S2S VPN Configuration

0
  1. Created Elastic IP address 18.153.118.134 (public IP) and associated it with the only existing ENI
  2. Created Customer Gateway. Specified the IP 18.153.118.134 when creating CG.
  3. Created Virtual Private Gateway. Attached VPG to the existing VPC.
  4. Enabled propagation in Route tables.
  5. In Security groups, allowed all traffic (Inbound) for IP 176.113.113.242/32 (our FortiGate) in the default group.
  6. Created site-to-site VPN.

We do not see requests on port 500/udp from our FortiGate. Should we build the VPN on our FortiGate with the created IP address 18.153.118.134? The issue is that in the information about the created VPN, we see two Outside IP addresses: 3.75.22.90 and 35.156.93.34. Are these arbitrary addresses allocated for building the 2-phase VPN?

2개 답변
0

You see two Outside Public IP addresses because AWS VPN connection creates 2 tunnels within one VPN connection for high availability

https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html

You could download sample configuration file to use for configuring the customer gateway device in the Vendor dropdown you should be able to see FortiGate

https://docs.aws.amazon.com/vpn/latest/s2svpn/SetUpVPNConnections.html#vpn-download-config

profile pictureAWS
전문가
답변함 5달 전
0

Step 1 and step 5 are not applicable for AWS site to site VPN.

When you create a Site to Site VPN in the VPC console, you will be supplied 2 Tunnel IPs on the site to site configuration.

These are the 2 IPs which you need to configure your FORTINET. 3.75.22.90 and 35.156.93.34

From the console you can download the configuration file for the firewall of choice also.

Your tunnel does not connect with 18.153.118.134

profile picture
전문가
답변함 5달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인