1 Answer
- Newest
- Most votes
- Most comments
0
I see different use cases here:
- VPC1 <-> DC1
- VPC1 <-> DC2
- VPC2 <-> DC1
- VPC2 <-> DC2
Separately, use cases 1 and 4 together, or use cases 2 and 3 together are doable by creating two separate route tables for VPCs and have data center CIDRs pointing to VPN attachments.
if you want to do all of them together then the complication arises and you need to NAT DC1 or DC2 (one of them) to something like 192.168.2.0/24 and use that NATed range as destination in the route table. Here the aim is to make one DC's range look different for TGW. This NAT can be done either in Customer Gateway side or AWS by spinning up NAT appliance in a separate VPC then use that as destination for traffic destined to a DC.
With NAT in picture things generally get messy.
Relevant content
- asked 3 months ago
- Accepted Answerasked 5 years ago
- asked 2 months ago
- asked 8 months ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 years ago