3 minute read

In many development and testing environments, secure remote access is a daily requirement. Whether we are connecting to staging servers, internal QA systems, or Windows-based test machines, having a properly configured VPN and remote desktop client is essential.

Windows Remote On Ubuntu
Windows Remote On Ubuntu

In this guide, we will walk through:

  • Installing the SSTP plugin for Network Manager
  • Configuring an SSTP VPN connection (using example placeholders)
  • Adding a custom CA certificate to the system trust store
  • Installing Remmina with RDP support for Windows access

This tutorial is designed for developers and software testers working on Debian/Ubuntu-based systems who need a reliable and secure setup process.

1. Install SSTP Plugin for Network Manager

Secure Socket Tunneling Protocol (SSTP) is commonly used in enterprise environments because it operates over HTTPS (TCP port 443), making it firewall-friendly and secure.

Ubuntu’s Network Manager supports SSTP through a dedicated plugin.

Step 1: Update Package Index

sudo apt update

Keeping the package list updated ensures we install the latest available version.

Step 2: Install the SSTP Plugin

sudo apt install network-manager-sstp

This package enables SSTP VPN support directly inside the Network Manager graphical interface.

What Gets Installed

  • SSTP protocol support
  • PPP dependencies
  • Integration with GNOME network settings

If the SSTP option does not immediately appear, logging out and back in (or restarting Network Manager) usually resolves it.

2. Configure the SSTP VPN Connection

After installation, we configure the VPN using Ubuntu’s graphical interface.

Step-by-Step Configuration

  1. Click the network icon in the top-right corner.
  2. Go to Settings → Network → VPN.
  3. Click Add VPN.
  4. Choose Secure Socket Tunneling Protocol (SSTP).

Now enter the VPN details using placeholders provided by your organization:

  • Gateway: 203.0.113.10
  • Username: dev_user
  • Password: your_password_here
  • Leave other settings as default unless instructed otherwise.

The gateway and username above are examples. Always use credentials provided by your infrastructure or IT team.

Click Add to save the configuration.

3. Connect to the SSTP VPN

To initiate the connection:

  1. Click the network icon.
  2. Navigate to VPN Connections.
  3. Select your configured SSTP connection.

If successful, the VPN will establish within a few seconds.

Verify the Connection

We can verify the VPN interface:

ip a

Look for a ppp interface.

We can also check our public IP:

curl ifconfig.me

If connected, the IP address should reflect the VPN network.

4. Copy CA Certificate to System Trust Store

In many corporate environments, VPN servers use custom Certificate Authorities (CAs). Without trusting this CA, TLS validation may fail.

To fix this, we add the CA certificate to the system trust store.

Step 1: Copy the Certificate

sudo cp your_certificate.crt /usr/local/share/ca-certificates/your_certificate.crt

Place the certificate in the recommended directory for local CAs.

Step 2: Update the Trust Store

sudo update-ca-certificates

This command:

  • Scans for .crt files
  • Updates system certificates
  • Makes the CA trusted across the OS

Why This Is Important

After updating:

  • Network Manager can validate VPN certificates
  • Tools like curl, git, and wget trust internal HTTPS services
  • We avoid TLS and SSL verification errors

5. Install Remmina with RDP Plugin (For Windows Access)

Many QA and development workflows require connecting to Windows servers. Remmina is a flexible remote desktop client that supports RDP.

Install Remmina and RDP Plugin

sudo apt install remmina remmina-plugin-rdp -y

This installs:

  • The Remmina client
  • RDP support for Windows remote access

6. Connect to a Windows Machine via RDP

After installation:

  1. Open Remmina.
  2. Click + to create a new connection profile.
  3. Select RDP - Remote Desktop Protocol.
  4. Enter:

    • Server IP (e.g., 192.0.2.25)
    • Username
    • Password
  5. Save and connect.

Best Practices for Development Teams

  • Use descriptive connection names (e.g., QA-WIN-SERVER)
  • Save credentials securely
  • Disable unnecessary features (like sound redirection) to reduce bandwidth
  • Use lower color depth if performance is an issue

Troubleshooting Common Issues

VPN Fails to Connect

  • Verify gateway address
  • Confirm credentials
  • Check connectivity:

    nc -zv 203.0.113.10 443
    
  • Inspect logs:

    journalctl -u NetworkManager
    

Certificate Errors

  • Ensure the file ends with .crt
  • Re-run sudo update-ca-certificates
  • Confirm the correct certificate was provided

RDP Displays Black Screen

  • Lower color depth
  • Disable hardware acceleration
  • Confirm Windows RDP is enabled

Conclusion

By installing the SSTP plugin for Network Manager, configuring a secure VPN connection with placeholder credentials, trusting the required CA certificate, and installing Remmina with RDP support, we establish a reliable remote-access environment on Ubuntu.

This setup allows us to:

  • Securely access internal networks
  • Avoid TLS certificate issues
  • Connect to Windows test machines
  • Maintain a consistent development workflow

With this configuration in place, our Linux system becomes a secure and productive gateway into enterprise infrastructure—ready for development, testing, and remote administration tasks.

Leave a comment