VPN tunnel is UP, but can't ping or telnet through the tunnel

0

Hi,

I have a VPC in AWS, I was able to build a Site-to-site VPN tunnel with a remote ASA router.

AWS subnet: 172.31.32.0/20
Counter-party (ASA side) subnet: 192.168.100.0/24
VPN: vpn-0f651da88e042c69a
VPC: vpc-3ce65157
VPG: vgw-0f245078689fc9788
Customer Gateway: cgw-0f9a72a575d19acc6
Route Table: rtb-1fafd374
EC2: i-0e813ed5a4ab389be (enabled all traffic for the VPN counter-party private subnet 192.168.100.0/24)

Timing out to ping or telnet in either direction. When pinging from remote side to AWS, the remote network engineer did see the traffic went out to AWS, but no reply.

Am I missing anything?

Thanks,
Yan

Edited by: ywang on Nov 23, 2020 12:20 PM

ywang
asked 3 years ago2235 views
2 Answers
0

Hi Yan,
Thanks for writing in.
From what I understand, the VPN is configured in correctly and the ASA is seeing egress traffic towards AWS? If that's the case, the recommended way to troubleshoot issues such as this is via the flow logs. Enabling flow logs for a VPC,subnet or specific ENI's will show what traffic ingresses/egresses the said ENI and prove if traffic has actually made it to AWS or not. If you're not across flow logs/how to setup flow logs, get started at [1]. The key thing to look for in your case is:

a) if traffic is seen in the flow logs from a given source IP (in the 192.168.100.0/24 range) and if the logs show "ACCEPT". If you see a "REJECT" for the said flow, it typically means there's a problem with the security group, routing table, Network access lists to name a few.
b) If you're able to see bi-directional traffic flows in the logs for a given source/destination. If you do not see any traffic from that source, it means that there's a problem with the VPN and traffic has not made it to AWS/This VPC as yet.

For end-to-end troubleshooting, you can also run packet captures on the EC2 instance, the source server/appliance and the ASA simultaneously so that you can trace your traffic all the way.

NOTE: Please refrain from divulging any personal information around your AWS resources including Resource IDs, Public IPs and Security group rules to name a few, since all posts are publicly available indefinitely. If you need pointed guidance, please reach out to us at AWS Support via the Support console.

[1] https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html

Edited by: Vignesh-AWS on Nov 24, 2020 11:38 AM

answered 3 years ago
0

Thanks Vignesh. The remote side fixed the issue by changing from BGP mode to static routing.

Setting up flow log as you suggested helps a lot for troubleshooting.

Yan

ywang
answered 3 years ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions