Server Management

Complete guide to Axe VPN admin panel and mobile application

Server Management Guide

Server Management Overview

Learn how to add, configure, monitor, and maintain VPN servers in your Axe VPN network. This guide covers everything from basic server addition to advanced monitoring and troubleshooting.

Adding New Servers

There are two methods to add servers to your VPN network:

Method 1: Manual Server Addition

Use this method when you have an existing OpenVPN server with a configuration file:

  1. Navigate to ServersAdd Server
  2. Fill in the server information form
  3. Upload the OpenVPN configuration file (.ovpn)
  4. Configure server settings
  5. Save and test the server
Server Information Form
Basic Information
  • Server Name: Descriptive name (e.g., "US East Coast")
  • Country Code: ISO country code (US, UK, DE, etc.)
  • City: Server location city
  • IP Address: Public server IP address
Technical Settings
  • Port: OpenVPN port (default: 1194)
  • Protocol: UDP (recommended) or TCP
  • OVPN File: OpenVPN configuration file
  • Capacity: Maximum concurrent connections

Method 2: Automated Server Installation

Use this method to automatically install and configure OpenVPN on a fresh server:

Prerequisites
  • Fresh Ubuntu 18.04+ or CentOS 7+ server
  • Root SSH access
  • Server has public IP address
  • Firewall allows SSH (port 22) access
  1. Go to ServersInstall Server
  2. Enter server SSH details:
Server IP: 192.168.1.100 SSH Port: 22 Username: root Password: [your-ssh-password] VPN Port: 1194 Protocol: UDP Country: US
  1. Click Start Installation
  2. Monitor installation progress in real-time
  3. Download generated OVPN file when complete

Server Configuration

Server Settings

Basic Settings
  • Status: Enable/disable server
  • Order: Display order in mobile app
  • Capacity: Max concurrent connections
  • Free/Premium: Server access level
  • Auto-disable: Disable when unavailable
Security Settings
  • VPN Username: OpenVPN auth username
  • VPN Password: OpenVPN auth password
  • Min Version: Minimum app version required
  • Connection Limit: Per-user connection limit
  • Time Limit: Free user time limit

OVPN Configuration File

The OpenVPN configuration file contains connection details. Here's an example structure:

client dev tun proto udp remote your-server-ip 1194 resolv-retry infinite nobind persist-key persist-tun cipher AES-256-CBC auth SHA256 key-direction 1 script-security 2 up /etc/openvpn/update-resolv-conf down /etc/openvpn/update-resolv-conf # Certificate and key data <ca> -----BEGIN CERTIFICATE----- [CA certificate content] -----END CERTIFICATE----- </ca> <cert> -----BEGIN CERTIFICATE----- [Client certificate content] -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- [Client private key content] -----END PRIVATE KEY----- </key> <tls-auth> -----BEGIN OpenVPN Static key V1----- [TLS auth key content] -----END OpenVPN Static key V1----- </tls-auth>

Server Monitoring

Real-time Server Status

The admin panel provides comprehensive server monitoring:

Active Servers
  • ✓ Online and accepting connections
  • ✓ Health checks passing
  • ✓ Normal response times
  • ✓ Available capacity
Warning Status
  • ⚠ High connection load
  • ⚠ Slow response times
  • ⚠ Approaching capacity
  • ⚠ Intermittent connectivity
Offline Servers
  • ✗ Cannot establish connection
  • ✗ Health checks failing
  • ✗ Server maintenance
  • ✗ Network issues

Server Metrics

Monitor these key metrics for each server:

Connected Users

Current active connections

Data Transfer

Upload/download bandwidth

Response Time

Connection latency

Uptime

Server availability %

Server Maintenance

Regular Maintenance Tasks

Maintenance Schedule

Perform these maintenance tasks regularly to ensure optimal server performance:

Daily Tasks
  • Monitor server status and alerts
  • Check connection logs for errors
  • Verify backup systems
  • Review performance metrics
Weekly Tasks
  • Update server security patches
  • Rotate log files
  • Check disk space usage
  • Test backup restoration

Server Updates

Keep your servers updated with the latest security patches:

# Ubuntu/Debian servers apt update && apt upgrade -y # CentOS/RHEL servers yum update -y # Restart OpenVPN service after updates systemctl restart openvpn@server

Configuration Backup

Always backup server configurations before making changes:

  1. Go to ServersServer List
  2. Click Export Configuration for each server
  3. Store backup files securely
  4. Test backup restoration periodically

Troubleshooting Common Issues

Server Connection Issues

Possible Causes:
  • Server is actually down or unreachable
  • Firewall blocking connections
  • OpenVPN service not running
  • Network connectivity issues
Solutions:
  1. SSH into the server and check OpenVPN status:
    systemctl status openvpn@server
  2. Check firewall rules:
    ufw status # Ubuntu firewall-cmd --list-all # CentOS
  3. Restart OpenVPN service:
    systemctl restart openvpn@server

Troubleshooting Steps:
  1. Verify server status in admin panel
  2. Check OVPN file integrity
  3. Test connection from admin panel
  4. Verify mobile app has latest server list
  5. Check mobile app logs for specific errors

Performance Optimization:
  • Check server resource usage (CPU, RAM, bandwidth)
  • Monitor concurrent connection count
  • Optimize OpenVPN configuration
  • Consider upgrading server specifications
  • Implement load balancing across multiple servers

Server Management Best Practices

Do's
  • Regular security updates
  • Monitor server performance
  • Backup configurations regularly
  • Use strong passwords/keys
  • Document server configurations
  • Test failover procedures
Don'ts
  • Ignore security updates
  • Use default passwords
  • Skip configuration backups
  • Overload servers beyond capacity
  • Make changes without testing
  • Disable logging and monitoring
Ready for Advanced Topics?

Now that you understand server management basics, explore these advanced topics: