내용으로 건너뛰기

Restrict AWS Client VPN Access

0

We already have a AWS Client VPN Setup, which is working as expected.

My On Prem team is able to connect with AWS Client VPN and access Cloud Resources.

Now my management wants to restrict AWS Client VPN access from our corporate office only.

I tried it by making changes to Security Group associated with my AWS Client VPN endpoint by allowing only access from our corporate office CIDR. But when I tested, it is not working as expected, my other team members was able to access the EC2 over VPN from outside our on-premises network.

Even I tried keeping the entire in-bound rule as blank, but still I was able to SSH into my EC2 instance.

Is there a way, to restrict access for AWS Client VPN, so that it is accessible only from my corporate office, or a way to restrict that the traffic going from VPN should only be from my on-premises network.

1개 답변
2
수락된 답변

Hello.

By enabling the client connect handler and creating a Lambda that rejects connections other than a specific public IPv4 address, you can limit connections to only those from the office.
https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/connection-authorization.html

전문가
답변함 일 년 전
전문가
검토됨 일 년 전
전문가
검토됨 일 년 전
  • Thanks Riku for the prompt response, allow me to check this implementation and get back to you.

  • Hello Riku, it is working as expected, but one small question, then what is the use of the firewall associated with the AWS Client VPN? Which traffic it is controlling?

  • It may be used to control which AWS resources a user can access as described in the following documentation: https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/security-best-practices.html

    Use security groups to control which resources users can access in your VPC. For more information, see Security groups.

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.