Site-to-Site VPN
Site-to-Site VPN
Site-to-Site VPN
By default, instances that you launch into an Amazon VPC can't communicate with your
own (remote) network. You can enable access to your remote network from your VPC
by creating an AWS Site-to-Site VPN (Site-to-Site VPN) connection, and configuring
routing to pass traffic through the connection.
Although the term VPN connection is a general term, in this documentation, a VPN
connection refers to the connection between your VPC and your own on-premises
network. Site-to-Site VPN supports Internet Protocol security (IPsec) VPN connections.
Each VPN connection includes two VPN tunnels which you can simultaneously
use for high availability.
Customer gateway: An AWS resource which provides information to AWS
about your customer gateway device.
Customer gateway device: A physical device or software application on
your side of the Site-to-Site VPN connection.
AWS Management Console— Provides a web interface that you can use to
access your Site-to-Site VPN resources.
AWS Command Line Interface (AWS CLI) — Provides commands for a
broad set of AWS services, including Amazon VPC, and is supported on
Windows, macOS, and Linux. For more information,
AWS SDKs — Provide language-specific APIs and takes care of many of the
connection details, such as calculating signatures, handling request retries,
and error handling. For more information
Query API— Provides low-level API actions that you call using HTTPS
requests
CREATING VPC
Provide a name for your subnet and select the VPC from the drop-
down list.
Then add the IPv4 CIDR block and click on the create button.
Subnet created successfully.
We will have an existing route table for the VPC which we created
earlier.
Provide a relevant name for this routing table.
Select the Internet Gateway link under Virtual Private Cloud section.
Click on Create Internet Gateway button.
Select the VPC from the drop-down list and click on Attach.
Now we need to add the routing entry for the Internet Gateway
connection. To do that, click on Routing tables link and select the
entry which we create earlier.
Click on the NAT Gateways link under Virtual Private Cloud section.
To create a new NAT Gateway, Click on the Create NAT
Gateway link.
Select the relevant subnet from the drop-down list. In this demo, we
select AZ-Subnet. Also, click on create a new EIP link to provide a
new EIP for this Gateway.
Click on Create NAT Gateway button.
Provide a name for your connection and add the public address of
your internal network firewall. Then click on create customer
gateway button.
Customer Gateway created successfully.
Select the VPC from the drop-down list and click on the Attach
button.
After a few minutes, VPN status has been changed to the attached
state.