
Overview

Product video
If you want to purchase licenses directly from AWS, we recommend our PAYG listing instead: https://aws.amazon.com/marketplace/pp/prodview-f5qcwyw2gy256Â
Access Server for AWS delivers the best-of-breed VPN solution for secure remote access, site-to-site VPN and secure SasS access for organizations of all sizes. Our award-winning open-source protocol is the industry standard for accessing private information securely, ensuring safe access to internal data and delivering zero-trust network access.
Access Server for AWS is a self-hosted VPN client software that provides rapid deployment for secure remote access with a built-in web-based user interface for ease of use. Access Server provides an extra layer of security, with end-to-end encryption and granular access control to limit the risk of exposed data for remote users, site-to-site connectivity, or securing SaaS access and IoT devices. Certificate PKI management provides simplified installation and configuration. Additional features include balancing traffic across a cluster of Access Servers with DNS round robin and tunneling only your private traffic, optimizing your network bandwidth and making your environment more secure.
Get started today with two free connections at https://myaccount.openvpn.com/signup/as . Access Server for AWS technical support and onboarding is available 24/7. Schedule a demo at https://hs.openvpn.net/request-demo .
OpenVPN client software accommodates Windows, macOS, Linux, Android, iOS, and ChromeOS environments. Includes a built-in local authentication system and support for authentication with Active Directory, PAM, LDAP, RADIUS, SAML, and even a custom Python3 authentication module is possible.
Our subscription model is based on the number of concurrent connected devices, so it's affordable for any size business and can easily grow with your company. Without a subscription key installed, OpenVPN Access Server will allow 2 concurrent connections at no additional cost (excepting AWS infrastructure costs).
Highlights
- This is our BYOL offering which accepts a license purchased from OpenVPN Inc at https://myaccount.openvpn.com/signup/as. If instead you prefer to buy the license directly through AWS, you can use our PAYG listing: https://aws.amazon.com/marketplace/pp/prodview-f5qcwyw2gy256
- A self-hosted scalable secure remote access, site-to-site VPN solution to give your employees the freedom to work securely with end-to-end encryption for accessing SaaS, the internet, and company resources. Essential security controls needed to evolve from a trusted-perimeter security model to an identity-based ZTNA approach.
- OpenVPN client software that accommodates Windows, macOS, Linux, Android, iOS, and ChromeOS environments. Includes a built-in local authentication system and support for authentication with Active Directory, PAM, LDAP, RADIUS, SAML, and even a custom Python3 authentication module is possible.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Refunds allowed up to 60 days after purchase, if license has not been activated.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
For instructions on using the OpenVPN Access Server appliance on the AWS Marketplace, please visit https://openvpn.net/vpn-server-resources/amazon-web-services-ec2-byol-appliance-quick-start-guide/Â .
Resources
Vendor resources
Support
Vendor support
For product activation to succeed your firewall and/or security group settings must allow connections to our online activation servers - details can be found in our FAQ section here: https://openvpn.net/aws-frequently-asked-questions/Â . If you experience any problems, you can register for a free account on our website here: https://openvpn.net/support-for-aws/Â and then open a support ticket so our technical team can assist you.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products


Customer reviews
Has improved internal app access by allowing secure user onboarding and simplified network whitelisting
What is our primary use case?
The main use case for OpenVPN Access Server is making internal web applications and using them within our organization. We have many internal apps, such as Re:dash for analytics, and internal peering and accessing different VM machines and internal servers.
I have hosted OpenVPN Access Server in my VM for one of those internal apps. From that VM, I have done the VPC peering to our different VPCs. And I have hosted, for example, Re:dash, an analytics tool for our internal company members. So we use VPN to whitelist them, and then they can internally use Re:dash for the analytics dashboard, querying, and connecting to the different databases and all.
What is most valuable?
The best features OpenVPN Access Server offers is whitelisting members in my company who have joined recently. It is really easy to use, and it is really easy to set up OpenVPN Access Server as an internal app.
When whitelisting members, I just add the name of the user. I go into User Permissions, add the name of the person I'm going to whitelist, and send them the credentials. They are able to log in and authenticate using an authenticator app and are easily able to onboard on OpenVPN Access Server and access internal apps.
It is easy to whitelist new apps that I'm going to host or when I've created a new VPC. I will do the VPC peering where I have hosted OpenVPN Access Server, and I can easily add the IP or CIDR of that particular new VPC or subnet which I'm going to use for my new app in the UI.
Before using OpenVPN Access Server, only developers mainly had access to databases. We can create read-only users for databases and internally give them access using OpenVPN Access Server. It has been really useful, as we don't have to give access to everyone, and just give access to OpenVPN Access Server, and they are able to access databases or internal websites.
