VPN logs report the following errors:
(T1112)Info (1042): 04/12/21 21:27:05:502 --Too many outstanding keepalive and no response from GP gateway, disconnect tunnel
(T1112)Info ( 534): 04/12/21 21:27:05:502 VPN timeout due to keepalive, get out of ProcMonitor
(T9904)Info (4653): 04/04/21 20:27:06:956 ConnectSSL: Failed to connect to '###.###.####.##:443'
(T9904)Info (4689): 04/04/21 20:27:06:957 ConnectSSL(FALSE) failed
DNS TTL for bypassed domain expired and traffic sent into WSS tunnel by agent
Add WSS Application level bypass for AWS VPN client (available in WSS Agent 7.3.x)
You should use IP address bypass but the range of AWS VPN server IP addresses may be too large, as in this example. In that case, you note that using DNS bypass can cause issues.
krn dns.cpp 830 IsBypassed 00002F2C 000058FC 2 01/14/2022-18:40:19.8625806 Debug Found bypassed IP 54.80.#.#
krn app-driver_win.cpp 3146 OutboundIPPacketClassify 00002F2C 000058FC 2 01/14/2022-18:40:19.8625808 Debug passthru 54.80.#.# due to domain bypass
krn dns.cpp 1271 IsExpired 00002F2C 000058FC 8 01/14/2022-18:40:20.1253883 Debug Deleting expired DNS Bypass IP 54.80.#.#
krn dns.cpp 1271 IsExpired 00002F2C 000058FC 8 01/14/2022-18:40:20.1253886 Debug Deleting expired DNS Bypass IP 54.80.#.#
krn app-driver_win.cpp 3239 OutboundIPPacketClassify 00002F2C 000058FC 8 01/14/2022-18:40:20.1253901 Debug Found UDP packet, route = 192.168.86.26:57821 -> 54.80.#.#:443
krn app-driver_win.cpp 3239 OutboundIPPacketClassify 00002F2C 000058FC 8 01/14/2022-18:40:20.1569829 Debug Found UDP packet, route = 192.168.86.26:57821 -> 54.80.#.#:443