With Perfect Privacy as your VPN provider you have free access to our VPN client software with many advanced features. Our open sourcesoftware, which is developed completely in-house, will automatically update itself and the configuration files so that you can be sure that your software and configuration is always up to date.
The Perfect Privacy VPN Manager for Windows (Vista/7/8/10) offers a lot of additional features that can improve comfort, speed and security. This document explains how to make best use of the functionality of our software. For more detailed information about the settings options in the VPN Manager, click on our documentation .
Software for Linux, macOS, iOS and Android can be found in our download area for apps .
With the firewall and DNS leak protection you can make sure that all traffic is being sent over the encrypted tunnel at all times.
As soon as you have established an OpenVPN or IPsec connection, all traffic should automatically be routed through this tunnel, even without any firewall protection. However, under some circumstances it is possible that certain software may circumvent this tunnel. To prevent this, the Perfect Privacy VPN client provides three different kill switch levels of firewall protection.
When this option is checked, the firewall protection will be active only whilst an OpenVPN or IPsec connection has been established.
This setting is useful if you want to access the internet without VPN occasionally (e.g. to use personalized services like online banking or shopping).
As soon as you disconnect an existing VPN connection, your internet connection will remain functional but without providing any encryption or anonymity.
With this option you can make sure that traffic will never be sent over an unencrypted connection while Perfect Privacy client software is running. In contrast to the previous setting, the firewall protection will remain active even if no VPN connection is established.
This means that your internet connection will not work if the Perfect Privacy software is running without an established VPN connection. To access the internet without VPN, you will need to exit the Perfect Privacy VPN Manager first.
This setting is useful if you are generally accessing the internet with VPN but want to be able to use an unencrypted connection for specific purposes.
As the name suggests, this setting will activate the firewall protection permanently. This means that your internet connection will only be working when you have established an OpenVPN or IPsec connection.
Even if you exit the Perfect Privacy VPN Manager, the firewall rules will remain in effect. To access the internet without VPN you will first have to lower the protection level or deactivate the firewall protection.
This setting is useful if you want to prevent accessing the internet without VPN by any means.
The option "Firewall local router" restricts access to your local router which can prevent potential IP leaks over SNMP and XSS. We recommend to keep this setting active. However, if you are using a printer or other devices over your local network, you need to deactivate this option to access these devices.
If the VPN Manager crashes for any reason or your operating system restarts without notice, the firewall and DNS leak protection will stay enabled. But if you restart the VPN Client it will detect that it was exited unexpectedly and ask whether the firewall rules should be reset.
The DNS Leak Protection ensures that only Perfect Privacy name servers will be used to resolve domain names so that your ISP cannot determine what websites you are visiting.
The levels of protection are identical to the firewall settings. It is recommended to use the same settings for firewall and DNS leak protection.
With the Perfect Privacy VPN client you can setup a cascaded VPN connection over up to four different servers. Please note that cascading only works with OpenVPN and not with IPsec; make sure that OpenVPN is selected in the "Preferences" tab so that the following steps will work (2 hops are preset by default).
To establish a connection over multiple servers with more than 2 hops, you will need to raise up your hops in the software first. To do so, click on "Preferences" and scroll to "Maximum Cascading Hops".
Choose the number of hops up to a maximum of four. Then go back to "Dashboard".
Cascading itself is easy. After you have established your first VPN connection in the Dashboard, click on "Add Server" and select the next desired server location.
This Server will then be displayed under the first server in the Dashboard.
You can repeat the last step with up to two more servers. Afterwards, the dashboard should display the order of the hops among each other.
If you have established a cascaded connection and you disconnect one of the servers in the middle of the cascade, all connections to servers behind the disconnected one will get dropped as well. The connections to servers that are before the disconnected server remain intact.
For example: You have a cascaded connection via Amsterdam -> Bucharest -> Huenenberg -> Paris. If you disconnect the connection to Huenenberg then you will also loose the connection to Paris. However, the cascaded connection over Amsterdam and Bucharest remains active.
Please note that a cascaded connection will increase the latency (ping time). By how much, will depend on the servers that are used and how many are in the cascade. However, the bandwidth should not be affected so that you can still download with full speed. If you are running software that requires low latency (like online games), the use of a cascaded connection is not recommended.
Perfect Privacy's Stealth VPN allows you to hide your VPN traffic. In some countries, access to the internet is restricted because of nationwide firewall filters. For instance, this applies to Turkey, China, Iran and the United Arab Emirates.
With activated Stealth functionality, all VPN will be obfuscated by SSH, stunnel or obfsproxy and sent over a standard port (SSH, DNS, HTTPS). Even in countries with restricted internet access these blocks are not blocked as they are essential for basic internet functionality. And since the VPN traffic is obfuscated, even deep packet inspection (DPI) cannot detect and block this traffic.
Click on Stealth in the VPN Manager on the left and select a stealth protocol. If you enable Stealth VPN, the client will automatically switch to TCP configuration if that wasn't the case already (Stealth VPN does not work with UDP).
For the obfuscation you can choose between Socks, HTTP, OBFS, Stunnel and SSH. Additionally you can choose the port to use, the options are 22 (SSH), 53 (DNS), 443 (SSL/HTTPS) or a random high port.
Port forwardings are helpful to optimize the speed for certain games or Peer-to-peer software like torrent clients. With Perfect Privacy you can designate up to five specific ports to forward to your computer.
Additionally there are three random ports available for forwarding. To explain the setup of a port forwarding we will use uTorrent as an example application, but generally it should work with every software that supports this functionality.
Port forwarding in Perfect Privacy software is by defaultenabled and forwards to 3 randomly selected ports that you can see in the Dashboard. However, you can also disable it under "Port Forwarding".
You can also check "Enable Custom Port Forwarding" and select a server for port forwarding. For BitTorrent downloads, the fast Dutch and German gigabit servers are particularly suitable. "Amsterdam" we have preset for you. You can also select additional or other ports.
Most programs such as uTorrent require a 1-to-1 port forwarding so that source and destination port is the same. Click on the "Add" button. A new random port will be assigned and appear in the section.
Next you need to configure the forwarded port in the torrent client. In uTorrent this can be done by choosing "Preferences" from the Options menu, then click on "Connection". Enter the forwarded port under "Port used for incoming connections" and click "OK". The port forwarding should now be working.
Please remember that port forwardings are server specific (in our example for the server in Amsterdam). If you are already connected to Amsterdam and add a port forwarding you do not need to reconnect. The port forwarding will automatically be active after a few minutes. You can test the port forwarding in uTorrent by choosing "Setup Guide" in the Options menu.
You can also use the automatic port forwarding for 1-to-1 forwardings. To do so, make sure that "Enable default port forwarding" is activated in the settings under "IP and Ports". When a connection is established, you can see the automatically forwarded ports if you click on "Details" under the corresponding server in the main window. You can use any of the listed ports for applications like uTorrent.
$12.99 billed for one month
€12.99 billed for one month
billed for one year
billed for one year