내용으로 건너뛰기

VPC Site-2-Site VPN issue

0

Hello,

We have setup a Site-2-Site VPN from a VPC of ours to a Fortigate firewall. However there appears to be a routing issue. When we ping their firewall, they receive the ICMP and reply back. But I do not receive the reply. It's the same for other types of traffic types.

My question is how I would capture and see if the ICMP reaches us? Should I do it on the network interface of the EC2 the traffic is destined for? Or on a higher level? We allow ICMP from 0.0.0.0 on the EC2 SG.

Thanks

Adding some images here Enter image description here
Enter image description here

Enter image description here

  • Are you trying to ping over the tunnel, or to the CGW of the Fortigate?

  • @Max Clements: when we do pings from our EC2 (172.31.38.164) we target a host that's behind the remote fortigate. For an example the ip-address 10.156.102.10.

2개 답변
2
수락된 답변

I actually solved this by adding the entire network 172.31.0.0/16 in the VPN tunnel instead of just the single EC2.

답변함 일 년 전
전문가
검토됨 일 년 전
2

You cant add 172.31.0.0/16 to the VPN Static Routes on the AWS side as this is your VPC CIDR Range. You only add routes here for networks to route VIA the VPN such as the 10.156.102.0/24 and then propagate to the VGW.

I suggest you remove 172.31.0.0/16 or your going to have issues as its overlapping your local VPC and its only working because local has a higher priority then the VGW

전문가
답변함 일 년 전
  • I did not have to remove it, it seems that AWS was smart enough to figure this out and ignore propagating that static route. But sure, it should be removed still.

  • It’s because a /32 is more specific than a /16. Defo remove it or you will be in for a world of pain. Cheers.

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

관련 콘텐츠