- Newest
- Most votes
- Most comments
Do you have any VPC with 192.168.0.0/16 CIDR attached to TGW ? Are all 3 CIDR locally originated from your rotuer ? or one of them is just propagated ( aka learned from backbone and readvertised to AWS ?) Same ASN in advertised CIDR of 192.168.0.0/16 as of AWS side ASN can be one of the reason.
If no, then only way to diagnose further is by studying some outputs.
If you are using Cisco Router then as Tushar suggested, share output of working and non working CIDR
If other vendors then share equivalent output.
No other way to tshoot further.
Have you checked if the on-premises CGW (router/switch/firewall ) is indeed advertising 192.168.0.0/16 route? For example on a Cisco router you would check: show ip bgp neighbor x.x.x.x advertised-routes
yes. I triple checked that. On-Premises config is fine.
There is no filtering done on AWS side for routes advertised by the customer router so likely there is configuration issue on the CGW. The 'Allowed prefixes' on DXGW is for the other way - AWS to on-premises advertisements.
Is this issue resolved? you may want to open support case as troubleshooting is very limited over a forum like this. Good luck.
Thanks to all, the issue is resolved. It was a configuration issue on the on-premise side. Our network technician fixed it.
If the answer provided is useful please mark the answer as 'Accepted Answer'. Thank you.
That sounds a lot like an exam question. ;-)
But, there's probably an issue in the Direct Connect Gateway allowed prefixes where 192.168.0.0/16
isn't specified.
Relevant content
- Accepted Answerasked 9 months ago
- Accepted Answerasked 5 years ago
- Accepted Answerasked 4 years ago
- AWS OFFICIALUpdated 6 months ago
- How do I monitor my transit gateway and Site-to-Site VPN on a transit gateway using Network Manager?AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 months ago
192.168.0.0/16 is on the AWS side or on-premises?
on-premises