# VPN Access

<figure><img src="/files/Xd9o9pgZMWA4Z3Q75UYZ" alt=""><figcaption></figcaption></figure>

## Program VPN servers

### 1. Viewing VPNs

1. Go to the program policy page and choose the **Credentials & VPN** tab.
2. You will see a list of VPN servers that the company has created.
3. Click on "View Server Configuration" to see the VPN configuration details.

<figure><img src="/files/p0z2SnM8qZ42QlfZstA5" alt=""><figcaption></figcaption></figure>

## 2. **Downloading VPN Configuration**

1. To obtain the OpenVPN configuration file, click on **"Download Configuration File"** button.

<figure><img src="/files/A1EwCJvOBA3g7qOoRBnR" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
Learn[ how to connect to VPN using the config file here.](#connecting-to-vpn-using-the-config-file)
{% endhint %}

## 3. **Understanding VPN Configuration Details**

1. **Server Name:** This is the name given to the VPN server.
2. **Server Status:** Indicates whether the VPN server is currently running, stopped, or in the process of deploying.
3. **Rate Limit:** This refers to the maximum number of requests per minute allowed through the VPN, ensuring fair usage and server stability.
4. **Countries:** Lists the countries from which you are allowed to access the VPN.
5. **Accessible Assets:** Shows the specific domains (assets) you are permitted to test. Each domain includes:

   * **Asset:** The specific domain or asset you have access to.
   * **Active Time Period:** The time range during which the asset is available for testing.\ <mark style="color:red;">**NOTE: All time range is in UTC timezone.**</mark>
   * **Blacklist Routes:** Any API routes or paths that are off-limits, even when connected to the VPN.<br>

   <figure><img src="/files/jx4D2fVFQu0T5SV3CEsI" alt=""><figcaption></figcaption></figure>

## Connecting to VPN using the config file

Once you have .ovpn file downloaded ( config file ). Follow the below steps:

1. Add the domains/in-scope targets of the program to your /etc/hosts file
   1. Example: *docs.google.com* and *bugbase.in* are the domains/in-scope targets in the VPN configuration. Check [here for the accessible assets](#id-3.-understanding-vpn-configuration-details).
   2. Lookup the DNS resolution of the target domains.<br>

      <figure><img src="https://lh7-us.googleusercontent.com/m4H_HUrSexvS8WZdxTPF3-kCobrUcSswbMMaEhlETRReQNTtnPcfpKubtgZfczaEgDntJ4p-5ppFiakw-1bx-RRAbwOoIKiSWbUU4Ia-Wof_eF5SrjlkCOn96xsepoL6uf9hCcsZ23qVpAAjAI60tR8" alt=""><figcaption></figcaption></figure>

      <figure><img src="https://lh7-us.googleusercontent.com/2q9dSouTrsQiV0UdhOkkvmIa9RE4wh-XXYABxSWLWANLkpNBrEaGGQoAQllF27KBSGUZQiVva1uG6hpxNzY9w2KJbn4eCAzOjGFCeilDsOb_Wzypo89tCYmPNj31fBofqDspsLFOFjZxX4W9GgNnvko" alt=""><figcaption></figcaption></figure>
   3. Add the Addresses to the /etc/hosts for your linux systems or the corresponding local resolution files for Windows and MacOS.<br>

      <figure><img src="https://lh7-us.googleusercontent.com/xqnodjs48p9kmo2JrO_0SbDNwQtf0N2YWxvmLPUovvSUlZCWh3YTyhYIJWapksaAcqu6GwQjhqNNDgwBPyDKFxDZT3Yf74I0g55mjlWN0iqwsPi94BKOead5QoL5ef0_Nmex90Ab3TPVQmmWmJ8WXJ8" alt=""><figcaption></figcaption></figure>
   4. Connect to VPN Server using the .ovpn file with sudo permissions.
   5. Confirm a valid connection by checking the newly assigned IP on the tun interface.
      * \`ip a\` - Linux User
      * \`ipconfig\` - Windows User
      * \`ifconfig\` - MACOS
   6. Confirm additions of the domains/targets to the routing table
      * Linux users can use the `route` command to do this
      * MacOS Users can use \``netstat -rn`\` command to do the same
      * Windows users can use \``route print`\`
   7. In case the target domains are not live or do not have a valid IP address on Lookup, the IP will be separately mentioned in the Program description

{% hint style="info" %}
Please wait approximately 2-5 minutes before starting testing to ensure a smooth experience.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.bugbase.ai/bounty-hunter-guide/programs-directory/vpn-access.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
