Managed VPN feature support

0

A customer is asking if our Managed VPN supports the following features:

  1. Traffic needs to be SNAT’ed to a public IP address different than the VPN PEER IP address before is encapsulated into IPSec.
  2. Traffic needs to be SNAT’ed to a specific private IP address.
  3. The destination IP address (Server IP address on the VPN PEER IP address) on the other side of the VPN can be accessible through more than one tunnel in a active-standby or in an active-active model.
  4. The device needs to be able to perform DNS resolution.
  5. The devices need to support IKEv1 and IKEv2.
  6. The devices should support AES256 in IKE and IPSec.
  7. The devices should support SHA-1 in IKE and IPSec.
  8. The devices should support Diffie-Hellman 1, 2 and 14.
AWS
Antonio
demandé il y a 5 ans193 vues
1 réponse
0
Réponse acceptée

Answers are in-line:

  1. Traffic needs to be SNAT’ed to a public IP address different than the VPN PEER IP address before is encapsulated into IPSec.

On CGW yes you can SNAT the traffic. On VGW (AWS VPN) they cannot NAT. For NATing on CGW, only caveat is not to use CGW Public IP for SNAT

  1. Traffic needs to be SNAT’ed to a specific private IP address.

Same as 1

  1. The destination IP address (Server IP address on the VPN PEER IP address) on the other side of the VPN can be accessible through more than one tunnel in a active-standby or in an active-active model.

AWS VPN landing on TGW support Active/Active mode. However, AWS VPNs on VGW can only push traffic via one tunnel for VPC -> On-prem traffic, but can accept traffic on both the tunnel (on-prem to AWS VPN) . Either way if they are trying to access EC2 from on-prem that can access from any tunnel.

  1. The device needs to be able to perform DNS resolution.

Yes, this would work. This is site-to-site VPN and DNS resolution should work as long as DNS IPs are accessible via VPN

  1. The devices need to support IKEv1 and IKEv2.

All newly created VPNs should have support for IKEv1 and IKEv2

  1. The devices should support AES256 in IKE and IPSec.

Yes, AWS VPN supports this

  1. The devices should support SHA-1 in IKE and IPSec. Yes, AWS VPN supports this

  2. The devices should support Diffie-Hellman 1, 2 and 14.

Phase 1 supports DH groups 2, 14-18, 22, 23, and 24.
Phase 2 supports DH groups 2, 5, 14-18, 22, 23, and 24.
AWS
jkaps
répondu il y a 5 ans

Vous n'êtes pas connecté. Se connecter pour publier une réponse.

Une bonne réponse répond clairement à la question, contient des commentaires constructifs et encourage le développement professionnel de la personne qui pose la question.

Instructions pour répondre aux questions