
Overview

Product video
This offering is locked to 5 connections. If you need the flexibility to scale, we recommend our PAYG listing instead: https://aws.amazon.com/marketplace/pp/prodview-f5qcwyw2gy256
Access Server for AWS delivers the best-of-breed VPN solution for secure remote access, site-to-site VPN and secure SaaS access for organizations of all sizes. Our award-winning open-source protocol is the industry standard for accessing private information securely, ensuring safe access to internal data and delivering zero-trust network access.
Access Server for AWS is a self-hosted VPN software that provides rapid deployment for secure remote access with a built-in web-based user interface for ease of use. Access Server provides an extra layer of security, with end-to-end encryption and granular access control to limit the risk of exposed data for remote users, site-to-site connectivity, or securing SaaS access and IoT devices. Certificate PKI management provides simplified installation and configuration. Additional features include balancing traffic across a cluster of Access Servers with DNS round robin and tunneling only your private traffic, optimizing your network bandwidth and making your environment more secure.
Access Server for AWS technical support and onboarding is available 24/7. Schedule a demo at https://hs.openvpn.net/request-demo .
OpenVPN client software accommodates Windows, macOS, Linux, Android, iOS, and ChromeOS environments. Includes a built-in local authentication system and support for authentication with Active Directory, PAM, LDAP, RADIUS, SAML, and even a custom Python3 authentication module is possible.
Our subscription model is based on the number of concurrent connected devices. The tiered instance type comes in various sizes and is locked to the specific size. The cost for the software subscription for the chosen tier is charged directly through Amazon. This means these instances get a subscription automatically at launch and are suitable for automated launch and autoscaling scenarios.
Highlights
- This offering is locked to 5 connections. If you need the flexibility to scale, we recommend our PAYG listing instead: https://aws.amazon.com/marketplace/pp/prodview-f5qcwyw2gy256
- A self-hosted scalable secure remote access, site-to-site VPN solution to give your employees the freedom to work securely with end-to-end encryption for accessing SaaS, the internet, and company resources. Essential security controls needed to evolve from a trusted-perimeter security model to an identity-based ZTNA approach.
- OpenVPN client software that accommodates Windows, macOS, Linux, Android, iOS, and ChromeOS environments. Includes a built-in local authentication system and support for authentication with Active Directory, PAM, LDAP, RADIUS, SAML, and even a custom Python3 authentication module is possible.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
- ...
Dimension | Cost/hour |
|---|---|
t3.small Recommended | $0.096 |
t2.micro | $0.096 |
t3.micro | $0.096 |
d3.8xlarge | $0.096 |
c5ad.xlarge | $0.096 |
c5n.18xlarge | $0.096 |
c5a.8xlarge | $0.096 |
c6i.12xlarge | $0.096 |
r5.metal | $0.096 |
c5ad.2xlarge | $0.096 |
Vendor refund policy
Refunds are not provided, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
For instructions on using the OpenVPN Access Server appliance on the AWS Marketplace, please visit https://openvpn.net/vpn-server-resources/amazon-web-services-ec2-tiered-appliance-quick-start-guide/ .
Resources
Vendor resources
Support
Vendor support
For product activation to succeed your firewall and/or security group settings must allow connections to our online activation servers - details can be found in our FAQ section here: https://openvpn.net/aws-frequently-asked-questions/ . If you experience any problems, you can register for a free account on our website here: https://openvpn.net/support-for-aws/ and then open a support ticket so our technical team can assist you.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Standard contract
Customer reviews
Enables Anywhere Access Despite IP Restrictions.
Secure remote access has enabled single sign-on and centralized control for all company users
What is our primary use case?
I am currently working with OpenVPN Access Server for approximately 20 users. We use OpenVPN Access Server to connect to our company services from one IP address to secure these connections. OpenVPN Access Server is very lightweight, and the installation process is equally lightweight.
Single sign-on is very important for me because it is one of the principles of zero-trust architecture. In this architecture, each user has minimum privilege and uses one login and one password to connect to any services.
How has it helped my organization?
It is very easy to install and set up OpenVPN Access Server within the organization. Installing and using this service is very easy. OpenVPN Access Server provides a very detailed guide for installing it on your own server and integrating it with Google or Microsoft, making the process straightforward.
What is most valuable?
The best feature of OpenVPN Access Server is single sign-on, which is a very secure feature for information security.
