- 新しい順
- 投票が多い順
- コメントが多い順
Hi,
This is possible to use Certificate-based Authentication to deal with the dynamic IP issue. You can configure a CGW (Customer Gateway) without a static IP address.
Resolution:
1/ Create and install a root CA and a subordinate CA
2/ Create a private certificate to use as the identity certificate for your customer gateway
3/ Create a customer gateway for your VPN connection
4/ Configure the AWS Site-to-Site VPN connection with a virtual private gateway
5/ Copy the end entity certificate (the private certificate that you created in above task 2), root CA certificate, and subordinate CA certificate to the customer gateway device
For details, please see: https://aws.amazon.com/premiumsupport/knowledge-center/vpn-certificate-based-site-to-site/
You can use certificates to authenticate the Customer Gateway, therefore removing the requirement for a static IP: https://aws.amazon.com/premiumsupport/knowledge-center/vpn-certificate-based-site-to-site/
関連するコンテンツ
- AWS公式更新しました 9ヶ月前
- AWS公式更新しました 2年前
- AWS公式更新しました 10ヶ月前
- AWS公式更新しました 1年前
Would this work in situations where the customer gateway is behind CGNat and doesn't have a publicly routable IP address at all?
Yes, as long as the VPN session is configured for NAT Traversal (NAT-T).