WarpSpeed VPN

A VPN server powered by the WireGuard protocol with added support for SSO and more.

Overview

WarpSpeed VPN on Cloudzy pairs a WireGuard-based VPN control panel with SSO support, so you can onboard users with your identity provider and hand out configs in minutes. On our EPYC 4.2+ GHz cores, DDR5 RAM, pure NVMe disks, and a 10 Gbps uplink, peers connect fast and stay stable during busy periods. Hourly billing fits short tests. Long-running teams can lock in monthly or yearly plans with a predictable bill.

Description

WarpSpeed is a web-based VPN server that speaks the WireGuard protocol and adds modern niceties like SSO, real-time bandwidth graphs, audit logs, and auto-generated client configs with QR codes for mobile. On Cloudzy, it comes ready on Ubuntu 20.04, so you land straight in the admin panel and start inviting users.

Access the Web Interface

Open your browser to the instance URL. Your first login uses the secret stored on the server, after which you should set a strong admin password.

  • URL format:
    https://vpn-<server-ip-with-dashes>.warpspeedvpn.com
    Example: https://vpn-127-0-0-1.warpspeedvpn.com

  • Initial credentials
    cat /root/.secrets

  • First login
    Change the admin password immediately.

Using a custom domain is optional. If you prefer one, point your domain’s A record to the server IP, then restart the service:

systemctl restart warpspeed

You can also check status and logs or inspect the config:

systemctl status warpspeed
journalctl –u warpspeed –f
cat /root/warpspeed/warpspeed.conf

Advanced Features

You get a clean control plane on top of WireGuard that’s built for teams and fleets. These highlights keep onboarding simple and operations tidy.

  • SSO with popular IdPs. Works with Google Workspace, Azure AD, Okta, and other SAML 2.0 setups.

  • Auto-generated client configs and QR codes for quick mobile enrollment.

  • Real-time bandwidth monitoring and a security audit log.

  • Uses official WireGuard clients.

  • Scales from a solo test to thousands of devices.

  • Default ports: 443 TCP for the panel and 51820 UDP for WireGuard traffic.

Ease of Use

Deploy, log in, and start inviting users. Power actions, upgrades, and plan changes happen from the Cloudzy dashboard. 

Security & Performance Focus

WireGuard’s lean design cuts handshake overhead, while Cloudzy’s 10 Gbps port and low-latency sites keep peer traffic snappy. NVMe I/O and modern EPYC cores help with faster config syncs, log writes, and concurrent admin sessions. Our uptime target is 99.95%, so remote staff can rely on a steady gateway. 

Full Server Control

Root access lets you script user lifecycles, wire up firewalls, tune MTU, and back up configs on your own schedule. KVM virtualization isolates your instance from noisy neighbors, and dedicated IPs reduce VPN CAPTCHAs and keep allowlists clean.

Powerful Tools

Everything you need to operate WarpSpeed daily is a command or click away. Use these basics out of the box, then add monitoring or backups as you see fit.

  • Preinstalled WarpSpeed admin panel on Ubuntu 20.04.

  • Quick service controls and logs:

systemctl status warpspeed
systemctl restart warpspeed
journalctl -u warpspeed -f
  • Optional hardening and monitoring add-ons you can install, like Fail2Ban or node_exporter.

  • Simple off-server backup recipes for configs and keys.

Global Reach

Pick the closest region to your users and cut round-trip time. Cloudzy operates 10 points of presence across three continents:
 

  • North America: New York City, Dallas, Miami, Utah, Las Vegas

  • Europe: London, Amsterdam, Frankfurt, Zurich (Switzerland)

  • Asia-Pacific: Singapore

Every location offers a 10 Gbps uplink, a Tier-1 carrier mix, and a 99.95% uptime SLA. The only variable is distance.

Application Details

Version: Not Specified

OS: Ubuntu Server 20.04

Minimum RAM: 1 GB

IP Types: IPv4, IPv6

Deploy WarpSpeed VPN Now

Launch your WarpSpeed VPN on Cloudzy, log in to the panel, add users through SSO, and roll out client configs in minutes.

Important: Configuration & Domain Responsibilities

You get full SSH/root access on every OCA. That power also means your changes can break the app. Please read this before tweaking configs.

  • You manage the domain. We don’t sell or host domains/DNS. If the app needs a domain, you must point your domain to the server (A/AAAA/CNAME and MX/TXT if relevant). SSL issuance and many dashboards depend on this being correct.

  • Changing the domain/hostname after installation isn’t trivial. Many OCAs write the domain into configs (.env, reverse proxy, app URLs). If you change it, also update:

    • Reverse proxy (Nginx/Caddy) and TLS certificates

    • App “external URL”/base URL and callback/webhook URLs

    • Any hard-coded links in the app or add-ons

  • Credentials matter. Renaming the default admin, rotating passwords, or changing service ports without updating the app config can lock you out or stop services. Keep credentials safe and in sync across the app, proxy, and any integrations.

  • Nameserver changes can cause downtime. Moving your domain to new nameservers or editing NS records triggers propagation delays. Plan changes, lower TTL ahead of time, and verify A/AAAA records before switching.

  • Firewall/port edits can break access. If you change SSH, HTTP/HTTPS, RDP, or app ports, update firewalls (UFW/CSF/security groups) and reverse-proxy rules accordingly.

  • Email (SMTP) ports are restricted by default. Outbound mail ports (e.g., 25/465/587) may be closed to prevent abuse. If your OCA must send email, request SMTP access. from support or use a transactional email provider (SendGrid/Mailgun/SES) via API or approved SMTP.

  • Email & allowlists. If the app sends mail or receives webhooks, changing IPs/hostnames may affect deliverability or allowlists. Update SPF/DKIM/DMARC and any IP allowlists.

  • Before any big change: take a snapshot. Use the panel’s snapshot/backup first. If a plugin, update, or config edit backfires, you can roll back in minutes.

  • Support scope. We provide the server and the preinstalled OCA image. Ongoing application-level configuration (domains, DNS, app settings, plugins, and custom code) is the user’s responsibility.

Quick rule of thumb: if you touch domain, ports, passwords, hostnames, or proxy/SSL configs, expect to update the app’s settings too, and snapshot first.

 


Access the Web Admin Panel Immediately

URL: https://vpn-<server-ip-with-dashes>.warpspeedvpn.com

Example: https://vpn-127-0-0-1.warpspeedvpn.com

Initial credentials: cat /root/.secrets

On first login, set a strong admin password immediately.

Using a Custom Domain

Point your DNS A record to the server’s IP.

Restart the service:

systemctl restart warpspeed

Service Management

# Check service status
systemctl status warpspeed

# Restart service
systemctl restart warpspeed

# View logs live
journalctl -u warpspeed -f

# View config
cat /root/warpspeed/warpspeed.conf

 

Application Details