Access control is effective in providing precise access to user groups and devices. In our company, we use a couple of services to control devices and users. One of these is a mobile device management solution such as Miradore or JumpCloud , and another solution to secure the channel to connect to company services is OpenVPN Access Server. Through the admin console, we can manage user rights and connections to company services.
What needs improvement?
I have no answer regarding what I would like to see improved in OpenVPN Access Server. I am not aware of future features, but the current features in the interface and the functionality of OpenVPN Access Server are very good. Everything in OpenVPN Access Server is very good, but the price is expensive.
For how long have I used the solution?
I have been working with OpenVPN Access Server for around three years across two companies where I worked.
What do I think about the stability of the solution?
I find it very stable. All the issues were from my own mistakes, not from OpenVPN Access Server.
What do I think about the scalability of the solution?
I find OpenVPN Access Server scalable and have not seen any limitations with it. The stability was very good, and I have no issues or problems. When we deploy and install OpenVPN Access Server, the principle is to install and forget.
How are customer service and support?
Regarding technical support for OpenVPN Access Server, it is very good and very fast. Any issue was solved in five to ten minutes, or they sent me a description to solve my issue when I could not determine the problem myself. The technical support is very fast and very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used L2TP/IPsec on my home router, and I am currently testing WireGuard for my home network because WireGuard is faster than OpenVPN Access Server.
How was the initial setup?
The user interface of OpenVPN Access Server is very easy. It has two buttons: a download button and a cancel button, along with a checkbox to download only the profile. There are no additional settings, only log out and download options with the checkbox. This is a very simple interface that is very good for users, very good for admins, and very good for security.
What about the implementation team?
We purchased OpenVPN Access Server directly from the OpenVPN market. I found it on the internet, researched it, connected to the company, and after testing, my chief decided to buy this solution for secure connection to our services. Our first purchase was from OpenVPN Access Server, and the next purchase was for the admin panel of OpenVPN Access Server, which was deployed on our rented server as a standalone server.
What was our ROI?
The main benefits that I have seen from using OpenVPN Access Server are that it is simple, easy, and secure.
What's my experience with pricing, setup cost, and licensing?
I find it not cost-effective. It is not worth the money from a pricing perspective. However, it is a good investment for security and company information security. It is a good investment overall.
Which other solutions did I evaluate?
Apart from speed considerations, I use OpenVPN Access Server only for enterprise use and do not have a plan to use it for my home network. This is an enterprise solution and enterprise service, but not for a home user.
What other advice do I have?
For authentication, we use SAML to authenticate users from Microsoft Entra ID or Google Workspace . SAML and single sign-on serve the same purpose. We use SAML and local authentication for the admin, and the admin can authenticate through SAML with a checkbox in the admin panel or user panel.
I have a recommendation that I can share with other organizations considering OpenVPN Access Server. From my previous job, we used OpenVPN Access Server, and when I moved to a new job, I proposed using OpenVPN Access Server, and the chief decided to implement it. In the future, when I see that my friends or friendly corporations or friendly structures want to use a VPN, I will recommend OpenVPN Access Server.
Secure access for remote teams has enabled private network work and compliance
What is our primary use case?
My main use case for OpenVPN Access Server is to allow our employees to access the private network and external web services that are whitelisted to our network.
A specific example of how my team uses OpenVPN Access Server is that developers are accessing private development services, microservices, or resources on AWS , while the business team or sales has access to some specific services launched and implemented on our private network that are closed from internet access.
External parties or partners whitelist our IP addresses, and our employees use VPN to access those services as well.
What is most valuable?
I believe the best features OpenVPN Access Server offers are 2FA authorization and its connection with Google Workspace , which allows for good synchronization.
I use the 2FA authentication and Google Workspace synchronization, and the benefits of these features for my team are that Google accounts of our employees can be synchronized and authorized through SSO , which makes it easier to set up and configure VPN for our employees. If they have a Google account, they can connect to VPN easily. 2FA adds an additional layer of authorization that enhances security.
OpenVPN Access Server has positively impacted my organization by allowing access to our private services, enhancing security, and enabling remote work from anywhere, as I just need to connect to the VPN to have encrypted traffic to our private resources.
What needs improvement?
I think the most difficult part of OpenVPN Access Server that I would improve is the management of the network, particularly the configuration on the admin side of the network and subnets, which is quite complicated.
