Connect to multiple IPs on Cisco ASA through a single AWS VPN tunnel

0

Hello

We have set up a site-to-site VPN between AWS and an on premise network using a Cisco ASA 9.8 router using a transit gateway and static routing (no BGP) + route-based VPN on Cisco. Setup works fine with one IP address on the on-prem network e.g. 10.10.10.10, we configured it on the VPC route table and TGW route table + specify 0.0.0.0/0 as a local IPv4 network CIDR and are able to ping 10.10.10.10 from our EC2 instances

Our partner has set up a 2nd address 10.20.20.20 on the on-prem network to be called from the EC2 instances, but after configuring the new IP address in the VPC + TGW route tables, I am unable to ping it (ICMP is allowed on the on-prem network). However, if I change the local IPv4 network CIDR of the VPN tunnel configuration to 10.20.20.20, I am now able to ping 10.20.20.20 and 10.10.10.10 becomes unreachable.

How can we reach 2 non-contiguous IP addresses on the on-prem network using a single VPN tunnel / customer gateway?

  • FYI, my EC2 instances are in a private subnet and internet traffic goes through a NAT gateway.

    I had to change the VPN tunnel's remote IPv4 network CIDR to the private IP address of the NAT gateway's Elastic IP address otherwise the tunnel would not go up

asked 4 months ago195 views
3 Answers
0

Can you explain how is 10.20.20.20 is configured with ping is successful? Local IPv4 Network CIDR (IPv4 VPN connection only) The IPv4 CIDR range on the customer gateway (on-premises) side that is allowed to communicate over the VPN tunnels. Default: 0.0.0.0/0

If you put in there a specific CIDR/mask, it will only allow that CIDR to generate traffic back on the VPN. In your case, you are only allowed to PING network in your on-premises with IP addresses from 10.20.20.20/X range. Did you try 10.0.0.0/8 for your Local IPv4 Network CIDR?

Keep the default values for Local and Remote IPv4 0.0.0.0/0 and test it. if it works, then start narrowing down the network address to an address that summarize all networks you want to reach over the VPN. For your case, both 10.10.10.10 and 10.20.20.20 can be reached if you allow 10.0.0.0/11

profile pictureAWS
AmerO
answered 4 months ago
  • On the AWS side, I changed the local IPv4 network CIDR to 10.20.20.20 in the "Modify VPN connection options" menu. I also had to change the remote IPv4 network CIDR to the internal IP address of my NAT gateway's Elastic IP address otherwise the tunnel would not go up

  • Yassine, I just updated my answer. Keep the default values for Local and Remote IPv4 0.0.0.0/0 and test it. if it works, then start narrowing down the network address to an address that summarize all networks you want to reach over the VPN. For your case, both 10.10.10.10 and 10.20.20.20 can be reached if you allow 10.0.0.0/11

  • @Amer, I cannot contact both IPs at the same time if the local IPv4 CIDR range is 0.0.0.0/0. In any case, shouldn't the customer gateway configure the traffic selectors / security associations to match the local IPv4 CIDR range set on AWS?

0

Ideally, a local IPv4 network CIDR of 0.0.0.0/0 should allow you to reach both on-prem IP addresses. I would recommend checking the encryption domain configured on the customer gateway as well as confirming whether they are really running a route based VPN on the Cisco customer gateway. If it is indeed route based then they could use encryption domain as 0.0.0.0/0 for both sides which would resolve this issue.

profile pictureAWS
EXPERT
answered 4 months ago
0

There are a few things you can try to reach the two non-contiguous IP addresses on the on-premises network using a single VPN tunnel:

Verify that your customer gateway device supports and has asymmetric routing enabled. With asymmetric routing, the device can route traffic for different IP prefixes over different tunnels, allowing both addresses to be reachable over the single VPN connection.

Check the routing configuration on the customer gateway device. Make sure it has a route configured to send 10.10.10.10/32 traffic over one tunnel interface and 10.20.20.20/32 traffic over the other.

On the AWS side, ensure the transit gateway has VPN endpoint connection options enabled. This allows AWS to load balance traffic for different prefixes across both VPN tunnels.

Confirm the transit gateway route table associated with the VPC attachment has static routes defined for both 10.10.10.10/32 and 10.20.20.20/32 with the next hop as the transit gateway.

Verify connectivity at layer 3 by pinging between the IP addresses and checking the route tables show the traffic taking the expected paths over the tunnels.

profile picture
EXPERT
answered 24 days ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions