AWS Client VPN endpoints - AWS Client VPN

AWS Client VPN endpoints

All AWS Client VPN sessions establish communication with a Client VPN endpoint. You can manage the Client VPN endpoint to create, modify, view, and delete client VPN sessions with that endpoint. Endpoints can be created and modified using either the Amazon VPC Console or by using the AWS CLI.

Requirements for creating Client VPN endpoints

Important

A Client VPN endpoint must be created in the same AWS account in which the intended target network is provisioned. You'll also need to generate a server certificate, and if required, a client certificate. For more information, see Client authentication in AWS Client VPN.

Before you begin, ensure that you do the following:

IP address types

AWS Client VPN supports IPv4-only, IPv6-only, and dual-stack configurations for both endpoint connectivity and traffic routing. The following guidance helps you select the appropriate IP address type based on your client device capabilities, network infrastructure, and application requirements.

Endpoint address type

The endpoint address type determines which IP protocols your Client VPN endpoint supports for client connections. This setting cannot be changed after endpoint creation.

Choose IPv4-only when:

  • Your client devices only support IPv4 VPN connections

  • Your security tools are optimized for IPv4 traffic inspection

Choose IPv6-only when:

  • All client devices fully support IPv6 connections

  • You're in networks where IPv4 addresses are depleted

Choose dual-stack when:

  • You have a mix of client devices with varying IP capabilities

  • You're gradually transitioning from IPv4 to IPv6

Traffic IP address type

The traffic IP address type controls how Client VPN routes traffic between clients and your VPC resources, independent of the endpoint's supported protocols.

Route traffic as IPv4 when:

  • Target applications in your VPC only support IPv4

  • You have complex IPv4 security groups and network ACLs

  • You're connecting to legacy systems

Route traffic as IPv6 when:

  • Your VPC infrastructure is primarily IPv6

  • You want to future-proof your network architecture

  • You have modern applications built for IPv6

Endpoint modification

After a Client VPN has been created, you can modify any of the following settings:

  • The description

  • The server certificate

  • The client connection logging options

  • The client connect handler option

  • The DNS servers

  • The split-tunnel option

  • Routes (when using the split-tunnel option)

  • Certificate Revocation List (CRL)

  • Authorization rules

  • The VPC and security group associations

  • The VPN port number

  • The self-service portal option

  • The maximum VPN session duration

  • Enable or disable automatic reconnection on session timeout

  • Enable or disable client login banner text

  • Client login banner text

Note

Modifications to Client VPN endpoints, including Certificate Revocation List (CRL) changes, will take effect up to 4 hours after a request is accepted by the Client VPN service.

You cannot modify the client IPv4 CIDR range, authentication options, client certificate or transport protocol after the Client VPN endpoint has been created.

When you modify any of the following parameters on a Client VPN endpoint, the connection resets:

  • The server certificate

  • The DNS servers

  • The split-tunnel option (turning support on or off)

  • Routes (when you use the split-tunnel option)

  • Certificate Revocation List (CRL)

  • Authorization rules

  • The VPN port number