Two way trust with on-prem domain fails on AWS side

1

I have an on premise domain controller i'm using to test migrating to Managed Microsoft AD.

We have a site-to-site VPN up on our Meraki MX68 and it's active to our VPC where the domain controller lives and all traffic is allowed in and out for the on-prem IP subnet. I added the two way trust in the on-prem DC but when I try to add the trust to AWS it says the domain controller is unreachable. YET, I'm able to ping my domain controller, RDP to it and browse the directory from an instance in EC2 on the same subnet (once authenticated). the ONLY think I can't do is ping the secondary IP address of the managed domain because that tunnel is down BUT I can ping and reach the primary one.

Subnet of VPC 172.16.0.0/24 Subnet of on-prem DC 192.168.128.0/24

Neither of these are publicly routed so i'm a bit confused. (Yes these routes are propagated in the routing table).

What am I doing wrong here?

ACLs and Secruity groups all have the same IP range allowed for the on-prem internal subnets inbound and outbound, Firewall is off on the domain controller that's on-prem, the IP I set for the conditional forwarder matches the on-prem DC.

Any assistance would be greatly appreciated.

1개 답변
0

Here is our public documentation on how to troubleshoot trust creation failures. It includes some common failure patterns.
https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_troubleshooting_trusts.html

At the end of the document you will see a reference to this SSM document. It was written by AWS support to help verify many settings that can block trust creation.
https://docs.aws.amazon.com/systems-manager-automation-runbooks/latest/userguide/automation-awssupport-troubleshootdirectorytrust.html

profile pictureAWS
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