Restrict access to application behind ALB

0

We are searching appropriate VPN implementation to provide access to applications behind Application Load Balancer (ALB) only for internal team. We are using internet-facing ALB which exposes several applications like backend API (for CloudFront distribution) and others based on EC2 instances. We have already implemented Client VPN with routing via NAT gateway with Elastic IP address and make filtering by ALB rules based on Host path (DNS provider: DNS records of applications are pointing to ALB) and IP address (Elastic IP address from NAT GW). It means that our developers establish connection with Client VPN which has static outbound IP address. When they try to access applications, ALB checks Host path and IP address then proceed requests. It works correct for full tunnel mode but not with split-tunnel. Is there solution or additional configuration we have to setup to be able using split-tunnel?

1 個回答
0

ALB and CloudFront IP addresses are dynamic and can change. The ip address ranges are documented here (ALB IPs fall under EC2). You could add the routes for the services to the split-tunnel route table. I would recommend creating a private ALB to access the services so that you can control the range of IP addresses.

profile pictureAWS
已回答 1 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南