- Newest
- Most votes
- Most comments
Hi,
As I understand you are looking for a fixed/static public IP address. You can use an Elastic IP in this case and associate that to your NAT Gateway, so that your ISP always "witnesses" traffic coming from this specific IP.
We have a very detailed blog which should have the answers & examples you are looking for. I suggest you pls go through this once, try the configurations by adapting as per your use-case.
Please comment on this answer if you have further questions.
I hope this helps!
Thanks, Rama
Hi, I am trying to so the same over Site-to-Site VPN with no luck so far. Has it been successful ? Any recommendation ?
Best regards Mohamed
Hi, As outlined on RFC1918 https://datatracker.ietf.org/doc/html/rfc1918, the only Private IP CIRD are:
- 10.0.0.0 - 10.255.255.255 (10/8 prefix)
- 172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
- 192.168.0.0 - 192.168.255.255 (192.168/16 prefix). They are reserved for internal network use and not routable on the public internet. Any other IP or CIDR outside these IP ranges is considered public unless explicitly reserved or assigned by an ISP.
While deploying a VPC where your tunnel will be connecting to, you can use any other IP apart from the IP CIDR above as they are reserved as private and use any other IP CIDR. This will ensures that there is no conflict with private subnets already in use within the organization or the ISP's network you wish to connect to.
For my case, I choose a different CIDR (a non-RFC 1918 CIDR) for my VPC which allowed seamless integration with the ISP. This worked for me and the ISP was happy :) Hope that works for eveyone in the future.
Thank you.
Relevant content
- asked 3 years ago
- AWS OFFICIALUpdated 3 years ago
- AWS OFFICIALUpdated 6 months ago
