
This open-source solution provided the easiest UX for our end-users and had the greatest interoperability with all the operating systems we used, including but not limited to: iOS, Android, OS X, Windows, and Linux.
What needs improvement?
The upgrade path from older versions was more difficult than we wanted to tackle, so we ran an older version of the software for longer than I wanted. Patching, updating, and migrating to newer versions was a problem for us. That said, we were on a rather old version that I inherited yet it worked rock solid.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
No issues.
What do I think about the scalability of the solution?
We more than doubled our staff at my previous company and our OpenVPN appliance handled it well.
How are customer service and technical support?
Tech support wasn’t needed during my 5 years administrating OpenVPN.
Which solution did I use previously and why did I switch?
OpenVPN was already implemented when I took over the IT department. I do know that there was also a Cisco VPN product in place, but it was finicky and many of our end-users had issues with the Cisco VPN. At the time, it also didn’t work on mobile devices and the required ports were blocked by certain ISPs (like some hotel internet connections, cellular providers, etc.)
What about the implementation team?
In-house expertise.
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
At one point I had to purchase addition connection licenses. I was very pleased with the pricing and licensing; so much easier than navigating the confusing jungle of Microsoft and Cisco licensing and pricing. That alone made the product a delight to manage.
Which other solutions did I evaluate?
I didn’t purchase OpenVPN, but I have evaluated other products for other departments I managed at other companies. Cisco and Fortinet are the two I remember off hand.
What other advice do I have?
We did not use this product on AWS. We hosted the server on our network.
My advice would be, if OpenVPN fits your environment and needs, it’s a great solution. Do it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
DevOps Engineer at a tech services company with 51-200 employees
Encrypted connections mean our security is much improved
How has it helped my organization?
Encrypted connections are, in all situations, better than unencrypted. So, security is much better with OpenVPN.
What is most valuable?
The ability to run in almost any conditions, and the flexibility that comes with that.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
No issues with stability, at least not recently.
What do I think about the scalability of the solution?
No issues with scalability.
How are customer service and technical support?
We didn't use any paid support. This software is fairly industry-standard and you can find all kinds of help in the online community.
Which solution did I use previously and why did I switch?
We switched from IPSec and switched because of NAT issues.
How was the initial setup?
This product was used with AWS. The installation and configuration is pretty straightforward.
What's my experience with pricing, setup cost, and licensing?
Begin with the community version and upgrade to paid one if the need arises.
What other advice do I have?
I'd rate it at nine out of 10, just because the product has to grow.
Carefully consider what do you want to get out of it, same as with the other software.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Software Engineer II at a tech vendor with 201-500 employees
Compatible with almost any Linux system, and easy to write scripts and generate keys
Pros and Cons
- "The compatibility with almost any Linux operating system, and how easy it is to write scripts and generate keys for people to use and log in. I found it easy to deploy quickly."
- "If someone's key is not working, or if we had to remove someone's permission from it, or maybe an employee left the company and we had to take their key out, that seemed a little bit more complicated than it had to be."
- "I think right now the GUI part of it is locked out behind the pay wall. It could use something that gives it a very basic, minimal, graphic interface for logging in, for the community version. That would probably be a good step forward."
- "If we had to create something for someone who was not necessarily tech savvy, I had to set that up on their computer, I had to write "read me's" and other things so that they could install their client and then connect to the VPN by themselves. So it was hard to set up for people who are not tech savvy."
What is our primary use case?
Interoffice connections. We had offices in India and the US. To connect both of them to the same environment, we were using OpenVPN for that. It was so we could maintain a file store, exchange files and documents securely through our own proprietary mechanism, instead of having to rely on Dropbox and the like.
How has it helped my organization?
Interoperability between different offices. We didn't have to keep exchanging documents via email and other tech. We were able to maintain a common file store because of the complete VPN setup we had using OpenVPN.
What is most valuable?
The compatibility with almost any Linux operating system, and how easy it is to write scripts and generate keys for people to use and log in. I found it easy to deploy quickly.
What needs improvement?
Some of the issues we faced were things like, if someone's key is not working, or if we had to remove someone's permission from it, or maybe an employee left the company and we had to take their key out. That seemed a little bit more complicated than it had to be.
Also, I think right now the GUI part of it is locked out behind the pay wall. It could use something that gives it a very basic, minimal, graphic interface for logging in, for the community version. That would probably be a good step forward.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
We did not encounter any stability issues in our scope.
What do I think about the scalability of the solution?
Our use case was less complex than most. We did not come across any issues with scalability.
How are customer service and technical support?
I usually found support online, so I didn't have to use tech support.
Which solution did I use previously and why did I switch?
We started off with OpenVPN when we were evaluating what we could use for our needs and we ended up with OpenVPN. I have used other VPN solutions at other offices, but in the cases that I've dealt with, OpenVPN was the choice.
How was the initial setup?