Some services, such as YouTube, occasionally become unavailable because it seems to be a bot detection issue from YouTube related to the VPN, and I believe that can be improved to ensure other services do not misidentify OpenVPN Access Server as a bot.
I would describe the user interface of OpenVPN Access Server as fine, but sometimes it requires reloading the whole page to see changes, which can be annoying. In cluster mode, I cannot see what node the user is connected to from the cluster without checking each node individually, which could be improved.
For how long have I used the solution?
I have been working in my current field for seven years.
What do I think about the stability of the solution?
OpenVPN Access Server is stable.
What do I think about the scalability of the solution?
OpenVPN Access Server's scalability is somewhat hard to manage, but it remains scalable overall, primarily due to its cluster mode.
Which solution did I use previously and why did I switch?
We did not use a previous solution; however, I could mention WireGuard, which could have been an option but lacked 2FA authorization and Google authorization and operates only on Layer 3, while OpenVPN Access Server works on Layer 7, which is important for business users.
How was the initial setup?
I find it easy to install OpenVPN Access Server, and there are no issues. It is just a couple of clicks or using the package from the Ubuntu package registry, and the documentation is clear on how to do that.
What about the implementation team?
I did not purchase OpenVPN Access Server through the AWS Marketplace ; it was set up manually as a self-hosted solution.
What was our ROI?
I have not seen a return on investment in terms of fewer employees needed, money saved, or time saved.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for OpenVPN Access Server is that the license was for 10 people and it was fine on a yearly basis.
Which other solutions did I evaluate?
WireGuard was another option considered before choosing OpenVPN Access Server.
What other advice do I have?
OpenVPN Access Server remains stable and works well despite a couple of things that can be improved or enhanced, and the documentation is good with no issues on that side. My impression of the connection speed when using OpenVPN Access Server compared to other VPN solutions is that it is medium; it is not fast and it is not slow, but in some cases, it could be slow.
My advice for others looking into using OpenVPN Access Server is to consider if they need a VPN or just zero trust network access. If they want to route traffic to specific domains, OpenVPN Access Server may not be suitable, but for a secure, safe, and stable VPN with good service integrations such as Google for SAML authorization, it works well and I would recommend it. I would rate OpenVPN Access Server an eight on a scale of one to ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Secure remote access has protected diverse users while access controls provide precise permissions
What is our primary use case?
My primary use case for OpenVPN Access Server is providing secure, centralized access to hybrid cloud environments. Whenever I set up hybrid cloud infrastructure for clients, deploying Access Server is a natural next step. It acts as a gateway, allowing us to securely connect to the private network for routine administration, system updates, and accessing internal dashboards and tools.
How has it helped my organization?
The main benefit I have seen from using OpenVPN Access Server is secure access to private resources over the public internet. That is the key benefit whenever it is set up, and it applies to all types of users. It applies to technical users who want to administer servers, internal users who are working, and executives who want to view internal dashboards. OpenVPN Access Server allows users to feel secure, and indeed, a lot of their traffic is secure. At the same time, if you configure OpenVPN Access Server correctly, users can continue to access non-corporate websites over the public internet, which is beneficial. If they are using Facebook or other personal activities on their phone, they can continue to do that, and that traffic will not be transferred over OpenVPN Access Server. Only when they try to access internal resources will that be accessed over OpenVPN Access Server. I really appreciate that aspect of OpenVPN Access Server.
What is most valuable?
The best features in OpenVPN Access Server for me are the integrations with single sign-on providers so that users can maintain a single corporate identity. I also appreciate the administration dashboard, which allows you to fairly easily provision subnets for different groups. Performance-wise, it is quite performant. OpenVPN Access Server supports both TCP and UDP protocols, and you can decide which to turn on or off. It is fairly performant and reliable. You can trust that once you are in the network, you will access your resources.
What needs improvement?
The user interface of OpenVPN Access Server is good but can be improved. I would prefer to see it become more intuitive. I use Twingate as an alternative, and in Twingate , you see resources, while in OpenVPN Access Server, those would be IP addresses. You get to see dashboards and access views of who can access a particular resource or subnet. You can see who can access what resources from the user view, but you can also see the reverse, which is which resource can be accessed by what users. That reverse view would be a nice addition to have in a dashboard. Additionally, access logs associated with that resource would be helpful, so it would be beneficial to have different views for the same content.
