- Newest
- Most votes
- Most comments
The issue you're experiencing with Linux EC2 instances not being able to communicate through the Site-to-Site VPN while Windows instances can is intriguing. There are several potential causes and troubleshooting steps to consider:
-
Routing: Ensure that the route tables associated with the subnets where your Linux instances are located have the correct routes for the customer's network. The route should point to the virtual private gateway (VGW) or transit gateway (TGW) used for the VPN connection.
-
Security Groups: While you've added ICMP inbound rules, make sure that the security groups for your Linux instances also allow outbound traffic to the customer's network range.
-
Network ACLs: Check if there are any Network ACLs applied to the subnets of your Linux instances that might be blocking the traffic.
-
VPN Configuration: Verify that the VPN connection is configured to allow traffic from all instance types. Sometimes, there might be filters on the customer's end that only allow certain IP ranges or protocols.
-
MTU Issues: Although you've adjusted the MTU, it's worth double-checking. Try setting the MTU on your Linux instances to 1400 or even lower (like 1300) to see if it makes a difference.
-
TCP MSS Clamping: Enable TCP MSS Clamping on your Linux instances. You can do this by running: sudo iptables -t mangle -A POSTROUTING -p tcp -o eth0 -j TCPMSS --set-mss 1360
-
Packet Capture: Run a packet capture on both Windows and Linux instances to compare the traffic. This might reveal differences in how the packets are being sent or received.
-
Customer Gateway Configuration: Work with the customer to ensure their Fortinet Fortigate device is configured correctly to allow traffic from your Linux instances. There might be specific firewall rules or policies on their end that are causing this issue.
-
BGP Configuration: If you're using dynamic routing (BGP), ensure that the routes are being properly advertised and received on both ends of the VPN connection.
-
AWS Support: If none of the above steps resolve the issue, consider opening a support ticket with AWS. They can provide more in-depth troubleshooting and potentially identify any service-related issues.
Remember to test after each change, and always coordinate with the customer when making changes that might affect their network or security posture. Troubleshooting VPN issues can be complex, so a systematic approach and patience are key.
Sources
How AWS Site-to-Site VPN works - AWS Site-to-Site VPN
Configure an AWS site-to-site VPN | AWS re:Post
Test an AWS Site-to-Site VPN connection - AWS Site-to-Site VPN
What is AWS Site-to-Site VPN? - AWS Site-to-Site VPN
Relevant content
- asked 3 years ago
- AWS OFFICIALUpdated 4 months ago
- AWS OFFICIALUpdated 4 months ago
