- Más nuevo
- Más votos
- Más comentarios
Based on your description, the most likely issue is that the Source/Destination Check is still enabled on your Viptela 8000V EC2 instance.
When Source/Destination Check is enabled (which is the default setting for EC2 instances), AWS drops packets where the EC2 instance isn't the source or destination of the traffic. This prevents the instance from functioning as a router or forwarding traffic between networks.
Since your on-prem traffic is reaching the outside ENI of the Viptela EC2 but not being forwarded, while traffic sourced directly from the instance's VRF 1 works fine, this strongly indicates a Source/Destination Check issue.
To resolve this:
- Disable the Source/Destination Check on the Viptela 8000V EC2 instance's network interfaces
- This will allow the instance to forward traffic between your on-premises network and the Cloud WAN-attached VPCs
Disabling this check should not negatively impact any existing working traffic. It only removes restrictions rather than changing routing behavior. This is a standard configuration requirement for any EC2 instance that needs to function as a router, NAT device, or network appliance.
After making this change, monitor both your existing connections and the new Cloud WAN connectivity to ensure everything is working as expected.
Sources
Source/Destination Check on viptela 8000 ( EC2 instance ) | AWS re:Post
Ping Fail for scenario that EC2 Server2 ping VPN Interface IP in EC2 Server1 | AWS re:Post
Contenido relevante
- preguntada hace 4 meses
- preguntada hace 6 días
- preguntada hace 22 días
- preguntada hace 7 meses

In addition to the above, please also verify the following: