Тёмный

AWS Transit Gateway | Demo - Implementation of Transit gateway with VPN Tunnel Setup 

Cloud4DevOps
Подписаться 12 тыс.
Просмотров 18 тыс.
50% 1

Опубликовано:

 

10 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 54   
@pritidevi9706
@pritidevi9706 4 года назад
This is good service from AWS , easy to maintain and helps us to keep network architecture simple.. thanks ...
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Glad to hear that
@rajiv7
@rajiv7 Год назад
the content is just amazing...thanks for your efforts!!!
@Cloud4DevOps
@Cloud4DevOps Год назад
Glad you enjoy it!
@larskinder1138
@larskinder1138 4 года назад
Thank you for making this video. :)
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Appreciate your focus.. Thanks
@yogeshpatil8980
@yogeshpatil8980 Год назад
I created a VPC1 and created a linux instance in the same VPC and then created a Transit Gateway and attached that VPC1 to that then created another VPC in another region and configured openswan in that and attached that VPN with TGW and configured a tunnel between the two region and I am able to do ssh and ping from both sides then I created new VPC and configured another linux instance and attached that VPC to the TGW but I am not able to ping or do ssh from openswan to that new linux instance , I did routing at TGW and subnet level but still I am facing issue
@yogeshpatil8980
@yogeshpatil8980 2 года назад
I have created two VPCs in two regions, my aws side VPC is in us-west-1 region and on-prem vpc is in London region, My us-west-1 vpc is in private network and one instance is running in that and I have configured Openswan VPN and established a vpn tunnel in us-west-1 and London region, I am able to ping from openswan to EC2 instance and vice-versa but if I want to access internet in EC2 instance that is in private network over the VPN tunnel then how to do that ?
@Cloud4DevOps
@Cloud4DevOps 2 года назад
Access of internet in private network works from NAT gateway which provides internet to private system outbound.
@MuhammadWaqas-fq3yg
@MuhammadWaqas-fq3yg 2 года назад
Very great video :) ...
@Cloud4DevOps
@Cloud4DevOps 2 года назад
Thanks for the visit
@guru201799
@guru201799 4 года назад
Very well explained
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Glad it was helpful!
@guru201799
@guru201799 4 года назад
@@Cloud4DevOps [root@ip-10-20-0-54 ipsec.d]# service ipsec start Redirecting to /bin/systemctl start ipsec.service Job for ipsec.service failed because the control process exited with error code. See "systemctl status ipsec.service" and "journalctl -xe" for details. [root@ip-10-20-0-54 ipsec.d]# systemctl status ipsec.service ● ipsec.service - Internet Key Exchange (IKE) Protocol Daemon for IPsec Loaded: loaded (/usr/lib/systemd/system/ipsec.service; enabled; vendor preset: disabled) Active: failed (Result: start-limit) since Wed 2020-07-29 00:34:21 UTC; 15s ago Docs: man:ipsec(8) man:pluto(8) man:ipsec.conf(5) Process: 3978 ExecStartPre=/usr/libexec/ipsec/addconn --config /etc/ipsec.conf --checkconfig (code=exited, status=1/FAILURE) Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: ipsec.service: control... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: Failed to start Intern... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: Unit ipsec.service ent... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: ipsec.service failed. Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: ipsec.service holdoff ... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: start request repeated... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: Failed to start Intern... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: Unit ipsec.service ent... Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: ipsec.service failed. Hint: Some lines were ellipsized, use -l to show in full
@guru201799
@guru201799 4 года назад
@@Cloud4DevOps Journel error output -->-- Defined-By: systemd -- Support: lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit ipsec.service has failed. -- -- The result is failed. Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: Unit ipsec.service entered failed state. Jul 29 00:34:21 ip-10-20-0-54.eu-central-1.compute.internal systemd[1]: ipsec.service failed. Jul 29 00:35:19 ip-10-20-0-54.eu-central-1.compute.internal dhclient[3033]: XMT: Solicit on eth0, interval 122510ms. Jul 29 00:35:48 ip-10-20-0-54.eu-central-1.compute.internal amazon-ssm-agent[3229]: 2020-07-29 00:35:48 INFO Backing off health check t Jul 29 00:35:48 ip-10-20-0-54.eu-central-1.compute.internal amazon-ssm-agent[3229]: 2020-07-29 00:35:48 ERROR Health ping failed with e Jul 29 00:35:48 ip-10-20-0-54.eu-central-1.compute.internal amazon-ssm-agent[3229]: caused by: EC2MetadataError: failed to make EC2Meta Jul 29 00:35:48 ip-10-20-0-54.eu-central-1.compute.internal amazon-ssm-agent[3229]: caused by:
