This Stack will add a VPN server to your CloudCoreo deployment
This will bring up an openvpn server in the private subnet in an autoscale group behind an elb. The elb will forward tcp port 1199 to the vpn box so that the endpoint will remain static even in the event of a server failure and autoscale group relaunch.
There are a few things to know about this server.
The first time this comes up, it will find there are no keys generated for the system. When that discovery is made, it will generate all necessary keys and upload a zip file to the specified s3 bucket.
In addition to uploading the keys, there will be an initial user with which you may log in. The username is vpnadmin and the password is generated randomly and included in the zip file in the s3 bucket.
Backups will be performed every hour. The usernames allowed in the system are simply users on the linux OS. (useradd command generated)
- description: the name of the bucket in which we should back things up
- description: the region where there vpn backups bucket was created
- description: the name of the bucket in which we should retrieve and/or store vpn keys
- description: the region where there vpn key bucket was created
- description: What key should the vpn instance be launched with?
- description: the dns entry for the zone (i.e. example.com)
- description:
- default: my-private-subnet
- description: the name to give to the private route
- default: my-private-route
- description: the name to give to the public route
- default: my-public-route
- description:
- default: my-public-subnet
- description:
- default: my-vpc
- description: the cron schedule for backups
- default: 0 * * * *
- description:
- default: test
- description:
- default: 10.0.0.0
- description:
- default: 0.0.0.0/0
- description: the region we are launching in
- default: PLAN::region
- description: the dns entry to create for the VPN server (.)
- default: vpn
- description:
- default: t2.micro
- description: the name of the vpn server to launch
- default: vpn
- description: The cidrs from where you should be able to ssh in
- default: 10.0.0.0/8
- description: This is the cidr of the network cidr the VPN should on your network. i.e. all traffic to this cidr will be routed through the VPN. set to 0.0.0.0 for all traffic. This works in conjunction with the VPN_ROUTING_MASK variable.
- default: 10.0.0.0
- description: This is the cidr mask of the network cidr the VPN should on your network. i.e. all traffic to this cidr will be routed through the VPN. set to 0 for all traffic. This works in conjunction with the VPN_ROUTING_CIDR variable.
- description: the ami id for the VPN server
- Self-Healing
- Networking
- VPN
- Network