- Services > Compute > EC2 > Instances > Instances
- Check
${VPC_NAME}_jump_box
- Actions > Instance settings > Change termination protection
- Ensure that termination protection is enabled
The Terraform playbook above will execute the following script files/setup_openvpn.sh
to setup an OpenVPN server on the jumpbox.
cat ~/.ssh/id_rsa.pub
and copy outputssh -i ssh_keys/id_rsa ubuntu@<jumpbox public IPv4>
echo '<YOUR SSH pub key>' >> ~/.ssh/authorized_keys
sudo su
apt update -y && apt upgrade -y && reboot
- Login into jumpbox using
YOUR
SSH key - Ensure that
client.ovpn
exists in the home directory sudo su
- Add VPC subnets to OpenVPN server config
echo 'push "route 172.16.21.0 255.255.255.0"' >> /etc/openvpn/server.conf
1. Management subnetecho 'push "route 172.16.43.0 255.255.255.0"' >> /etc/openvpn/server.conf
1. Public subnetecho 'push "route 172.16.50.0 255.255.255.0"' >> /etc/openvpn/server.conf
1. Corp subnetecho 'pull-filter ignore redirect-gateway' >> client.ovpn
1. Tell client to ignore sending all traffic to OpenVPN serversystemctl restart openvpn@server.service
exit
scp ubuntu@<jumpbox public IPv4>:/home/ubuntu/client.ovpn ~/Desktop/client.ovpn
- Download OpenVPN client config
- Import the OpenVPN client config into your VPN client
For this workshop we acquired several doamins but the domain to be used by workshop participants is huntapples.com
. This public domain will be used to generate Let's Encrypt HTTP certificates for Splunk, Elastic, Graylog, and Arkmie.