AWS Transit Gateway through BGP propagation and routing behavior

0

When I added the VPN to a transit gateway attachment, the VPN route was automatically propagated through BGP to the routing table on the transit gateway.

  1. Is this an expected behavior for routes to propagate automatically when the routes are added to the attachment? This can cause a communication problem. The IP CIDR that is in use by the on-premise server engine might conflict with the VPC CIDR range.
  2. Is there a way to disable the route propagation setting for BGP on the routing table of the transit gateway?
AWS
preguntada hace 4 años3053 visualizaciones
1 Respuesta
0
Respuesta aceptada

If you've enabled the "Default route table propagation" option on your transit gateway (TGW), it will automatically propagate transit gateway attachments (like VPN) using the default route table. Note that this setting is enabled by default. To disable the "Default route table propogation" option, create a new transit gateway with the option disabled. You won't be able to disable this option by editing the TGW configurations.

If you've disabled the "Default route table propogation" option when you create your transit gateway, make sure to specify which route tables you want to propagate the routes to or from the VPN attachment.

profile pictureAWS
EXPERTO
respondido hace 4 años

No has iniciado sesión. Iniciar sesión para publicar una respuesta.

Una buena respuesta responde claramente a la pregunta, proporciona comentarios constructivos y fomenta el crecimiento profesional en la persona que hace la pregunta.

Pautas para responder preguntas