The change has mainly led to the onboarding process being more smoothed out. It is really fast and saves developers' time. It saves my time as a DevOps engineer, setting up things for people.
What needs improvement?
The plan for OpenVPN Access Server could be improved. When adding new people, better plans for startups would be beneficial. I'm working in a startup and sometimes people think we should take the enterprise plan or not. If there was a dedicated plan for startups, it would be really helpful. For instance, providing store credit for OpenVPN Access Server through a startup program, similar to YC's program which gives credit to new startups.
UI-wise, OpenVPN Access Server is easy to manage, but the overall overview dashboard in the admin portal could be improved. Currently, you have to go through dropdowns to find where to add users or whitelist IPs. Creating an onboarding dashboard where an admin person can find these things easily would be beneficial.
For how long have I used the solution?
I have been using OpenVPN Access Server for around two years.
What do I think about the stability of the solution?
OpenVPN Access Server has been stable since the last six months with no issues.
What do I think about the scalability of the solution?
I have hosted OpenVPN Access Server in a VM. It does not utilize much memory or CPU on the VM. So far, I have been using around 40 users, and I did not need to scale it up. I think just scaling the VM would help in case it is needed.
How are customer service and support?
I haven't used customer support from OpenVPN Access Server.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I haven't used any other solutions on the VPN side. OpenVPN Access Server was the first tool I have used for whitelisting people, but it did not give me any reason to move to any other product. It has been good.
How was the initial setup?
I found some open-source documentation for setting up OpenVPN Access Server. It was really easy to set up initially. I got some networking issues from the VPC peering side, but it was resolved from open-source references.
What about the implementation team?
I have utilized the access controls feature of OpenVPN Access Server, including an auto-login feature. For some developers who are heavily using OpenVPN Access Server, I allow an auto-login feature. For others, they still have to put the MFA code from the authenticator app.
What was our ROI?
I haven't seen exact numbers from the investment side, but OpenVPN Access Server has been really useful and saved a lot of time for developers.
What's my experience with pricing, setup cost, and licensing?
The experience with pricing, setup cost, and licensing for OpenVPN Access Server is really good, not that expensive. I am easily able to add new users from the OpenVPN Access Server official website. I would suggest adding a startup plan for small startups would be really helpful.
Which other solutions did I evaluate?
Before choosing OpenVPN Access Server, I haven't evaluated any other options. Some of my colleagues recommended OpenVPN Access Server, and I went through it, and it has been really useful.
What other advice do I have?
I would suggest for others looking into using OpenVPN Access Server, people find it difficult sometimes to self-host. Find the right documentation and go through it. Mostly it is all about networking. If your basics of networking are clear, you will be able to host it easily.
On a scale of one to ten, I rate OpenVPN Access Server a nine.
very good support
Great VPN solution to grant access to business network
Solution enables effortless configuration and ease of working abroad in business network blocked with geofencing.
What is our primary use case?
It was exceptionally easy to install and configure. It works well.
How has it helped my organization?
It allowed me to get through geofencing to work abroad.
What is most valuable?
The configuration is easy on both the server and client side.
What needs improvement?
Currently, the solution works as it is for our requirements. We are still evaluating full scope of options and fine-tuning e.g. split VPN to allow LAN access whilst on VPN.
For how long have I used the solution?
New customer.
What do I think about the stability of the solution?
Works without issues from challenging locatios.
Which solution did I use previously and why did I switch?
None. New requirement.
What's my experience with pricing, setup cost, and licensing?
The setup cost was reasonable.
Which other solutions did I evaluate?
I considered using Norton and Nord VPN.
What other advice do I have?
I would rate it a ten out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Secures access to AWS resources with straightforward setup and a clean admin interface while lacking an official Linux client
What is our primary use case?
I use OpenVPNÂ Access Server to restrict access to internal AWS-hosted resources.
How has it helped my organization?
I have been using OpenVPNÂ Access Server for several months as a lightweight, cost-effective VPN solution deployed on an EC2Â instance. My primary requirement was to secure access to internal AWSÂ resources without adding unnecessary complexity or overhead. OpenVPN Access Server met that need well.
What is most valuable?
The setup process is straightforward, with good support for common operating systems. The admin interface is clean, making configuration and user management easy even for teams without deep networking expertise.
What needs improvement?
The lack of an official Linux client is a clear gap. The community-maintained alternative is functional but not as stable or polished as the official Windows and macOS clients.
For how long have I used the solution?
I have used this solution for 3 years.
What do I think about the stability of the solution?
There were no stability issues.
What do I think about the scalability of the solution?
There were no scalability issues.
What other advice do I have?
Having an officially supported Linux client would significantly improve usability and reliability across all platforms.