Configuring Aviatrix User SSL VPN¶
Aviatrix provides a cloud native and feature rich client VPN solution. The solution is based on OpenVPN® and is compatible with all OpenVPN® clients. In addition, Aviatrix provides its own client that supports SAML authentication directly from the client.
Only AWS is drawn in the diagram, but this feature applies equally to Azure and Google Cloud.
This document assumes you have set up an Aviatrix Controller. Please see this guide for more details.
There are 2 steps to setting up User VPN connectivity:
You can also watch a video to learn how to setup remote user VPN. The video is not up to date as the product graphics have changed, but the idea remains the same.
Create a VPN Gateway¶
The description in the steps below provides critical fields to get you started. You can make changes to set up advanced features such as MFA and profile based access later.
Log in to the Aviatrix Controller
Launch a gateway with VPN capability
In the left navigation bar, click Gateway
Click on the + New Gateway button at the top of the page.
You will need a public subnet in the VPC where the Gateway will be provisioned. Be sure to provision a new one or identify the correct one prior to starting this step.
Select the Cloud Type and enter a Gateway Name.
Once the Account Name is selected, select the appropriate Region and VPC.
After selecting the desired VPC ID, select the Public Subnet where the Gateway will be provisioned.
Select the Gateway Size (t2.micro is sufficient for most test use cases).
Select VPN Access. Leave the Advanced Options unselected.
Leave the Advanced Options unselected as you can configure it later.
At this stage, you can enable NLB (NLB will be automatically created by Aviatrix.) You can specify the NLB’s name or have it be auto-generated by Aviatrix.
If you wish to create more of such VPN gateways (for example, behind NLBs for load balancing), click Save Template.
Click OK to create the Gateway.
Once you click OK, the Gateway will be provisioned and all the configuration will be applied. This will take a minute or two.
Users can be added manually or authenticated with an existing LDAP server.
Log in to the Aviatrix Controller
Expand OpenVPN® on the left navigation bar
Select VPN Users
Create VPN Users¶
Click + Add New
Select the VPC ID where this user should be attached. The associated load balancer will appear in the LB/Gateway Name
Enter the User Name and User Email. If DUO authentication is enabled, the User Name entered must match the user name of your DUO account. The User Email is optional.
When a user is added to the database, an email with an .ovpn file or .onc (for Chromebooks) will be sent to the user with detailed instructions.
Export VPN Users¶
Import VPN Users¶
Select a csv file to import.
If you are using a MacOS system, the Apple App Numbers can open and edit the csv file. It can export a new csv file from “File”->”Export To”->”CSV”. If you are using the Excel, you can export a new csv file from “File”->”Save As”.
Click the Open button to start the process.
Select the default VPC ID and LB/Gateway Name from the Default VPN User Settings dialog box.
Any empty VPC ID field in a csv file will trigger a new dialog box for selecting the default VPC ID. Any record in a csv file with an empty VPC ID will be filled with the values in the Default VPN User Settings dialog box automatically. If all the VPC ID fields are filled in the the original csv file already, the Default VPN User Settings dialog box will not be triggered.
Check the Import Results
Download VPN User Certificate¶
You can also download the VPN user certificate to your desktop, as shown below. Load this certificate configuration file to your OpenVPN® client on your desktop. You should be able to connect then.
You now have a working Aviatrix VPN Gateway. Users can connect and gain access to their cloud resources.
Detailed audit logs are maintained and available in various logging platforms.
Audit reports are best viewed in the Aviatrix Splunk Application
OpenVPN is a registered trademark of OpenVPN Inc.