1 Answer
- Newest
- Most votes
- Most comments
2
Hello.
By enabling the client connect handler and creating a Lambda that rejects connections other than a specific public IPv4 address, you can limit connections to only those from the office.
https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/connection-authorization.html
Relevant content
- asked 2 years ago
- asked a year ago
- asked 4 years ago
- AWS OFFICIALUpdated 7 days ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
Thanks Riku for the prompt response, allow me to check this implementation and get back to you.
Hello Riku, it is working as expected, but one small question, then what is the use of the firewall associated with the AWS Client VPN? Which traffic it is controlling?
It may be used to control which AWS resources a user can access as described in the following documentation: https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/security-best-practices.html