client vpn

Devops·2025년 6월 22일

AWS Networking special

목록 보기
4/16

아키텍처

  1. Clone the easy-rsa repo
    $ git clone https://github.com/OpenVPN/easy-rsa.git $ cd easy-rsa/easyrsa3

  2. Initialize PKI environment
    $ ./easyrsa init-pki

  3. Create new Certification Authority (CA)
    $ ./easyrsa build-ca nopass

  4. Generate the server certificate and key
    $ ./easyrsa build-server-full server.domain.tld nopass

  5. Generate the client certificate and key
    $ ./easyrsa build-server-full server.domain.tld nopass

  6. Copy server and client certificates and keys to one directory
    $ mkdir ~/demo
    $ cp pki/ca.crt ~/demo/
    $ cp pki/issued/server.crt ~/demo/
    $ cp pki/private/server.key ~/demo/
    $ cp pki/issued/client1.domain.tld.crt ~/demo/
    $ cp pki/private/client1.domain.tld.key ~/demo/ $ cd ~/demo

  7. Upload the certificate and keys to ACM
    $ aws acm import-certificate --certificate fileb://server.domain.tld.crt --private-key fileb://server.domain.tld.key --certificate-chain fileb://ca.crt --region ap-northeast-2
    $ aws acm import-certificate --certificate fileb://client1.domain.tld.crt --private-key fileb://client1.domain.tld.key --certificate-chain
    fileb://ca.crt --region ap-northeast-2

CA 생성






vpc

subnet


sg

ec2

vpn


네트워크 연결

권한부여

설치


다운받은 vpn 컨피그 파일에

위 파일 경로 지정

추가로 IGW 이용방법

internet gateway 생성 후

split-tunnel

profile
Cloud Engineer , backend developer

0개의 댓글