View a markdown version of this page

Endpoint security software compatibility - AWS Client VPN

Endpoint security software compatibility

Enterprise endpoint security products such as host-based firewalls, endpoint detection and response (EDR) agents, and antivirus software can sometimes interfere with AWS Client VPN connections. If you experience connectivity issues when using the AWS provided client for Windows, you might need to configure exclusions in your endpoint security software.

AWS Client VPN executable paths

The AWS provided client for Windows installs the following key executables. You might need these paths when configuring firewall rules, application allowlists, or endpoint security policies.

VPN client application
C:\Program Files\Amazon\AWS VPN Client\AWSVPNClient.exe
OpenVPN process
C:\Program Files\Amazon\AWS VPN Client\Resources\openvpn\acvc-openvpn.exe

This is the core process that establishes and maintains the VPN tunnel connection.

Windows service
C:\Program Files\Amazon\AWS VPN Client\AWSVPNClient.Service.exe

Network requirements

The AWS provided client requires outbound network access to the Client VPN endpoint to establish a VPN connection. Ensure that your firewall or endpoint security software allows outbound traffic from the acvc-openvpn.exe process to the port and protocol configured on your Client VPN endpoint.

Configuring endpoint security exclusions

If your endpoint security product interferes with AWS provided client connectivity, review the following exclusion categories with your security administrator:

Process-based exclusions

Add the executables listed in AWS Client VPN executable paths to your endpoint security product's process allowlist or exclusion list.

Network-based exclusions

Allow outbound traffic from the acvc-openvpn.exe process to your Client VPN endpoint's port and protocol.

Path-based exclusions

Exclude the AWS provided client installation directory from real-time scanning or behavioral analysis:

C:\Program Files\Amazon\AWS VPN Client\
Important

Prescriptive configuration instructions for specific third-party endpoint security products are outside the scope of AWS documentation due to variability across product versions and configurations. Consult your endpoint security vendor's documentation for detailed instructions on configuring exclusions for your specific product.