Documentation
Complete guide to setting up and using PaxCloudVPN
Quick Start
Get started with PaxCloudVPN in 5 simple steps:
- Sign Up: Create an account at paxcloudvpn.com/signup using Google OAuth
- Wait for Approval: Our team will review your beta signup request
- Add a Device: Once approved, log in and add your device from the dashboard
- Download Configuration: Download the WireGuard configuration file (.conf)
- Connect: Import the configuration into your WireGuard app and connect!
Note: PaxCloudVPN is currently in beta. Beta approval is required to access the service.
Supported Platforms
PaxCloudVPN works with the official WireGuard client on all major platforms:
Installation Guides
β οΈ Important - Client-Side Installation:
WireGuard must be installed
on your own device (the computer, phone, or tablet you want to protect). Our servers are already configured - you just need to:
- Install the WireGuard client on your device
- Download your config file from our dashboard
- Import the config into WireGuard on your device
- Connect to start protecting your traffic
Windows
- Download and install WireGuard from wireguard.com
- Log in to your PaxCloudVPN dashboard
- Add a device and download the configuration file
- Open WireGuard and click "Import tunnel(s) from file"
- Select your downloaded .conf file
- Click "Activate" to connect
macOS
- Install WireGuard from the Mac App Store
- Download your configuration from the dashboard
- Open WireGuard and click "Import tunnel(s) from file"
- Select your .conf file
- Toggle the connection on
iOS
- Install WireGuard from the App Store
- Log in to the dashboard on your computer
- Click "Show QR Code" when adding a device
- Open WireGuard on iOS and tap "+"
- Tap "Create from QR code"
- Scan the QR code
- Tap the toggle to connect
Android
- Install WireGuard from Google Play
- Use the same QR code method as iOS, or download the .conf file and import it
Linux
β οΈ These commands run on YOUR Linux machine, not on our server:
Install WireGuard tools on your local Linux computer/laptop where you want VPN protection.
# Ubuntu/Debian - Install on YOUR machine
sudo apt install wireguard
# Fedora/RHEL - Install on YOUR machine
sudo dnf install wireguard-tools
# Download your config from dashboard, then copy it to YOUR machine:
sudo cp ~/Downloads/paxcloud-yourdevice.conf /etc/wireguard/
# Start VPN connection on YOUR machine
sudo wg-quick up paxcloud-yourdevice
# Stop VPN connection on YOUR machine
sudo wg-quick down paxcloud-yourdevice
# Check VPN status on YOUR machine
sudo wg show
π‘ Tip: The kill switch feature (if enabled in your config) also runs on your Linux machine using iptables to block non-VPN traffic locally.
Multi-Region Support
PaxCloudVPN supports multiple geographic regions for optimal performance and privacy.
Available Regions
- π«π· France (EU-FR) - Europe
- πΊπΈ US East (US-EAST) - Coming Soon
- πΈπ¬ Singapore (APAC-SG) - Coming Soon
How to Choose a Region
- When adding a device, select your preferred region from the dropdown
- Or select "All Regions" to create configurations for all available regions
- Download the configuration for your chosen region
- You can add the same device to multiple regions for redundancy
Tip: Choose a region geographically closer to you for better performance, or choose a distant region for enhanced privacy.
Advanced Features
Kill Switch Protection
PaxCloudVPN includes an optional kill switch feature that prevents data leaks if your VPN connection drops unexpectedly.
Platform Support:
- β Linux (requires root/sudo privileges)
- β macOS (requires root/sudo privileges)
- β Windows GUI client (not compatible)
- β Mobile apps (iOS/Android - not compatible)
How to Enable Kill Switch
β οΈ Client-Side Feature:
The kill switch runs on your device (Linux/macOS only), not on our server. It uses local firewall rules (iptables) to block non-VPN traffic on your machine.
- Download your WireGuard configuration file from the dashboard
- Open the
.conf file in a text editor on your device
- Find the commented kill switch rules (lines starting with
#)
- Uncomment the following lines by removing the
# symbol:
PostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
PreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
PostUp = ip6tables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
PreDown = ip6tables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
- Save the configuration file
- Start WireGuard with sudo/root privileges:
sudo wg-quick up wg0
How to Disable Kill Switch
If you want to disable the kill switch and allow traffic when VPN is disconnected:
- First, disconnect your VPN connection:
sudo wg-quick down wg0
- Open your WireGuard configuration file in a text editor
- Find the uncommented kill switch rules (PostUp and PreDown lines with iptables/ip6tables)
- Comment out the kill switch lines by adding
# at the beginning:
# PostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
# PreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
# PostUp = ip6tables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
# PreDown = ip6tables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
- Save the configuration file
- Reconnect to VPN:
sudo wg-quick up wg0
Important: After disabling the kill switch, your traffic will route through your regular internet connection if the VPN disconnects, which may expose your real IP address.
How Kill Switch Works
When enabled, the kill switch uses iptables firewall rules to:
- Block all outgoing traffic that doesn't go through the VPN tunnel
- Allow local network traffic (printers, file sharing, etc.)
- Prevent DNS leaks and IP exposure if VPN disconnects
- Automatically restore normal routing when you disconnect the VPN
Note: With kill switch enabled, you won't have internet access if the VPN is disconnected. This is intentional security behavior to prevent data leaks.
Troubleshooting
Connection Issues
Problem: Cannot connect to VPN
Solutions:
- Verify your device is approved in the dashboard
- Download the latest configuration file
- Check your internet connection
- Make sure no firewall is blocking WireGuard (UDP port 51820)
- Try a different region if available
DNS Leaks
Our configurations include DNS settings to prevent leaks. To verify:
- Connect to PaxCloudVPN
- Visit dnsleaktest.com
- Run an extended test
- Verify all DNS servers belong to PaxCloudVPN or your selected region
Speed Issues
- Try a closer geographic region
- Check your base internet speed (without VPN)
- Ensure no bandwidth-heavy applications are running
- Contact support if speeds are consistently slow
Get Support
Need help? We're here for you:
β Back to Home