- 最新
- 最多得票
- 最多評論
Your VPN connection is probably not configured to use split-tunneling. This means that based on the current configuration, once the VPN connection is established, all traffic going in and out of your instance must pass through the VPN server (including your SSH session) which would prevent any direct connectivity into the instance's IPs that you see in the AWS management console. Simply enable split-tunneling on your VPN connection and you shouldn't get disconnected.
This documentation will explain the concept in good detail, check it out: https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/split-tunnel-vpn.html
Thank you very much for the info. I think you are right. The problem is that I do not have very much experience with this and Create client VPN endpoint is quite complex for me so I do a lot of mistakes :( for example Athentication information is very confusing for me.
Have you been able to resolve your issue? If so, would you select an answer that matched your issue to close out the thread?
Hi, I'd suggest to follow this post: https://dev.to/pimenvibritania/install-vpn-openvpn-server-on-aws-ec2-instance-ubuntu-50nf
In particular, the section providing the user data that you have to provide when creating the EC2 instance: it defines the proper parameters used to configure OpenVPN when installing it.
Best.
Didier
相關內容
- 已提問 1 年前
- 已提問 6 個月前
- AWS 官方已更新 1 年前
- AWS 官方已更新 2 年前
- AWS 官方已更新 8 個月前
- AWS 官方已更新 1 年前
Did you try enabling split tunneling? Did it work?