@guru201799
@guru201799 4 года назад
@@Cloud4DevOps When I try to start ipsec I am getting below error which is pasted. Do you see any clue what went wrong
@Cloud4DevOps
@Cloud4DevOps 4 года назад
There is an issue with the configuration which you are using or another reason may be related to OS issues..
@mhlaskar1991
@mhlaskar1991 4 года назад
Hi, I got the following error when when starting ipsec service: Failed to start Internet Key Exchange (IKE) Protocol Daemon for IPsec. Please suggest
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Its quite difficult to judge issue based upon the error you have mentioned. There might be several possibility as one of the dependent module is missing or your configuration has not been done properly , due to which deamon is not getting started. Try to find out the configuration issue.
@bolonabolona
@bolonabolona 4 года назад
remove the "auth=esp" line in /etc/ipsec.d/aws-vpn.conf file. This should fix your issue.
@bolonabolona
@bolonabolona 4 года назад
I am running into a corner case, where the TGW is not showing up in the route table. Do I need to create a TransitGatewayAttachement with the VPC first?
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Default route just add the attachment , ideally of your configuration is good then you dont have to worry about adding the CIDR as thats automatic.. So add the attachment as static route..
@vaisakhps7680
@vaisakhps7680 4 года назад
In IPSEC Tunnel #1 you have the rightsubnet=10.0.0.0/8 right? Is this the vpc CIDR of the target vpc? my question here is the vpn is connected to a TGW right, but why we are giving the vpc CIDR of N-Virginia region as rightsubnet?
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Correct. I have just taken a common wide range /8 due to multiple VPCs. Again range can be defined as per our requirement to make the communication based upon security best practices.
@akant74
@akant74 4 года назад
Is there a way to auto propagate the VPN routes to Frankfurt from the Transit Gateway down to the VPC? You are putting statics in at the vpc level to reach Frankfurt and I was curious why.
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Auto propagate VPN routes from one region to different region is something not supported as per best of my memory if something is i would be happy to learn. Regards to the route i have used the CIDR range of frankfurt for communication within the VPC. Static IP is given to the instance as i dont have jump/bastion host setup to ssh into system. Let me know if that makes sense..
@testingutopia
@testingutopia 4 года назад
Hi, I'm trying to setup this using AWS cli: raw.githubusercontent.com/flunkedutopian/aws-trangw-vpn/master/aws-vpn.sh I'm able to bring the tunnels up, however I'm unable to ping or SSH to the AWS side from the DataCenter side. Could you have a look and tell me what I could be doing wrong... I'm of the belief that this would be something with regards to Security groups, however even a wide permissive setup for Security group is not helping. Please help
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Its quite difficult to say at which step the process has failed. Have you checked the route back traffic as this needs to be there part of routing traffic from TGW to VPC and VPC to TGW , this is something i am not seeing in your route table . Also for ping enable iCMP traffic to check request.
@testingutopia
@testingutopia 4 года назад
@@Cloud4DevOps figured it out :) , that too before seeing this comment... you were right.. have updated the same: raw.githubusercontent.com/flunkedutopian/aws-trangw-vpn/master/aws-tgw-vpn.sh but thanks for lending an ear, very rare to find folks responding to queries, consider me subscribed for life
@Cloud4DevOps
@Cloud4DevOps 4 года назад
Great !!!
@saiangan
@saiangan 2 года назад
First of all, thanks for this amazing video. My vpn tunnel is up and running but I'm unable to ping any instance from my test site (openswan instance). At the other hand, other 3 instances which are connected thru TGW are pinging.
@Cloud4DevOps
@Cloud4DevOps 2 года назад
thanks.. If VPN tunnel is up and you are not able to ping instances then seems route is not correct plus check Security GP as well..
