OPENVPN CLOUD IS LIVE: TRY TODAY FOR FREE
User Guide – Site-to-Site Private Connectivity

Overview

Owen has completed the signup process as shown here. During the signup process, Owen selects technop.openvpn.cloud as the web domain for the user portal. This domain uniquely identifies the VPN that will be set up by Owen and is used by Connect Client applications (VPN Client software) to identify the VPN that it needs to connect to.

Owen wants to create a full-mesh private network among two private networks (represented by AWS VPC in separate AWS Regions) and enable remote access to those networks for himself and employees.

Illustration of VPN

North California Network

North California network is using the 172.31.0.0/16 subnet. Owen needs to configure this as the Network subnet that needs to be available from OpenVPN Cloud.

Configure Networks

Owen configures both networks using the Admin portal as shown below. See, Adding A Network

Install Connector in North California Network

Owen installs Connector on one of the instances in the network and uses the respective Connector profile to get the instance connected to OpenVPN Cloud. See, Installing Network Connector – Linux

Add routes in North California Network

Prior to adding routes, Owen disables ‘Source/Destination’ Check on the network interface of the instance running the Connector.

He enables forwarding in the Linux kernel of the instance running the Connector

On the command line, do

sed -i 's/#net.ipv4.ip_forward=1/net.ipv4.ip_forward=1/g' /etc/sysctl.conf 
sysctl -p

Next, he adds routes, in the route table associated with the VPC, for the Oregon Network and the OpenVPN Cloud VPN subnets using the instance running the Connector as the next-hop Target.

Install Connector in Oregon Network

Owen installs Connector on one of the instances in the network and uses the respective Connector profile to get the instance connected to OpenVPN Cloud. See, Installing Network Connector – Linux

Add Routes in Oregon Network

Prior to adding routes, Owen disables ‘Source/Destination’ Check on the network interface of the instance running the Connector.

He enables forwarding in the Linux kernel of the instance running the Connector

On the command line, do

sed -i 's/#net.ipv4.ip_forward=1/net.ipv4.ip_forward=1/g' /etc/sysctl.conf 
sysctl -p

Next, he adds routes, in the route table associated with the VPC, for the North California Network and the OpenVPN Cloud VPN subnets using the instance running the Connector as the next-hop Target.

Test Connectivity

Now, Owen can connect his laptop to OpenVPN Cloud using the Connect Client (see importing profile section, User Guide – Configuring a VPN for Secure Access to Internet ), and reach any instance in both of the private networks. As shown below, instances in private networks can also reach each other.