AWS Transit Gateway through BGP propagation and routing behavior

0

When I added the VPN to a transit gateway attachment, the VPN route was automatically propagated through BGP to the routing table on the transit gateway.

  1. Is this an expected behavior for routes to propagate automatically when the routes are added to the attachment? This can cause a communication problem. The IP CIDR that is in use by the on-premise server engine might conflict with the VPC CIDR range.
  2. Is there a way to disable the route propagation setting for BGP on the routing table of the transit gateway?
AWS
已提問 4 年前檢視次數 3056 次
1 個回答
0
已接受的答案

If you've enabled the "Default route table propagation" option on your transit gateway (TGW), it will automatically propagate transit gateway attachments (like VPN) using the default route table. Note that this setting is enabled by default. To disable the "Default route table propogation" option, create a new transit gateway with the option disabled. You won't be able to disable this option by editing the TGW configurations.

If you've disabled the "Default route table propogation" option when you create your transit gateway, make sure to specify which route tables you want to propagate the routes to or from the VPN attachment.

profile pictureAWS
專家
已回答 4 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南