setup-ipsec-vpn/aws
S. X. Liang 08c6ab2135
Update cloudformation-template-ipsec (#850)
* Update cloudformation-template-ipsec

- Add "CreationPolicy" to notify the user when the setup script succeeds on the virtual machine. The stack fails if the script fails.
- The timeout is 10 minutes.
- This feature is to be tested on Debian(s). I have personally tested it on Ubuntu20.

* Update README.md

- Remove the notice no longer needed. (The stack will be flagged as CREATE_COMPLETE only when the script succeeds on the VM.)

* Update README-zh.md

- 移除没用的贴士。堆栈将会自动检查脚本是否成功执行。
2020-11-07 14:41:22 -06:00
..
cloudformation-launch-stack-button.png Update docs 2020-08-26 23:53:41 -05:00
cloudformation-template-ipsec Update cloudformation-template-ipsec (#850) 2020-11-07 14:41:22 -06:00
confirm-iam.png Add AWS deployment template (#838) 2020-08-26 22:20:04 -05:00
README-zh.md Update cloudformation-template-ipsec (#850) 2020-11-07 14:41:22 -06:00
README.md Update cloudformation-template-ipsec (#850) 2020-11-07 14:41:22 -06:00
show-key.png Add AWS deployment template (#838) 2020-08-26 22:20:04 -05:00
specify-parameters.png Add AWS deployment template (#838) 2020-08-26 22:20:04 -05:00
upload-the-template.png Add AWS deployment template (#838) 2020-08-26 22:20:04 -05:00

Deploy to Amazon EC2 using CloudFormation (Beta)

Read this in other languages: English, 简体中文.

Note: This deployment template is still in BETA. You may encounter failures during deployment. In that case, please open a new issue.

This template will create a fully-working IPsec VPN server on Amazon Elastic Compute Cloud (Amazon EC2). Please make sure to check the EC2 pricing details before continuing. Using a t2.micro server instance for your deployment may qualify for the AWS Free Tier.

Available customization parameters:

  • Amazon EC2 instance type
  • OS for your VPN server (Ubuntu 20.04/18.04/16.04, Debian 9)

Note: Before using the Debian 9 image on EC2, you need to first subscribe at the AWS Marketplace: Debian 9.

  • Your VPN username
  • Your VPN password
  • Your VPN IPsec PSK (pre-shared key)

Note: DO NOT use these special characters within values: \ " '

Make sure to deploy this template with an AWS Account Root User or an IAM Account with Administrator Access.

Right-click this template link and save as a file on your computer. Then upload it as the template source in the stack creation wizard.

Upload the template

At step 4, make sure to confirm that this template may create IAM resources.

Confirm IAM

Click the icon below to start:

Launch stack

You may choose an AWS region using the selector to the right of your account information on the navigation bar. As soon as the stack's status turns "CREATE_COMPLETE", you are ready to connect to the VPN server. Click the Outputs tab to view your VPN login details. Then continue to Next steps: Configure VPN Clients.

FAQs

How to connect to the server via SSH after deployment?

Amazon EC2 does not allow users to access newly created instances with an SSH password. Instead, users are required to create "key pairs", which are used as credentials for SSH access.

This template generates a key pair for you during deployment, and the private key will be available as text under the Outputs tab after the stack is successfully created.

You will need to save the private key from the Outputs tab to a file on your computer, if you want to access the VPN server via SSH.

Note: You may need to format the private key by replacing all spaces with newlines, before saving to a file.

Show key

Author

Copyright (C) 2020 S. X. Liang

Screenshots

Specify parameters