Skylaski VPN provides VPN services using the WireGuard VPN protocol. We chose WireGuard for it’s celebrated speed, security, and simplicity. WireGuard is relatively new to the world compared to other VPN technologies, but is well supported across a variety of platforms and has proven to be very reliable.
Skylaski VPN is constantly developing easy to use client software that is available today. See our Apps to get your device up and running, but if your platform isn’t supported yet, keep on reading.
Even without our App, you can still get Skylaski VPN working using readily available, free, open source software from the official WireGuard project.
Using official WireGuard software, the setup is still very quick and easy.
The steps are:
- Download and Install a VPN Client
- Generate Encryption Keys
- Get a Client Configuration
- Load Configuration and Connect
The first step is to make sure you have a VPN client installed.
Head over to the WireGuard Project Site to download and install a WireGuard client for your platform. Once you’re finished with this step come back to this guide to continue setting up your Skylaski VPN connection.
To setup a proper WireGuard connection you’ll need some encryption keys in order to secure it.
You can use our tool accessible from your profile via Profile → Tools.
Click the ‘Generate’ button to get a unique key-pair that includes a Private and Public key.
Copy both of these keys to a secure location on your device, we’ll use them later when generating a configuration.
Once your public and private key are secured head over to your Devices and look for ‘Setup A New Device’.
Here you’ll enter your Public Key generated in a previous step, choose your location and setup tracker blocking (enabled by default).
Once you’ve entered your Public Key and selected the desired options, click ‘Create Device’ to generate a configuration. When finished your configuration will be presented at the top of the screen.
As noted below, you’ll need to save this configuration to your device. Open your favorite text editor and paste in the text from
PersistentKeepalive = 21.
This configuration is not yet complete. The same private key generated earlier alongside your public key, needs to be added. Be sure to maintain a space on either side of the
When finished your configuration should look like the following.
[Interface] Address = 10.223.192.81/32 , fdd7:2413:ae79:12d8::108b:eb5b/128 MTU = 1280 DNS = 220.127.116.11 PrivateKey = QDgHQKAldW9pp3NKaSxeppkmgAUFVI7RstQ69B92uE8= [Peer] PublicKey = 6ojZ7lZBH+BTFc28SblexjZPOcC3KQ/n2XeEONWarTU= Endpoint = 18.104.22.168:51820 AllowedIPs = 0.0.0.0/0 , ::0/0 PersistentKeepalive = 21
Save your configuration using a name WireGuard accepts like
Depending on your platform this may look a little different, but the steps are the same. This is what it looks like on Windows 10.
First open WireGuard. You’ll see a button in the middle right side that says ‘Import tunnel(s) from file’.
Click the ‘Import tunnel(s) from file’ button to continue. Find your
wg0.conf file you saved earlier and load it up!
Once loaded, WireGuard will show you the tunnel and some various information about it.
WireGuard won’t automatically connect, so in order to connect all you have to do is click ‘Activate’. After a second the tunnel will be connected and you’re finished!
From here you can test your connection by checking your IP Address.
If you have any issues loading your configuration file here are some things to check.
- Compare your configuration to the one in this example. While the values after
=will be different, every line should exist on it’s own and have a space on either side of the
=. The configuration is case-sensitive as well so make sure the right letters are capitalized.
- Make sure you saved the file properly. The filename is important. While there’s just text within it, the filename (including extension) should end with
.txtor anything else.
This should never happen, but just in case, here are some steps you can take.
- Double check your private and public key, make sure they’re accurate.
- If you’re still unable to connect, head back to your Devices page, delete the device, then re-create it. Start from the beginning, generating new encryption keys along the way.