

conf file that was copied from the other AppVM to the /home/user/ folder so it persist after reboot. Click on the Qubes app menu and go to MullvadVPN and open the Terminal.Click on the Start button in the toolbar to start the AppVM again.On the Basic tab, click on the Networking drop-down list and select MullvadVPN.


Select Linux as the platform and then click on Generate key.Open a web browser and log in to our WireGuard configuration file generator.In another AppVM (not MullvadVPN) that you use for web surfing: Note: In the Qubes app menu, the newly created MullvadVPN AppVM qube will show up as "Service: MullvadVPN" and not "Qube: MullvadVPN" due to its "provides network" setting. Advanced: Check (enable) provides network.Type: Qube based on a template (AppVM).Create a new qubeĬlick on the Qubes app menu and then Create Qubes VM. If you want to use another server then replace the configuration with that. Note: We will use Sweden (se9-wireguard) as the server in this guide. If you want to use OpenVPN instead then see our guide Mullvad on Qubes OS 4. In this guide we will set up a ProxyVM called "MullvadVPN" which will provide network to other AppVMs, using WireGuard.
