- Newest
- Most votes
- Most comments
Based on your description, it seems you're experiencing some unexpected behavior with your Site-to-Site VPN connection using AWS Transit Gateway. Let's address your questions:
a. When you observe the tunnel outside IP showing for a specific tunnel, but no failover occurs, it's possible that the BGP session is still established on the original tunnel, even though the Transit Gateway route table is showing a different tunnel. This can happen due to the way AWS manages redundancy in S2S VPN connections.
b. The "Skip tunnel replacement" option is not directly related to this issue. This option is typically used to prevent AWS from automatically replacing tunnels during maintenance or updates. It wouldn't prevent the behavior you're experiencing with tunnel swapping.
c. Regarding the Fortigate configuration, it's important to check a few things:
- Ensure that BGP is properly configured on both tunnels.
- Verify that the Fortigate is not load balancing between the two tunnels. While AWS supports equal-cost multi-path (ECMP) routing, not all customer gateways handle it correctly.
- Check the BGP timers and keep-alive settings on the Fortigate to ensure they match AWS recommendations.
- Review the Fortigate logs to see if there are any BGP session flaps or other issues that might be causing the unexpected tunnel swaps.
To address the issue:
- Consider adjusting BGP timers on both ends to be more sensitive to link failures.
- Implement proper monitoring on both AWS and Fortigate sides to detect and alert on tunnel status changes.
- If possible, configure your Fortigate to prefer one tunnel over the other (e.g., by manipulating BGP attributes) to maintain a more predictable routing behavior.
Remember that AWS VPN connections are designed for high availability, and some level of tunnel swapping is normal. However, if it's causing issues with your specific setup, you may need to fine-tune your configuration or consider alternative designs that provide more control over the routing behavior.
Sources
VPN S2S With Public VIF Enabled | AWS re:Post
Site 2 site VPN | AWS re:Post
Troubleshoot AWS Site-to-Site VPN connectivity with a Yamaha customer gateway device - AWS Site-to-Site VPN
Relevant content
- asked 3 years ago
- asked 4 years ago
- AWS OFFICIALUpdated 6 months ago
