Al usar AWS re:Post, aceptas las AWS re:Post Términos de uso

Public subnet not reacheable with my aws client vpn endpoint

0

Hello,

I'm encountering an issue with my VPN connection; I can access my EC2 instances within the private subnet via the VPN, but I'm unable to connect to instances in the public subnet.

I've tried adding authorization rules to permit access to the public subnet's destination CIDR. Additionally, I've configured the route table to redirect my VPN client CIDR to 'local'.

I believe it's a DNS issue, but I'm uncertain about how to fix it.

Thanks for help

preguntada hace un año467 visualizaciones
3 Respuestas
0

Am I correct in understanding that you cannot access the private IP address of EC2 in the public subnet? Or does it mean that the public domain of EC2 is not accessible?

profile picture
EXPERTO
respondido hace un año
  • So, my public domain of EC2 isn't accessible when I'm using client vpn endpoint

  • understood. Try adding a route to the NAT Gateway to the route table of the private subnet that the ClientVPN endpoint is associated with.

    By setting the route table of the private subnet to which the ClientVPN endpoint is linked as shown below, you will be able to access the public domain from NAT Gateway. https://repost.aws/knowledge-center/client-vpn-static-ip-address

    desttarget
    0.0.0.0/0NAT Gateway
    VPC CIDRlocal

    Alternatively, I think it is possible to perform DNS name resolution by setting up a split tunnel. By setting up a split tunnel, you can access the public domain without going through Client VPN. In this case, make sure to only configure the VPC CIDR in the AWS Client VPN route table. However, when using split tunnels, please note that setting "0.0.0.0/0" in the AWS Client VPN route table is not recommended. https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/split-tunnel-vpn.html

  • Yes my private subnet has already NAT gateway (inside public subnet + elastic IP)

    With my VPN I can reach internet google.com etc.. but not my ec2 instance in public subnet.

    This is very strange...

  • Or, can I connect if I link the AWS Client VPN endpoint to a public subnet and configure it to go directly to the Internet from the Internet gateway? https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/scenario-internet.html

  • Currently my endpoint vpn are associated to private subnet..

    Something strange, when I ping my domain (blabla.com) I don't have my dns A, i have something else, even for preprod.blabla.com I have host not found ...

    Looks like DNS isn't resolving when I am using VPN

0

Any idea ? I'm still stuck on this topic ..

respondido hace un año
0

I need Expert AWS I think, 2 days i am on it and still nothing

respondido hace 10 meses

No has iniciado sesión. Iniciar sesión para publicar una respuesta.

Una buena respuesta responde claramente a la pregunta, proporciona comentarios constructivos y fomenta el crecimiento profesional en la persona que hace la pregunta.

Pautas para responder preguntas