connection continuity from on-prem to vPC at extra hop

0

Hi All,

Would like to know what's the concept behind this:

My network topology source : machine behind reverse proxy (NGINX) locate at on-prem , using customer gateway doing IPSec VPN tunnel to reach either (a) virtual private gateway or (b)transit gateway at AWS vPC-A

Then from vpC-A's will using AWS PrivateLink to reach target EC2 at vPC-B

Question: first part the traffic from op-prem to reach the vPC-A , once the vpn terminate at either (a)virtual private gateway or (b)transit gateway, what action needed to ensure the traffic from vPC-A able to reach vPC-B using privatelink?

What need to configure on AWS?

Thanks

Noel

4 Antworten
0

Yo Gary,

Thanks for the reply. Basically i am new with AWS.

There's no issue from onprem to vPC-A, from your statement just route statement between vPC-A to vPC-B will do , am i correct?

Thanks

Noel

beantwortet vor einem Jahr
  • No routing between a and b needed if using private link.

    Is that setup in your question your actual requirement?

  • There are a few soluitions depending on your requirements..

    1. Do you want to route traffic From VPC-A to VPC-B?
    2. Do you want to use private link from VPC-A to VPC-B?
    3. Do you want to Peer VPC-a and VPC-b to the Private Gateway where the VPN terminates so you can access BOTH VPC's via VPN?
0

Or maybe i re-organize, using transit gateway then

  1. attached the IPSec VPN to vPC-a Transit-Gateway,

Question. How vPC-a can carry the VPN from endpoint to reach vPC-b? i want to ensure the traffic not splitting.

Thanks

beantwortet vor einem Jahr
  • There are a few soluitions depending on your requirements..

    1. Do you want to route traffic From VPC-A to VPC-B?
    2. Do you want to use private link from VPC-A to VPC-B?
    3. Do you want to Peer VPC-a and VPC-b to the Private Gateway where the VPN terminates so you can access BOTH VPC's via VPN?
0

You need to ensure you have routes for the subnet where the private link endpoint service is setup within VPC-A

Additionally routes in vpc-a to route to on prem via VPG and routes on prem to route to vpc-a via the vpn. Same applies for the transit gateway, the routes need to exist.

Subnets in vpc-a and security group where the endpoint is setup needs to allow the on prem source addresses /network cidr

Have you thought about just connecting your VPGW to vpc-b or do you want to keep this environment isolated? Using private link allows isolation and limit/control access via a NLB with private link. There’s no need to have routing setup from VPC-B in your setup to VPC-A or on prem

profile picture
EXPERTE
beantwortet vor einem Jahr
0

hi

unfortunately, vPC-b only allow traffic from AWS/Public cloud.

Tha'ts why vPC-A exist, as the transit purpose.

But what i not understand is, if i terminate the VPN at vPC-a, so from here route to vPC-b then? How to relay the traffic from vPC-a to vPC-b then?

Noel

beantwortet vor einem Jahr

Du bist nicht angemeldet. Anmelden um eine Antwort zu veröffentlichen.

Eine gute Antwort beantwortet die Frage klar, gibt konstruktives Feedback und fördert die berufliche Weiterentwicklung des Fragenstellers.

Richtlinien für die Beantwortung von Fragen