AWS EC2 Tiered Appliance Quick Start Guide for Access Server
How to launch the AWS marketplace appliance for Access Server and get your VPN server up and running in minutes with tiered pricing.
Access Server provides an Amazon Web Services (AWS) VPN that you can get up and running within minutes.
Working with AWS, you use their EC2 appliances or Amazon machine images (AMI), which are Linux-based virtual machines running on virtualized hardware. By using the Access Server EC2 instance from their marketplace, you can launch a VPN hosted in the cloud, with the following benefits:
Read on for your guide to getting started with your VPN server on the web.
This guide steps you through launching a tiered instance, where you select an AMI with a set number of connections.
You can choose from several options in the marketplace that come with a set number of connections or the bring-your-own-license (BYOL) Access Server instance.
When you select an instance with a set number of connections, you pay the subscription for those connections through AWS and keep that set amount. Since licensing goes directly through Amazon’s systems, ensure that a custom security group doesn’t block this licensing traffic.
When you select a BYOL instance, you purchase a license separately from us for unlocking connections. You buy a subscription on our site and activate it on your Access Server installation. You can adjust the number of connections up or down at any time.
When you launch a tiered instance AMI, you can start immediately with a set number of connections already purchased. If you need to adjust your connections, you purchase a new tiered instance.
If you have licensing issues with your Amazon tiered instance and it’s only allowing two connections, see our troubleshooting page for AMI tiered instance licensing.
If you’re launching the Amazon AWS EC2 BYOL instance, refer to the separate quick start guide: AWS BYOL.
To launch a new tiered instance with Access Server software:
Select one of the Access Server listings with a specified number of connected devices in the AWS Marketplace and launch.
Review the EULA and software subscription information.
Configure the software with a 64-bit AMI, the latest version of Access Server, and your desired region.
Select your desired instance type. (Refer to Access Server System Requirements for details, if needed.)
Use our predefined access on ports and protocols for the security group.
Select a key pair for securely connecting to your instance (or click to create one).
You're ready to launch.
Tip
For the security group, we recommend using the default group for the marketplace instance but adjusting the sources for some ports to improve security. For your information, these are the ports that need to be open:
TCP 22: For SSH to remotely administer your appliance. We recommend you restrict this port to trust IP addresses by entering a specific subnet in CIDR notation (e.g., 12.34.56.0/24 for a subnet or 11.22.33.44/32 for a single IP address).
TCP 943: The Admin Web UI uses this port, which is also served on port 443 by default.
TCP 945: The clustering functionality uses this port. If you don’t use this feature, you don’t need to open this port. If you do, ensure the cluster nodes can reach each other on their public addresses.
TCP 443: For HTTPS, used by the Client Web UI, the interface where your users sign into the VPN server to retrieve client or config files. We recommend leaving this port open to the source as 0.0.0.0/0. The Access Server is also default enabled on this port unless you turn off this setting. In multi-daemon mode, the OpenVPN TCP daemon shares this port with the Client Web UI, and your clients initiate TCP-based VPN sessions under this port number.
UDP 1194: For the OpenVPN UDP port used by your clients to initiate UDP-based VPN sessions to the VPN server, the preferred way for clients to communicate. Keep this port open for all clients.
Once you launch your new AMI, you need to SSH into the console using an SSH client software and the private key pair you used/created previously.
Use the instance username openvpnas.
Connect with ssh:
ssh -i /path/key-pair-name.pem openvpnas@instance-public-ipv4-address
You can refer to Connect to Access Server via SSH using PuTTY for steps to connect with the PuTTY SSH client from a Windows computer. If you have a different configuration, please follow Amazon’s instructions on connecting to your instance.
Connect to your server, and the Access Server will complete the installation. Access Server then provides the URLs for your Admin Web UI and Client Web UI and the username and password for signing into the Admin Web UI.
Refer to First-time setup for details.
In addition to the steps in the link above, we recommend you assign an Elastic IP address to your instance:
From your AWS console, click Elastic IPs under Network & Security.
Click Allocate Elastic IP address.
Select the pool and enter any tags (optional).
Click Allocate.
After AWS allocates your new IP address, select it, and click Actions > Associate Elastic IP address.
Choose Instance as the resource type, select your Access Server instance from the Instance search field, and select the Private IP address by clicking in the search field and selecting the option available.
Click Associate.
Sign in to your Admin Web UI.
Click Configuration > Network Settings and enter the Elastic IP in the Hostname or IP Address field.
The default time zone may not be the time zone that you're in. If you are in a different time zone, you can change this setting by running this command, then choose your appropriate time zone:
sudo dpkg-reconfigure tzdata
We recommend installing the NTP client to keep the time synchronized, but it's especially important for those that plan on using multi-factor authentication with TOTP. Run this command:
apt-get install ntp
If your VPN setup consists of a site-to-site setup between your cloud instances and your machines on-premises, ensure you disable source destination check protection on Amazon; otherwise, routing won’t function properly.
Turn off source/destination checks:
Right-click on the VPN instance.
Select Change Source/Dest.
Check and make sure the status is Disabled.
Source/destination checking can also block traffic if you want VPC data to go directly to the IP addresses of your VPN clients in the VPN client subnet. For that use case, turn off the check as well.
Access Server’s default routing uses network address translation (NAT). Traffic originating from the VPN clients appears to come from the local IP address of Access Server with NAT, and this is simpler than setting up routing.
However, when using NAT, your traffic from the VPC itself can’t directly access a VPN client as the NAT engine prevents direct contact. You must configure routing instead of NAT to allow direct access to a VPN client.
To access this configuration:
Sign in to the Admin Web UI.
Click Configuration > VPN Settings.
Scroll to the Routing section, where you can click Yes, using Routing.
Configure your subnets for your network.
After setting up routing, the source IP address of packets coming from the VPN clients is kept intact, and direct access from the VPC network to the VPN client subnet is possible. However, because the VPC doesn’t automatically recognize the VPN subnet within the VPN instance, it doesn’t know how to send the return traffic back to the instance. To correct this problem, add a static route in the Amazon routing table for your VPC so that the return traffic flows properly. Refer to Amazon’s AWS VPC routing documentation: Route tables for your VPC (Amazon).
We recommend updating your Linux OS. From the time we've generated the appliance and you've downloaded and are using it, there are likely a number of updates. To make sure your appliance OS is up to date, execute the following commands:
sudo apt-get update sudo apt-get upgrade