1 Antwort
- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
1
The AWS VPN Tunnel Inside IPv4 CIDR IP should be pingable, its essentially a P2P virtual tunnel interface.
I see a similar issue reported in this re:Post post but for PaloAlto you may want to check if Fortinet has a similar setting?
Relevanter Inhalt
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor einem Jahr
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor 2 Jahren
Thanks for the quick response and verifying that the IP should be pingable by default. I'll kick this back to the FortiGate administrator and have them check their side.
One other question out of curiosity the default Inside tunnel IPv4 CIDR is from 169.254.0.0/16 range, if you don't specify AWS generates this randomly; you can then validate what /30 was generated by downloading the configuration file from the console. Reference: https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html is there a reason you have chosen a different range for this? (69.254.44.121, 69.254.44.122)