S2S VPN Configuration

0
  1. Created Elastic IP address 18.153.118.134 (public IP) and associated it with the only existing ENI
  2. Created Customer Gateway. Specified the IP 18.153.118.134 when creating CG.
  3. Created Virtual Private Gateway. Attached VPG to the existing VPC.
  4. Enabled propagation in Route tables.
  5. In Security groups, allowed all traffic (Inbound) for IP 176.113.113.242/32 (our FortiGate) in the default group.
  6. Created site-to-site VPN.

We do not see requests on port 500/udp from our FortiGate. Should we build the VPN on our FortiGate with the created IP address 18.153.118.134? The issue is that in the information about the created VPN, we see two Outside IP addresses: 3.75.22.90 and 35.156.93.34. Are these arbitrary addresses allocated for building the 2-phase VPN?

AWS
已提問 5 個月前檢視次數 222 次
2 個答案
0

You see two Outside Public IP addresses because AWS VPN connection creates 2 tunnels within one VPN connection for high availability

https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html

You could download sample configuration file to use for configuring the customer gateway device in the Vendor dropdown you should be able to see FortiGate

https://docs.aws.amazon.com/vpn/latest/s2svpn/SetUpVPNConnections.html#vpn-download-config

profile pictureAWS
專家
已回答 5 個月前
0

Step 1 and step 5 are not applicable for AWS site to site VPN.

When you create a Site to Site VPN in the VPC console, you will be supplied 2 Tunnel IPs on the site to site configuration.

These are the 2 IPs which you need to configure your FORTINET. 3.75.22.90 and 35.156.93.34

From the console you can download the configuration file for the firewall of choice also.

Your tunnel does not connect with 18.153.118.134

profile picture
專家
已回答 5 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南