If we had to create something for someone who was not necessarily tech savvy, I had to set that up on their computer, I had to write "read me's" and other things so that they could install their client and then connect to the VPN by themselves. So it was hard to set up for people who are not tech savvy. I had to actively provide assistance and walk them through the whole process.
What's my experience with pricing, setup cost, and licensing?
The product's pricing is good value, definitely. It is one of the best features, I would say.
Evaluate the product before seeing which type of licensing is good for you. I think there is a good evaluation method available for OpenVPN, so you can just evaluate if it meets your needs. Then go forward with the right licensing policy.
What other advice do I have?
OpenVPN is a good option for kick-starting any kind of interoperability between offices. It doesn't have a huge setup time, so it's a quick way to start experimenting with how the organization would work with its VPN requirements. Even if your requirements are very small, it's a very convenient to start off with this solution.
I rate it at eight out of 10 because it gives value for what it provides. You need technical know-how to get started on it, but it is also very swift. It has all the right features but it's technically challenging if you're not tech savvy. Providing clients with keys is not that straightforward.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior System Engineer with 1-10 employees
Allows us to see and use the new Citrix server as a local server within the company
Pros and Cons
- "A valuable feature for us is its ability to see the new Citrix server as a local server within the company. And it allows us to test abroad."
- "I would like to see a simpler interface, so that we can make the connection between the local network using the LAN IP."
- "I would be more happy with the idea of licensing to have a reduced price with longer, grouped, annual fees. We have a lot of other software that does the same thing. It's a little higher price if you're going with a shorter stint, but there's a reduction in price for three- and five-year contracts."
What is our primary use case?
This was a test bed in which to use a virtualized Citrix server to be connected with the downtown Tacoma site. We needed that to be able to not only access the local network over there, but also to use thin clients there to virtualize the work stations on our test location.
How has it helped my organization?
It allows us to actually use the Citrix server, just that simple.
What is most valuable?
A valuable feature for us is its ability to see the new Citrix server as a local server within the company.
And it allows us to test abroad. We have a couple other sites that we want to try to get people to remote into. Having that feature really helped.
What needs improvement?
The user interface that we had to implement. I would like to see a simpler interface, so that we can make the connection between the local network using the LAN IP.
Also, I would be more happy with the idea of licensing to have a reduced price with longer, grouped, annual fees. We have a lot of other software that does the same thing. It's a little higher price if you're going with a shorter stint, but there's a reduction in price for three- and five-year contracts.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It's been more of a hardware issue with us. The VPN has been working fine, but on our side, where our test bed is, we've just been trying to get it fine-tuned. But, no, OpenVPN hasn't had any problems.
What do I think about the scalability of the solution?
Not yet.
How are customer service and technical support?
It's been pretty good. We only had one question when we were first implementing it. My crew and I were answered very quickly. The technical support was responsive.
Which solution did I use previously and why did I switch?
We didn't have a previous solution. We had done a little research and we went with OpenVPN as the first option. It wasn't that we went through several before it.
How was the initial setup?
It was pretty straightforward. We've seen terrible things with Citrix, so nothing compared to that.
What's my experience with pricing, setup cost, and licensing?
I would say the product's pricing is a good value. I would recommend to other companies to implement it. I've seen other software, in tandem with the service, to be very expensive.
Which other solutions did I evaluate?
We were attempting to do a closed VPN between the two sites, but it really doesn't work with the local IPs that we wanted people's Citrix agents to be able to get in. We wanted it to emulate the IP of it being local because eventually we were going to move the Citrix server to the Tacoma site.
What other advice do I have?
Do your homework, and make sure that your test site where you're going to be setting this up has a good, solid connection with your ISP. That was the issue we ran into. We actually had to get our ISP out here to fix the modem that we were having issues with.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free OpenVPN Access Server Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Product Categories
Enterprise Infrastructure VPNPopular Comparisons
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Cisco Secure Client (including AnyConnect)
Check Point Harmony SASE (formerly Perimeter 81)
Tailscale
Check Point Remote Access VPN
Ivanti Connect Secure
Microsoft Azure VPN Gateway
SonicWall Netextender
Citrix Gateway
Hillstone E-Series
NordLayer
Zyxel VPN Client
SonicWall SMA
Cisco IOS SSL VPN
Buyer's Guide
Download our free OpenVPN Access Server Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Fortinet FortiClient compare with Open VPN Access Server?
- What is the difference between "data protection in transit" vs "data protection at rest"?
- What are the best practices to prevent a Brute Force attack via remote access?
- Looking for a piece of advice and tips on the deployment of VPN concentrators for SD-WAN tunnels?
- When evaluating Enterprise Infrastructure VPN, what aspect do you think is the most important to look for?
- How does remote work influence DevOps?
- What tools do you use to make a remote work more efficient?
- What are your recommended best practices and tools to prevent cloud jacking in your organization?
- What enterprise infrastructure VPN solution do you use?
- Why is an enterprise infrastructure VPN solution important?













