- Newest
- Most votes
- Most comments
This link has a detailed guidance on internet access using AWS Client VPN : https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/scenario-internet.html . If the VPC has IGW attached, subnet has routes to the internet via IGW, security group alliws internet traffic and the client VPN endpoint route has 0.0.0.0/0 in the subnet, you should be able to access the internet. You can double check by first lauching an instance in the subnet and see if you have access to the internet. Regarding the subnet splitting, you may not be able to do that, but you can attach a secondary CIDR range to the VPC and create subnet subnets using the secondary CIDR range. As a best practise and from scalability and resilliency perspective, it is recommended to have multiple subnets in the VPC and spread them across multiple availability zones.
Relevant content
- Accepted Answerasked 3 years ago
- Accepted Answerasked 2 years ago
- Accepted Answerasked 8 months ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 months ago
Thanks! I was able to add another CIDR block and attach IGW to it. Now I am able to connect with OpenVpn and have internet occasionally. But it is very unpredictable to whether or not internet will work. If I connect(with openVPN) and it works it will remain working but if it doesn't then it will never start. About 4 out of 5 connections have no internet(local redis cluster seems to be connected every time). I enabled logging details on VPN connections in CloudWatch but logs are completely empty