

Go to Elastic IP, allocate a new address, and associate it to the network interface created in (6).Security Group: Leave the default options or select based on your requirements.Tag Instance: Leave the default options or select based on your requirements.Storage: Leave the default options or select based on your requirements.Network Interfaces: Leave eth0 as is, and add a secondary network interface eth1 (“Add Device”) here select the network interface created in (6) and select to the private subnet created in (3.2).


We will create one subnet, 10.1.1.0/24, which will be assigned to this route table. The VPN tunnel will route traffic originating from this portion of the network. Instances within this route table will not be reachable from the Internet. The default gateway of this subnet is the VPC-RTR’s eth1 interface ( ENI). Private Networks Route Table – This is the private route table where the VPC-RTR has its secondary network interface (eth1/ENI).During this procedure will create one subnet, 10.1.0.0/24, which will be assigned to this route table. The VPN tunnel will not route traffic originating from this portion of the network. Instances within this route table will be reachable from the Internet via the IGW interface if an Elastic IP address is assigned to them. Public Networks Route Table – This is the DMZ route table where the VPC-RTR has its primary network interface (eth0).Here are some more details about this setup: Local Area Network – Inside the LAN, a Linux server (LAN-RTR) will be configured as VPN endpoint that will receive and route across the VPN tunnel all the traffic destined for the 10.1.0.0/16 virtual network.Īt the end of this procedure we have the VPC configured this way: OpenVPN tunnel – The tunnel is established across the Internet between the Linux instance on AWS and the physical server (LAN-RTR) installed on your LAN. Inside the VPC, a Linux instance (VPC-RTR) will be configured as VPN endpoint that will receive and route across the VPN tunnel all the traffic destined for the 10.2.0.0/16 physical network. Virtual Private Cloud – All the Amazon instances launched inside the VPC will get an address from the 10.1.0.0/16 pool. Here are more detailed descriptions of the components: One Linux server running Debian or Ubuntu on your LANĪt the end of this how-to you will be able to extend your local area network (LAN) to a virtual private cloud and interconnect your internal systems with your Amazon cloud instances.One Amazon Web Services account (you can create one here).To implement this configuration you will need: The tunneling technology used is OpenVPN. In this article I would like to present a simple setup that allows you to interconnect a local area network to a Virtual Private Cloud (VPC) hosted on Amazon Web Services (AWS) with a private VPN tunnel.
