Being able to access resources directly in secure way can be very useful. To achieve this you can: AWS Setup a dedicated connection with AWS Direct Connect Use a Network Appliance Use a like Software Defined Private Network OpenVPN In this post, I will walk you through how to create an server on AWS, to connect securely to your VPC, Private Network resources and applications from any device anywhere. OpenVPN To get started, sign in to your and launch an from the offering: AWS Management Console EC2 instance OpenVPN Access Server AWS Marketplace For demo purpose, choose t2.micro: Use the default settings with the exception of “ ” as we dont want our being terminated on accident: Enable termination protection VPN Assign a new as below: Security Group : Remote access to the instance. TCP — 22 : HTTPS, this is the interface used by users to log on to the VPN server and retrieve their keying and installation information. TCP — 443 : OpenVPN Admin Web Dashboard. TCP — 943 : OpenVPN UDP Port. UDP — 1194 To ensure our VPN instance Public IP address doesnt change if it’s stopped, assign to it an : Elastic IP For simplicity, I added an record in which points to the instance : A Route 53 Elastic IP Once the is successfully launched, you will need to connect to the server via using the record: AMI SSH DNS ssh -i /path/to/key.pem openvpnas@openvpn.slowcoder.com On first time connecting, you will be prompted and asked to setup the OpenVPN server: Setup a new password for the admin user: openvpn sudo passwd openvpn Point your browser to , and login using credentials https://openvpn.slowcoder.com openvpn Download the , after your installation is complete, click on “ ” then “ ” : OpenVPN Connect Client Import From server Then, type the name: OpenVN DNS Enter your as the username and enter the same password as before and click on “ “: openvpn connect After you are connected, you should see a green check mark: To verify the client is connected, login to on : OpenVPN Admin Dashboard https://openvpn.slowcoder.com/admin Finally, create a simple web server instance in a private subnet to verify the VPN is working: If you point your browser to the webserver private address, you should see a simple HTML page: