Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Configure and troubleshoot VPN connections for privacy and remote access.
Configure and troubleshoot VPN connections for privacy and remote access.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
VPN shifts trust from ISP to VPN provider โ provider sees all traffic, not eliminated "No logs" claims are marketing โ unverifiable without independent audits VPN doesn't provide anonymity โ browser fingerprinting, account logins, payment methods still identify Free VPNs monetize traffic data โ if not paying, you're the product Self-hosted VPN exits from your IP โ no privacy benefit, services see your home address
DNS queries can bypass tunnel โ reveals visited sites despite encrypted traffic Test after every setup โ leak test sites show if DNS goes through ISP instead of tunnel System DNS settings may override VPN โ force DNS through tunnel in client settings
Brief VPN disconnects expose real IP โ happens without user noticing Kill switch blocks all traffic when tunnel drops โ essential for privacy use cases Test by forcing disconnect โ traffic should stop completely, not fall back to direct
Misconfiguration sends sensitive traffic direct โ defeats VPN purpose Full tunnel safer default โ split only when deliberately excluding specific apps Local network access often requires split โ printing, casting break with full tunnel
PPTP encryption is broken โ trivially cracked, never use regardless of convenience UDP blocked on some networks โ TCP fallback needed for restrictive firewalls WireGuard uses fixed ports โ easier to block than OpenVPN on 443
WiFi calling fails through most VPNs โ carrier limitation, not fixable Banking apps detect and block VPN โ may need exclusion in split tunnel Battery drain varies significantly โ WireGuard most efficient by large margin
"Connected" but no internet โ usually DNS misconfigured, not routing issue Works on phone not laptop โ local firewall or antivirus interfering Constant reconnects โ try TCP instead of UDP, increase keepalive interval
Exit IP is your home IP โ services see where you live, no geo-bypass benefit Requires static IP or dynamic DNS โ clients can't find changing endpoints Unmaintained server becomes liability โ security updates are your responsibility
Messaging, meetings, inboxes, CRM, and teammate communication surfaces.
Largest current source with strong distribution and engagement signals.