Tutorial: Block All Internet Traffic Except To Trusted Internet Destinations
Learn how to use CloudConnexa to block all internet traffic except approved private applications and trusted internet destinations using Restricted Internet access and access control policies.
Overview
This tutorial shows how to use CloudConnexa to block general internet access while still allowing access to approved private applications and trusted internet destinations.
This configuration is useful for highly secure environments where users should only access:
Approved private applications.
Specific private domains.
Authorized public domains.
Specific application protocols, such as HTTPS.
With this setup:
All internet traffic is tunneled through CloudConnexa.
General internet access is blocked.
Only explicitly allowed destinations remain accessible.
Access control policies are enforced based on user identity and group membership.
This approach is commonly used for:
Government agencies and defense contractors.
Highly regulated organizations.
Managed corporate devices.
Zero-trust remote access environments.
Before you begin
Before starting this tutorial, ensure you have:
A private network containing the applications or services you want to protect.
A Linux system available for Connector deployment within the private network.
Administrative access to CloudConnexa.
Managed user devices that will connect using OpenVPN Connect.
This tutorial includes:
Creating the required network configuration.
Deploying the Connector.
Configuring access policies.
Installing and configuring OpenVPN Connect for testing.
You should also be familiar with basic CloudConnexa concepts, such as:
Step 1: Configure the WPC topology
Configure the WPC to support granular access control policies.
Navigate to Settings → WPC.
Set Topology to Custom.
Save the changes.
Using the Custom topology allows CloudConnexa access policies to be enforced between users, applications, and networks.
Step 2: Create the Management user group
Configure the Management user group to use Restricted Internet access.
Navigate to Users → Groups.
Click Add Group.
Enter the new group details:
Enter the group name,
Management.Select the Region closest to the private network.
Set Internet Access to Restricted Internet.
Define the remaining fields as needed or leave them as the default.
Click Add Group.
With Restricted Internet enabled:
All internet traffic is tunneled through CloudConnexa.
General internet access is blocked.
Only configured Applications and IP Services remain accessible.
Tip
With Restricted Internet configured, you can use Tunnel Bypass to allow specific destinations to route directly to the local network gateway, rather than being blocked or tunneled through CloudConnexa.
This allows precise local routing exceptions while maintaining a locked-down internet access policy. For example, users could still access local intranet resources within a specific subnet while all other internet traffic remains blocked.
Tunnel Bypass is configured per user group from Access → Internet. Refer to About Tunnel Bypass.
Step 3: Create a Network for protected applications
Create a Network representing the private network hosting the protected applications.
Navigate to Networks → Networks.
Click Add Network.
Select Remote Access as the network type for providing remote access to private resources.
Configure the Network settings:
Name — Enter a name (for example,
app_network).Description (optional) — Enter a description.
Configure the Connector settings:
Connector Tunneling Protocol — Leave the default value of OpenVPN selected unless you specifically require IPsec.
Connector Name — Enter a name for the Connector.
Connector Description (optional) — Enter a description for the Connector.
Region — Select the Region closest to the private network.
Click Next.
Step 4: Deploy the Connector
Deploy a Connector within the private network to provide secure connectivity to CloudConnexa.
On the Deploy Network Connector step, select where you will deploy the Connector from the platform drop-down menu. (We select Linux for this tutorial.)
Select the Linux distribution running on the Connector host.
Copy the generated installation script.
Run the installation script on the Linux system within the private network.
Back in the Administration portal, click Generate Token.
Copy the generated token.
When prompted on the Connector host, paste the token to launch the
openvpn-connector-setupprocess.Complete the Connector setup on the Linux system.
Return to the Administration portal and verify that the Connector successfully connects to CloudConnexa.
Step 5: Configure trusted applications
Configure the trusted domains and application access rules that users are allowed to access through CloudConnexa.
Tip
If you don't need to configure Applications, you can continue to the next step to configure IP Services.
On the Add Application step, click Add Application.
In the Add Application dialog, configure the Application settings:
Name — Enter a name for the Application.
Description (optional) — Enter a description for the Application.
Domain — Enter the domain name users are allowed to access.
Configure optional domain settings as needed:
Allow Embedded IP — Enable if you want to allow embedded IP-based domain resolution.
