- Newest
- Most votes
- Most comments
Based on your description, there are several potential issues that could be preventing traffic flow despite your VPN tunnels showing as UP.
First, let's address the interesting traffic configuration. The provider has specified 10.104.168.0/21 as their network, but they've given you a very specific single IP address (10.253.187.85/32) as your "interesting traffic." This is unusual for a Site-to-Site VPN, which typically uses entire subnets rather than individual IPs. This configuration might be causing routing issues.
Here are the most likely causes of your connectivity problem:
-
Route Table Configuration: While your AWS route table looks correct for sending traffic to the provider's network, there might be an issue with how return traffic is being routed on the provider's side. They need to have a route for your VPC CIDR (
172.31.0.0/16) pointing to their VPN endpoint. -
Traffic Routing Issues: The provider may be expecting traffic from the specific IP they provided (
10.253.187.85) rather than your actual VPC CIDR. This would cause asymmetric routing problems. -
Firewall/Security Configuration: Even though your security groups and NACLs are configured correctly, there might be firewall rules on the provider's side blocking the traffic.
-
VPN Configuration Mismatch: There could be mismatches in the VPN configuration parameters between AWS and the provider, such as encryption settings, authentication methods, or lifetime values.
-
Policy-Based VPN Issues: If the provider is using a policy-based VPN and you're using a route-based VPN, this could cause connectivity problems. Policy-based VPNs require matching local and remote network configurations.
To troubleshoot:
- Confirm with the provider how they expect traffic to flow. The single IP address they provided might indicate they're expecting you to use NAT or a specific configuration.
- Verify that the provider has properly configured routes for your VPC CIDR.
- Check if there are any packet loss issues over the connection.
- Consider downloading the AWS VPN configuration file for your specific customer gateway device type and sharing relevant parts with your provider to ensure configurations match.
You don't necessarily need a NAT Gateway for a Site-to-Site VPN to work, but given the unusual configuration with a single IP address, it's possible the provider expects you to NAT your traffic to appear as if it's coming from that specific IP address.
Sources
Troublehsoot connectivity between SIte-to-Site VPN and VPC | AWS re:Post
Troubleshoot VPN routing issues | AWS re:Post
ec2 instance not routing through virtual private gateway | AWS re:Post
site to site vpn connection to on premise network - pfsense firewall - cannot communicate beyond firewall subnet/vlan | AWS re:Post
Impossible to ping from AWS to On-Premise Server with site-to-site AWS vpn | AWS re:Post
Hello.
Why not try enabling VPC flow logs on the EC2 instance that receives the ping?
If the result shows that the ping reaches the EC2 instance and you can identify the source IP address, you may be able to review your routing settings, etc.
https://docs.aws.amazon.com/vpc/latest/userguide/working-with-flow-logs.html
NAT instance is not required.
As per rePost Agent suggestion, this could be a routing configuration on the provider network.
Can you do a traceroute (tracert for Windows) from your provider network to your EC2 instance?
Relevant content
- asked a year ago
- asked a month ago