Beyond the positive aspects, I would like to see improvements in OpenVPN Access Server. Twingate offers a different approach to the same problem by moving more towards resource-specific resources and fine-grained zero-trust access, as opposed to entire subnets and entire networks. I would prefer to see views on resources. In the same way that we can define subnets, perhaps we could have views that describe what this particular subnet does and what this particular resource does. Then we can assign those resources and subnets to individual users and groups. It is more about granularizing the resources that can be accessed rather than simply bundling them under subnets or a list of subnets, which is the current approach.
Apart from that, I would like to see UI enhancements in OpenVPN Access Server in the future. Making it more modern would be beneficial.
For how long have I used the solution?
I have been using OpenVPN Access Server for over eight years since 2018.
What do I think about the stability of the solution?
Regarding stability, I have not had any crashes, performance issues, or stability issues with OpenVPN Access Server. That is one thing I appreciate the most about OpenVPN Access Server. Once you set it up correctly, it works and continues to work reliably. I do not recall ever experiencing OpenVPN Access Server crashing or the OpenVPN Access Server client crashing personally.
What do I think about the scalability of the solution?
Regarding scalability, I find OpenVPN Access Server scalable with some caveats. It is scalable on AWS because it is a matter of increasing the instance size and increasing the number of licenses. However, sometimes your license disappears or gets wiped out when you scale the infrastructure, which can be quite annoying, and requires reaching out to support to get set up again. Inherently it is scalable, but the process of scalability can be enhanced.
How are customer service and support?
I would evaluate OpenVPN's technical support and customer service teams as providing standard support. You send a ticket or create a ticket, and somebody responds, and they seem to know what they are doing. The service is adequate. I would rate the technical support an eight on a scale of one to ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
In comparison with other products and solutions such as Twingate or other VPN services, the key differences between OpenVPN Access Server and competitors include access to resources versus subnets, focusing on fine-grained access. Another difference is the ability to see logs specific to the resource that has been accessed. Compared to other products such as Cisco, the advantages include reliability and the protocol—OpenVPN Access Server uses HTTPS and UDP, which are universal. Some of the other protocols that other VPN providers use are not guaranteed. OpenVPN Access Server has advantages there. There should be a move more towards zero trust, where you are accessing a specific resource, defining a specific server or subnet, and assigning access to those resources to individual users or groups. That approach would be better.
How was the initial setup?
The ease of installing and setting up OpenVPN Access Server within the organization depends on the skillset of the person conducting the setup. On AWS , I would say it is medium difficulty because you have to select the right license and the right instance size, and it is not inherently clear what instance size to use. On-premise, it is fairly easy to set up. The setup for clients depends on the client that the end user is using. On mobile devices, sometimes I find that Mac users and iPhone users find it easier to set up than Android users. Overall, I would characterize the setup difficulty as medium. It is not too difficult and also not too easy.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, setup cost, and licensing cost of OpenVPN Access Server is that the licensing is fair for the value provided. My experience is mostly on AWS, and there, I think the pricing is quite fair.
What other advice do I have?
I utilize the Access Controls feature of OpenVPN Access Server by provisioning users into groups and then provisioning access to those groups. The effectiveness of OpenVPN Access Server in providing precise access to users, groups, or devices is quite effective and reliable. I would not say it is the most intuitive specifically because there are default access groups, then you have overrides, and it is not inherently clear for someone just getting started with the product. However, if you are more experienced, it is straightforward to set up. Once you set it up, it is reliable, and you have confidence that whatever access you provision for that group of users will be maintained.
I purchase OpenVPN Access Server for my clients through the AWS Marketplace . Given my extensive experience with OpenVPN Access Server, I would recommend that before any organization implements it, they really need to define what their networks and subnets are and what is connected to what. Consider whether your on-premise infrastructure is connected to your cloud and whether your cloud is connected to another cloud. It is essential to have a good understanding of your network. Make sure there are no overlapping subnets, and then decide where to provision OpenVPN Access Server. The key advice is to understand your network before you even provision this resource, because where you provision it will determine what users can access. You certainly want to have a good amount of coverage where possible so that you can access your internal resources securely. I would rate this product an eight overall.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Keeps Our Systems Secure with Reliable VPN Access
It can be access through many OS systems , in our company we are using mac, windows, linux and android.
We use it daily basis and installing this our system is easy as the steps to install is very less.
It provides CLI Tooling
Our IT team gets in touch with their Customer Support team and give quick response .