- Newest
- Most votes
- Most comments
Your VPN connection is probably not configured to use split-tunneling. This means that based on the current configuration, once the VPN connection is established, all traffic going in and out of your instance must pass through the VPN server (including your SSH session) which would prevent any direct connectivity into the instance's IPs that you see in the AWS management console. Simply enable split-tunneling on your VPN connection and you shouldn't get disconnected.
This documentation will explain the concept in good detail, check it out: https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/split-tunnel-vpn.html
Thank you very much for the info. I think you are right. The problem is that I do not have very much experience with this and Create client VPN endpoint is quite complex for me so I do a lot of mistakes :( for example Athentication information is very confusing for me.
Have you been able to resolve your issue? If so, would you select an answer that matched your issue to close out the thread?
Hi, I'd suggest to follow this post: https://dev.to/pimenvibritania/install-vpn-openvpn-server-on-aws-ec2-instance-ubuntu-50nf
In particular, the section providing the user data that you have to provide when creating the EC2 instance: it defines the proper parameters used to configure OpenVPN when installing it.
Best.
Didier
Relevant content
- asked 8 months ago
- asked 3 years ago
- AWS OFFICIALUpdated 8 months ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 7 months ago
Did you try enabling split tunneling? Did it work?