1 Answer
- Newest
- Most votes
- Most comments
1
The AWS VPN Tunnel Inside IPv4 CIDR IP should be pingable, its essentially a P2P virtual tunnel interface.
I see a similar issue reported in this re:Post post but for PaloAlto you may want to check if Fortinet has a similar setting?
Relevant content
- asked a year ago
- asked 3 years ago
- asked 2 years ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
Thanks for the quick response and verifying that the IP should be pingable by default. I'll kick this back to the FortiGate administrator and have them check their side.
One other question out of curiosity the default Inside tunnel IPv4 CIDR is from 169.254.0.0/16 range, if you don't specify AWS generates this randomly; you can then validate what /30 was generated by downloading the configuration file from the console. Reference: https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html is there a reason you have chosen a different range for this? (69.254.44.121, 69.254.44.122)