AWS CLI and AWS Console web UI allow you to add a vpc-id and security groups. I couldn’t find any examples or documentation on this with aws_ec2_client_vpn_endpoint
and
associated aws_ec2_client_vpn_network_association
. Any further information on this?
Note: Fictitious values used below to redact private infra details…
{
"ClientVpnEndpoints": [
{
"ClientVpnEndpointId": "cvpn-endpoint-01234567890abcdef",
"Description": "",
"Status": {
"Code": "pending-associate"
},
"CreationTime": "2020-10-09T02:27:48",
"DnsName": "*.cvpn-endpoint-01234567890abcdef.prod.clientvpn.us-east-2.amazonaws.com",
"ClientCidrBlock": "192.168.0.0/16",
"DnsServers": [
"192.168.0.2"
],
"SplitTunnel": false,
"VpnProtocol": "openvpn",
"TransportProtocol": "udp",
"VpnPort": 1194,
"ServerCertificateArn": "arn:aws:acm:us-east-2:166679463959:certificate/e854cdce-b077-4f33-a743-fcb1171f349e",
"ServerCertificateArn": "arn:aws:acm:us-east-2:012345678912:certificate/abcdef01-abcd-abcd-abcd-abcdef012345",
"AuthenticationOptions": [
{
"Type": "certificate-authentication",
"MutualAuthentication": {
"ClientRootCertificateChain": "arn:aws:acm:us-east-2:012345678912:certificate/01234567-890a-bcde-f012-3456890abcde"
}
}
],
"ConnectionLogOptions": {
"Enabled": true,
"CloudwatchLogGroup": "my-amazonvpn",
"CloudwatchLogStream": "my-amazonvpn"
},
"Tags": [
{
"Key": "Name",
"Value": "my-happy-vpn"
}
],
"SecurityGroupIds": [
"sg-0123456789abcdef0"
],
"VpcId": "vpc-0123456789abcdef0"
}
]
}