The VPN agent is available as a pre-configured virtual appliance. You download it from the dashboard, import it into your hypervisor, and boot it. The agent connects to the platform.
VPN profiles require the Internal network scanning add-on.
System requirements
| Resource | Minimum | Recommended |
|---|
| vCPUs | 1 | 2 |
| Memory | 1 GB | 2 GB |
| Disk | 10 GB | 20 GB |
| Network | 1 adapter with outbound internet access and access to internal targets | |
Downloading the VM
- Go to Settings > VPN Profiles
- Click on your VPN profile and open the deployment menu
- Select Virtual Machine
- Download the format that matches your hypervisor:
| Hypervisor | Format |
|---|
| VMware Workstation / ESXi / Fusion | .vmdk |
| VirtualBox | .ova |
| Hyper-V | .vhd |
Each download is pre-configured with your VPN profile credentials.
Installation
VMware
VirtualBox
Hyper-V
VMware Workstation / Fusion
The .vmdk file is a virtual disk, not a standalone appliance. You need to create a new VM that uses it.
- Go to File > New Virtual Machine
- Choose Custom configuration
- When prompted for the disk, select Use an existing virtual disk and browse to the downloaded
.vmdk file
- Complete the wizard (Linux / Ubuntu 64-bit, 1+ vCPU, 1+ GB RAM)
- Start the VM
vSphere / ESXi
- Open vSphere Client
- Right-click on your datacenter or cluster
- Select Deploy OVF Template
- Browse to the downloaded file
- Follow the deployment wizard, selecting the appropriate datastore and network
- Open VirtualBox
- Go to File > Import Appliance
- Browse to the downloaded
.ova file
- Review settings and click Import
- Start the VM
- Open Hyper-V Manager
- Click Action > Import Virtual Machine
- Browse to the extracted appliance folder
- Select Copy the virtual machine
- Complete the import wizard and start the VM
Network configuration
Connect the VM to a network that has:
- Outbound internet access (TCP port 22 to vpn2.pentest-tools.com)
- Access to the internal targets you want to scan
If you need to scan across VLANs, place the agent in a VLAN with routing to your targets, or use a trunk port with the appropriate VLAN access.
Verifying the connection
After booting the VM:
- The agent starts automatically and connects to the platform
- Go to Settings > VPN Profiles and check that your profile shows as Online
- Use the Test connection button to verify end-to-end connectivity
The default credentials are root / vpnagent007 and tc / vpnagent007. Change these passwords immediately after the first boot.
Network requirements
| Protocol | Port | Destination | Purpose |
|---|
| TCP | 22 | vpn2.pentest-tools.com | Agent tunnel |
No inbound ports need to be opened.
Assigning a static IP
The agent VM uses DHCP by default. If you need a fixed IP to whitelist the agent on internal firewalls, you can assign one at the terminal. The change does not survive a reboot, so you’ll need to reapply it after each reboot.
In VMware, set the network adapter to Bridged mode, not NAT. NAT hides the VM behind the host IP, which means the agent cannot reach internal targets directly.
Boot the VM, then press Ctrl+C at the agent console to get a shell. Run the following commands with your own network values:
ifconfig eth0 <static_ip> netmask <network_mask>
route add default gw <gateway_ip> eth0
Verify the IP is set:
ping <gateway_ip>
ping vpn2.pentest-tools.com
If both pings succeed, run start to restart the agent.
These settings are lost after a reboot. For a permanent static IP, use a DHCP reservation on your router or DHCP server tied to the VM’s MAC address. That way the VM always gets the same IP without manual steps.