S2S VPN Configuration

0
  1. Created Elastic IP address 18.153.118.134 (public IP) and associated it with the only existing ENI
  2. Created Customer Gateway. Specified the IP 18.153.118.134 when creating CG.
  3. Created Virtual Private Gateway. Attached VPG to the existing VPC.
  4. Enabled propagation in Route tables.
  5. In Security groups, allowed all traffic (Inbound) for IP 176.113.113.242/32 (our FortiGate) in the default group.
  6. Created site-to-site VPN.

We do not see requests on port 500/udp from our FortiGate. Should we build the VPN on our FortiGate with the created IP address 18.153.118.134? The issue is that in the information about the created VPN, we see two Outside IP addresses: 3.75.22.90 and 35.156.93.34. Are these arbitrary addresses allocated for building the 2-phase VPN?

AWS
已提问 5 个月前222 查看次数
2 回答
0

You see two Outside Public IP addresses because AWS VPN connection creates 2 tunnels within one VPN connection for high availability

https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html

You could download sample configuration file to use for configuring the customer gateway device in the Vendor dropdown you should be able to see FortiGate

https://docs.aws.amazon.com/vpn/latest/s2svpn/SetUpVPNConnections.html#vpn-download-config

profile pictureAWS
专家
已回答 5 个月前
0

Step 1 and step 5 are not applicable for AWS site to site VPN.

When you create a Site to Site VPN in the VPC console, you will be supplied 2 Tunnel IPs on the site to site configuration.

These are the 2 IPs which you need to configure your FORTINET. 3.75.22.90 and 35.156.93.34

From the console you can download the configuration file for the firewall of choice also.

Your tunnel does not connect with 18.153.118.134

profile picture
专家
已回答 5 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则