@shahinahmed3980
@shahinahmed3980 2 года назад
Hi Sunil, I was just wondering if you have discovered what is causing the ping block. i am having the same issue, i have follwoed the video step by step bu i cannot ping the instances from the vpn server.
@aruniyappan4087
@aruniyappan4087 8 месяцев назад
Same problem please let me knew if you found why?
@imamariefrahman5038
@imamariefrahman5038 4 года назад
what if the VPN routing set to dynamic using BGP?
@Cloud4DevOps
@Cloud4DevOps 4 года назад
You can use BgP routing as when you use a BGP device, you don't need to specify static routes to the Site-to-Site VPN connection because the device uses BGP to advertise its routes to the virtual private gateway. Hope that clears..
@imamariefrahman5038
@imamariefrahman5038 4 года назад
@@Cloud4DevOps I thought you have video for BGP, We have configured on our onpremise site, but IP Sec up and tunnel down. Doesnt know the issues. Is it because the onpremise side doesnt have BGP routing to our VPC?
@Cloud4DevOps
@Cloud4DevOps 4 года назад
@@imamariefrahman5038 No i have created video with Static routing.. If your router supports dynamic routing then you have to enter IP address and unique BGP ASN number to get this working..
@maheeshpm2758
@maheeshpm2758 Год назад
What about the second tunnel? How it will be used or connect it?
@Cloud4DevOps
@Cloud4DevOps Год назад
configure the 2nd tunnel in ur config on both sides.. process is same
@rishimr
@rishimr 3 года назад
Can you please share all the settings you did on the on premise side ec2 instance (after open swan installation), those two config files, and the entries, so that they can be copied and edited easily, thank you so much this was really helpful in learning and trying out.
@Cloud4DevOps
@Cloud4DevOps 3 года назад
On 2nd side with TGW you just have to allow rules in firewall and allow routing in RT..
@aruniyappan4087
@aruniyappan4087 8 месяцев назад
Can you specify the route configurations in on prem side​@@Cloud4DevOps
@rajatgupta3140
@rajatgupta3140 3 года назад
Can we connect using AWS site to site vpn vice versa ? I mean can we connect from AWS Private IP to my local Privite IP?
@Cloud4DevOps
@Cloud4DevOps 3 года назад
If we have connectivity from system to VPN then yes ..
@rajur7461
@rajur7461 3 года назад
Hi, How to enter the Routes in Franfurt (VPN) route tables pointing to NVirgina region?
@Cloud4DevOps
@Cloud4DevOps 3 года назад
Please check the router configuration you downloaded from site-to-site and take all routes/IPs and update the RT.
@rajur7461
@rajur7461 3 года назад
@@Cloud4DevOps Still facing issue. Lemme explain you further. Have 2 VPC's in Mumbai - 10.1.0.0/16 and 10.2.0.0/16 with each having 1 public subnets only. And for my VPN i have N.Viginia region with VPC 100.0.0.0/16 with 1 public subnet. Have configred transit gw with 2 vpc and 1 vpn attachments in mumbai. between vpc's, the ping is fine. I have updated in mumbai RT's the VPN (NVirginia - 100.0.0.0/16 with VPN attachment. When it comes to VPN (N.Virgina) RT, I need to create routes for 10.1.0.0/16 and 10.2.0.0/16 in mumbai, I don't which interface I need to select.
@Cloud4DevOps
@Cloud4DevOps 3 года назад
@@rajur7461 TGW works like a cloud router , so within default RT of TGW update both Mumbai IPs and within the actual RT allow one iP from which you can ping the other. Due to transitive nature you will be able to get ping communication working both ways.
@rajur7461
@rajur7461 3 года назад
@@Cloud4DevOps ok thanks. But if I one more subnet that is private in N.Virginia (VPN), how to update it's RT to communicate with other side (Mumbai) with CIDR of 10.0.0.0/16 etc
@Cloud4DevOps
@Cloud4DevOps 3 года назад
@@rajur7461 So ideally if you have multiple cidr in one region and they are connected via TGW , update the ZRT with both CIDR range or use generic private range 10.0.0.0/8
Далее
A small kitten was dumped #cat #kitten #cutecat
00:41
BeastMasters Hawk just had enough #ti13
00:30
Просмотров 291 тыс.
ГИГАЧАД МЭЙКЕР В PLANTS VS ZOMBIES 2!
00:49
Пришёл к другу на ночёвку 😂
01:00
AWS Site to Site VPN with Checkpoint Firewall
17:06
Просмотров 15 тыс.
A Deep Dive into AWS Transit Gateway
14:02
Просмотров 38 тыс.
How to setup AWS Transit Gateway
13:41
Просмотров 39 тыс.
Setup an AWS Site-to-Site Virtual Private Network (VPN)
18:33
Amazon Virtual Private Cloud (VPC) Routing Deep Dive
10:31
AWS Site To Site VPN (Part 1)
33:50
Просмотров 130 тыс.
A small kitten was dumped #cat #kitten #cutecat
00:41