Knowledge Base
Browse Docs
  • Introduction
    1. DefensX
    2. DNS & Web Filtering
    3. Zero Trust Files
    4. Zero Trust Credentials
    5. ADWare Protection
    6. Remote Browser Isolation
    7. Secure Browser Extension
    8. Secure Mobile Browser
  • Management
    1. Role-Based Access Control
  • Deployment
    1. Deployment via RMM
    2. Operating System Agent
    3. Deployment via GPO
    4. Deployment via Intune
    5. VDI and Terminal Servers
    6. Windows Manual Deployment
    7. Mac MDM Deployment
    8. Mac Manual Deployment
    9. Network Deployment
    10. Secure Mobile Browser
    11. Bypass Option
    12. AI Protections
    13. SaaS Restrictions
    14. Bookmark Manager
  • Secure Access (ZTNA)
    1. Configuration
  • Integrations
    1. Azure AD
    2. Identity Providers
    3. SIEM
  • Policy Management
    1. Configuring Policies
    2. Configuring Consents
  • Questions & Answers
    1. Licensing
    2. Incognito Mode
    3. Onboarding
    4. Active Directory
    5. Group Synchronization
    6. Agent
    7. Conflicting Softwares
    8. Reporting
    9. Virtual Desktops
    10. Using the Backend
    11. DNS & Web Filtering
  • Training Videos
    1. Onboarding Videos
    2. Attack Scenarios
    3. MSP Admin Training Series
  • MSP Automation
    1. Overview
    2. External Notifications
    3. Integrations
    4. Partner API
ONLINE DOCUMENTATION

AWS Client VPN and DNS Behavior with DefensX Agent

In this document
  • Overview
  • Windows
    • Enable the DNS Servers Option
    • Enable Split Tunnel
  • macOS

Overview

AWS Client VPN is a fully managed, scalable, and elastic remote access VPN service that allows users to securely connect to AWS VPC resources and on-premises networks from virtually any location.

The service is based on OpenVPN. While most OpenVPN clients are compatible, AWS provides its own client applications for Windows and macOS, which are the recommended options.

Because of how AWS Client VPN handles DNS traffic, there are certain behaviors that require attention. This document explains these behaviors and their implications when used with the DefensX Agent.

Windows

On Windows, if Split Tunnel or Enable DNS Servers is not configured in AWS Client VPN, it is not possible to use DNS servers provided by your local network.

DefensX normally uses DNS servers obtained via DHCP or statically configured on interfaces. However, once AWS Client VPN is connected in full-tunnel mode, it installs filtering rules in the Windows Filtering Platform (WFP). These rules redirect all DNS queries into the VPN tunnel and drop any DNS traffic destined for local interfaces.

wfp
Tip
If you already use a public DNS resolver (e.g., 8.8.8.8), it will continue to work in full-tunnel mode. Only local DNS servers are blocked.

You have two options to overcome this problem:

Enable the DNS Servers Option

  • In the AWS Client VPN configuration, enable DNS Servers and specify one or two resolvers.

enable dns
  • These DNS servers must be reachable through the VPN tunnel.

  • Using a local LAN DNS server here will not work, as the traffic will still be dropped.

  • Once configured, you can continue to operate in full-tunnel mode with DefensX.

Enable Split Tunnel

  • Alternatively, enable Split Tunnel on the AWS Client VPN endpoint.

split tunnel
  • In this mode, AWS Client VPN does not install WFP rules.

  • As a result, DNS queries can continue to use your local LAN DNS servers alongside DefensX Agent.

macOS

On macOS, AWS Client VPN does not install DNS-blocking rules like on Windows. Both full-tunnel and split-tunnel modes work seamlessly with the DefensX Agent.

However, there is a separate known issue which is not related to DefensX Agent:

  • When disconnecting from AWS Client VPN in split-tunnel mode, the default route is not always restored.

  • This appears to be a bug in the current macOS AWS Client VPN client and has been discussed in community forums (https://repost.aws/questions/QUnZb6PUKdSwSY-308ZGvnXQ/no-internet-connection-with-aws-vpn-client-on-macos).

  • If you lose Internet access after disconnecting, verify your routing table by the command netstat -rn and check whether the default route to your local gateway has been restored. If not, you may need to manually re-add it.

www.defensx.com
Secure Industries, Inc 101 Avenue of The Americas, Floor 9 New York, NY 10013