
AWS Client VPN and DNS Behavior with DefensX AgentIn this document
OverviewAWS Client VPN is a fully managed, scalable, and elastic remote access VPN service that allows users to securely connect to AWS VPC resources and on-premises networks from virtually any location. The service is based on OpenVPN. While most OpenVPN clients are compatible, AWS provides its own client applications for Windows and macOS, which are the recommended options. Because of how AWS Client VPN handles DNS traffic, there are certain behaviors that require attention. This document explains these behaviors and their implications when used with the DefensX Agent. WindowsOn Windows, if Split Tunnel or Enable DNS Servers is not configured in AWS Client VPN, it is not possible to use DNS servers provided by your local network. DefensX normally uses DNS servers obtained via DHCP or statically configured on interfaces. However, once AWS Client VPN is connected in full-tunnel mode, it installs filtering rules in the Windows Filtering Platform (WFP). These rules redirect all DNS queries into the VPN tunnel and drop any DNS traffic destined for local interfaces. ![]()
You have two options to overcome this problem: Enable the DNS Servers Option
![]()
Enable Split Tunnel
![]()
macOSOn macOS, AWS Client VPN does not install DNS-blocking rules like on Windows. Both full-tunnel and split-tunnel modes work seamlessly with the DefensX Agent. However, there is a separate known issue which is not related to DefensX Agent:
|
||