OpenVPN Access Server AMI

 

Launching OpenVPN Access Server AMI in Amazon Cloud* Looking up OpenVPN Access Server AMI by Name or AMI ID
* Select where you want to Launch your Instance
* Define User Data
* Name your Instance
* Select a Key Pair
* Select a Security Group
* Launch your Instance

* Accessing OpenVPN Access Server Admin UI


- Search for "OpenVPN Access Server" under Community AMIs

-Instance ID's:

US East: ami-31d21358
US West: ami-6925782c
EU West - Ireland: ami-26af9f52
Asia Pacific = ami-841269d6


- Select "Instance Type:"
- Select "Launch Instances Into Your Virtual Private Cloud"
- Select "Subnet ID:"


- Pass "User Data:" to preconfigure the Access Server on your Instance
- Here is an example of available user data

AWS parameters supplied as user-data
---------------------------------------------

Define as:

KEY1=VALUE1
KEY2=VALUE2
...

Do not quote keys or values or use spaces on either side
of the '=' character. All parameters are optional.

public_hostname -- hostname that clients should use to contact the server.

admin_user (default=openvpn) -- Access Server administrative account name.

admin_pw -- administrative account initial password. Note that
this parameter is communicated to the instance via a
cleartext channel. A more secure method would be to ssh
to the instance and use the passwd command to set the
password.

license -- Access Server license key (without a license key, the
Access Server will support up to 2 concurrent connections).

reroute_gw (boolean, default=0) -- if 1, clients will route internet
traffic through the VPN.

reroute_dns (boolean, default=0) -- if 1, clients will route DNS
queries through the VPN.

In addition, the VPC CIDR block (if defined) will be made accessible to
VPN clients via NAT.


- Name your Instance


- Select a Key pair or Create a new one (Note: This key will be used to SSH into your Instance)


- Select a Secuirty Group or Create a new Security Group


- Verify all the value and Launch the Instance

Accessing OpenVPN Access Server Admin UI- Assign an Elastic IP (Public IP) to your Access Server Instance
- Ensure that the security policy allows the following ports inbound
-- TCP 443 (VPN port / shared with Admin UI)
-- TCP 943 (Admin UI Port if 443 is not available)
-- UDP 1194 (VPN UDP port)
- Simply point your browser to https://ip (replace ip with your elastic ip or hostname associated with the IP)
-- Username: openvpn
-- Password: This will be the value of admin_pw that you passed as "User Data:" here