This manual describes the functions and features of the Windows VPN Manager in detail.
If you need help with the installation, go to the installation instructions first.
In the main window of the client you can establish a connection to any server by clicking on the corresponding connector icon. Clicking on the magnifying glass will bring up a window showing the connection log for that server.
On the bottom you can initiate a ping test which shows the latency to all Perfect Privacy servers. By clicking on Settings you can configure the Perfect Privacy VPN Manager.
In the Program settings tab you can configure the startup options:
You can choose whether the Perfect Privacy Manager will start upon Windows boot and you can optionally choose a server to which it will automatically connect to.
In the Serverlist section you can setup different sorting options for the servers in the main window and invert the bandwidth display (shows currently used bandwidth instead of free capacity). And you can choose to use the single server configuration which will display all individual servers instead just the locations and using a random server there.
Any changes in the OpenVPN Settings requires a reconnect.
Under Encryption you can choose the encryption cipher. For instance, you can switch to a weaker cipher like AES-128 if strong encryption is not a priority (streaming, downloads, etc) and your are running VPN on a device with a weak CPU.
If Stealth VPN is not activated (see below), you can choose to switch between UDP and TCP configuration – we generally recommend using UDP for better connection stability.
Under Firewall and DNS you can configure the integrated firewall and DNS leak protection.
Active while tunnel is active: By default the firewall and leak protection is only active when you are connected with the VPN. You can change the setting for the firewall and DNS leak protection independently.
Activate while program is active will keep the protection up whenever the Perfect Privacy client is running. This means if you start the client, your internet connection will be blocked until you connect to Perfect Privacy.
The final setting is Activate permanently which will prevent any traffic over your normal network interface at all times. In this case you only have internet access when connected to a Perfect Privacy server.
Firewall local router: When activated, this will prevent direct access to the router (LAN will still work but you cannot send any packets directly to the router).
Allow GUI to download traffic data without VPN will allow the client to check for Perfect Privacy updates and display the server load in the main window even if firewall protection is activated.
Prevent IPv6 leaks should be activated to prevent IP leaks over IPv6. This is necessary if the ISP is providing IPv6 connectivity. Finally you can manually choose a permanent Perfect Privacy name server by activating the check mark and choosing the server location. By default this is switched off and you will use a random Perfect Privacy name server.
In this section you can choose whether you want to get a randomly assigned IP address from the server and you can set up port forwarding.
Enable default port forwarding will activate three default port forwardings. You can see these in the main window if you click on Details beneath an active VPN connection. If Enable custom port forwarding is active you can enter port forwardings manually. To do so, choose a server in the selection field below and click on Set. Then you can add a forwarding to a port of your choice in the Add forwarding to custom port field.Clicking on Add 1-to-1 port forwarding will add a random port forwarding. Please note that port forwardings will automatically expire after seven days. If you select Automatically renew expired forwardings at the bottom, the saved port forwardings will be automatically renewed after expiration.
Cascading: Here you can activate cascading (multi-hop connections) and choose the maximum number of hops.
Enabling Stealth VPN allows you to tunnel all your VPN traffic through either SSH, stunnel or obfsproxy. You can also switch between ports 22 (SSH), 53 (DNS), 443 (SSL) or a random high port.
This is useful if you are accessing the Internet in countries that restrict internet traffic. It can also circumvent firewall filters in restricted networks (Schools, Universities, Companies, etc), since traffic on port 443 and 53 is usually allowed. When you activate Stealth VPN, the client will switch to TCP configuration and will require a reconnect.
Proxy Settings: If you want to use a proxy server to connect to the the VPN, you can set it up here, including the authentication method and credentials.
In the last tab you can change the debug level and view the debug log in case support is asking you to do so for troubleshooting.
You have the option to manually check for updates, but this is also done automatically when opening the Other tab as well as periodically.
Finally you can reset the networking which will reset the TAP-Adapters as well as the firewall and DNS leak protection. You will usually not need to use this unless support asks you to.