Inbound network traffic blocked

0

Hi, all.

I'm using AWS as an extension of my on premise data center, and has been running this successfully for quite some time. Now I'm in process of migrating my on premise network to new infrastructure, and have enabled a new on premise firewall to connect to AWS using site-to-site VPN. This works in parallell with my old infrastructure, so both the old and new firewalls are connected.

The old firewall (Sonicwall) connects a LAN with 192.168.20.0/24. The new firewall (Fortigate) connects a LAN with 192.168.40.0/24.

I have added these subnets into the corresponding site-to-site VPN static routes. I have also added inbound rules (open for all TCP, UDP, ICMP) for the new x.x.40.0 subnet to the existing security group.

From a server in the VPC, I am now able to ping resources both on x.x.20.0 and x.x.40.0. If I ping from the .x.x.20.0 network I get a response. However, I cannot get an echo response when pinging the aws server from the x.x.40.0 network. I can see the ICMP packets being sent from a packet trace on the VPN interface of the Fortigate.

I have looked at this pretty much from every angle, and is a little stuck. Any hints on how to analyze this further is much appreciated.

Regards, Lars

已提問 2 年前檢視次數 458 次
1 個回答
0

Two things to look at:

  • Have you added the 192.168.40.0/24 route to the VPC route table(s)?
  • Check on the new firewall to make sure that the 192.168.40.0/24 range is not being NATted in some way.
profile pictureAWS
專家
已回答 2 年前
  • Hi.

    • Yes, the VPC route tables have the right routes, propagated from the site-to-site VPN routing settings.

    • No NAT is applied, verified now.

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南