SoftEther VPN is a powerful and versatile VPN server that allows you to create a secure and flexible VPN infrastructure. Keeping your SoftEther VPN server up-to-date is essential for maintaining security and performance. This guide will walk you through the process of updating your SoftEther VPN server on a Linux system step by step.
Before you begin, make sure you have the following:
- Access to a Linux server with SoftEther VPN Server installed.
- Root or sudo access to the server.
- Certbot installed if you’re using Let’s Encrypt for SSL certificates.
Updating SoftEther VPN Server
Update Your System:
Start by updating your system’s package list and upgrading the installed packages:
yum update -y
Remove the Old Installation:
If you have an existing SoftEther VPN Server installation, remove it. Replace ‘softether-vpnserver’ with your actual package name if it’s different.
rm -rf /path/to/softether-vpnserver
Download the Latest Version:
Visit the SoftEther VPN Server download page to get the URL for the latest version: SoftEther Download Page
wgetto download the latest version. Make sure you are in the
/root/directory when downloading and untarring:
Stop the VPN Server Service:
To prevent any issues during the update, stop the SoftEther VPN Server service:
systemctl stop vpnserver
Extract the New Version:
Extract the downloaded SoftEther VPN Server archive:
tar xzvf softether-vpnserver-<latest-version>.tar.gz
Move the New Version:
Move the extracted files to the installation directory, typically
cp -r vpnserver /usr/local/ cd /usr/local/vpnserver/
Ensure that the files and directories have the correct permissions:
chmod 700 /usr/local/vpnserver chmod 600 * chmod 700 vpnserver chmod 700 vpncmd
Start the VPN Server:
Start the SoftEther VPN Server service:
systemctl start vpnserver
Renewing SSL Certificate
If you’re using SSL certificates with your SoftEther VPN server, you may need to renew them after the update. Here’s how to renew Let’s Encrypt certificates using Certbot:
Renew the Certificate:
Run Certbot to renew your SSL certificate. Replace ‘vpn.domain.uk’ with your actual domain:
certbot certonly --standalone -d vpn.domain.uk
Updating Server Certificates
To update the server certificates, follow these steps:
Run the VPNCMD tool:
Select option 1 to manage the SoftEther VPN Server:
Enter the administrator password when prompted.
Use the following commands to load the new SSL certificate and private key:
ServerCertSet /LOADCERT:/etc/letsencrypt/live/vpn.domain.uk/fullchain.pem /LOADKEY:/etc/letsencrypt/live/vpn.domain.uk/privkey.pem
Exit VPNCMD and re-enter it. Select option 3 to check the server’s configuration:
You have successfully updated your SoftEther VPN Server on Linux and renewed your SSL certificates if necessary. Keeping your VPN server up-to-date ensures that you benefit from the latest features and security enhancements. Make sure to test your VPN connections after the update to ensure everything is functioning as expected.