Exact Match — Enable if the Application should apply only to the exact domain entered and not its subdomains.
Add another domain — Add additional domains to the same Application if needed.
Configure the Application Type (Network) protocols:
Select All to allow all protocols.
Select Custom to allow only specific protocols or ports.
If using Custom, select the required protocols or services, such as HTTP, HTTPS, DNS, FTP, TCP, UDP, or ICMP.
Configure specific ports or protocol types if required.
Click Add Application.
Repeat these steps to add additional trusted applications as needed.
Use these steps to add approved public domains such as cnn.com, .mil, .gov, and linkedin.com. These Applications allow users to access only approved, trusted internet destinations through CloudConnexa.
Step 6: Configure IP Services
Configure IP Services to allow access to specific IP addresses, subnets, or protocol-based services hosted within the protected network.
On the Add IP Service step, click Add IP Service.
In the Add IP Service dialog, configure the service settings:
Name — Enter a name for the IP Service.
Description (optional) — Enter a description for the IP Service.
Configure the service definition:
Service Type — Configure the service to allow HTTPS.
Configure the traffic behavior:
Use as Source — Enable this option if the IP Service originates traffic and you want to control its allowed destinations using Access Groups.
Enter the destination details:
IP Address or Subnet — Enter the IPv4 subnet range associated with
app_network.
Click Add IP Service.
This configuration allows HTTPS access to private applications hosted within the protected network.
Together, the configured Applications and IP Services ensure:
HTTPS access to private applications.
Access to approved public domains only.
All other internet traffic remains blocked.
Step 7: Configure Access Groups
Configure Access Groups to control which users can access the protected applications and services.
Note
In this example, a user group named Management is used for management employees who should only access approved applications and trusted internet destinations.
On the Access Groups step, select one of the following:
Select an existing Access Group
Click Add Access Groups to create a new one.
If creating a new Access Group:
Enter a name for the Access Group.
Enter an optional description.
Configure access to the protected Network:
Add the
Managementuser group as the source.Add
app_networkas the destination.
If editing an existing Access Group:
Add the
Managementuser group as the source.Add
app_networkas the destination.
Click Finish to complete the Network Configuration Wizard.
This configuration ensures:
Only authorized users can access protected resources.
Access is restricted to approved applications, services, and destinations.
All other traffic remains blocked by policy.
Step 8: Configure private DNS servers
Configure CloudConnexa to use the organization's private DNS servers so users can resolve private domain names while connected.
Navigate to Settings → DNS.
Click Edit DNS Server Details.
Configure a Custom DNS configuration with the IP addresses of your private DNS servers used by the protected network.
Save the changes.
This allows connected users to resolve private domains hosted within the protected network.
Step 9: Configure manual profile distribution
Disable automatic profile distribution to maintain tighter control over device enrollment.
Navigate to Settings → Users.
Click Edit.
Set Profile Distribution to Manual.
Click Update and Confirm.
With manual profile distribution enabled:
Users can't automatically enroll devices using credentials alone.
Administrators control which devices receive connection profiles.
Step 10: Add user and devices
Add users and provision approved devices.
Add the management employees as users. Refer to Add a User.
Assign each user to the
Managementuser group.To add a device, click the user.
Click the Devices tab.
Click Add Device, and enter the details.
Download the device profile for each approved device.
The device profile is the connection profile for the next step.
Step 11: Configure user devices
Install OpenVPN Connect and configure the approved devices.
Install OpenVPN Connect on each managed device.
Import the downloaded connection profile into OpenVPN Connect.
Configure endpoint management policies to automatically connect to CloudConnexa whenever a network connection is active.
After setup:
Devices automatically connect to CloudConnexa.
Internet traffic is securely tunneled.
General internet access is blocked.
Only approved applications and trusted domains remain accessible.
Tutorial: Block All Internet Traffic Except To Trusted Internet Destinations
Tutorial: Learn About the Levels of Security Afforded by the Use of Various Internet Access Options
Tutorial: Protect Your Users From Malware and Other Cyber Threats
Tutorial: Secure All Internet Traffic by Configuring a Private Network as an Internet Gateway
Tutorial: Use Multiple Geographically Distributed Internet Gateways to Improve Internet Performance
Tutorial: Steer Traffic To Specific Internet Destinations Through CloudConnexa