AWS site to site VPN routing issue

0

We have a site to site VPN setup between AWS and our Checkpoint firewalls with dynamic BGP routing. On the checkpoint side I see traffic going over the VPN tunnel to AWS, but I do not see any return traffic. I am trying to ping an AWS linux EC2 instance. To complicate matters, due to company policy, I can not create a public interface on the EC2 instance, so I cannot ssh into the EC2 instance to do a tcpdump to see if the icmp packets are being received. Any advice on troubleshooting this?

3개 답변
1
수락된 답변

To access the Linux instance you might try the EC2 Serial Console.

Otherwise, one common issue with site-to-site VPNs is where NAT is enabled on the firewall side. In the settings for the connection make sure that NAT is disabled.

profile pictureAWS
전문가
답변함 2년 전
0

A great tool is also the VPC Reachability Analyzer. You can define a path from the VPN gateway to the ENI of the instance and it will check everything from routing to Security Groups. This makes sure that all configuration on the AWS side is properly checked. Otherwise it will tell you which routing table, security group, etc. is the source of your issue

Another thing you might be able to do is to activate VPC flow logs. This helps you to see all the traffic flows inside the VPC, so you can see where the packets are flowing from and to. If you use CloudWatch Logs as destination you can use CloudWatch Log Insights to query the records quite comfortably.

And please make sure that the network ranges you try to connect are properly covered by the IPSEC SA definition.

전문가
답변함 2년 전
0

Looks like it was the NAT was enabled on the firewall. Thank you for the help.

답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인