- Newest
- Most votes
- Most comments
in vpcDev and vpcProd, have default routes for all subnets that point to the Transit Gateway attachment in the AZs where the subnets are. You don't need anything else in those VPCs and it answers the question about how you can confirm that those VPCs are using the vpcNetwork for their traffic - because of the default route there is no other way for the traffic to go.
For a network of this size, in Transit Gateway have a single route table which has three routes in it:
- vpcDev CIDR range -> vpcDev
- vpcProd CIDR range -> vpcProd
- Default route -> vpcNetwork
Associate the route table with all three VPCs.
You should have a Transit Gateway attachment subnet in vpcNetwork but the private subnets will do just as well. In the private (or Transit Gateway attachment) subnets of vpcNetwork use the following route table:
- Default route -> NAT Gateway
In the public subnets of vpcNetwork use the following route table:
- Default route -> Internet Gateway
I'm going to assume that the Meraki appliance is in a public subnet. In that case, add the following route to the private subnet route table:
- 10.0.0.0/24 -> Meraki appliance
Make sure that the Meraki appliance has source/destination check disabled.
I setup the routing and I can ping VM on the Azure side, but it is not working in the opposite way from Azure VM to EC2 instance in vpcDev.
Relevant content
- Accepted Answerasked 6 years ago
- asked 4 years ago
- Accepted Answerasked 6 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 10 months ago
- AWS OFFICIALUpdated 2 years ago
I setup the routing and I can ping VM on the Azure side, but it is not working in the opposite way from Azure VM to EC2 instance in vpcDev.
You either have a firewall in the path or something performing a NAT operation. Run a
tcpdump
on the Azure VM and look at the source IP when you ping it. If it is the same as the EC2 instance then you have a firewall that is filtering traffic; if it is different then something is doing NAT.I will try that. Also, from the Azure VM we can ping CIsco Meraki EC2 instance (vpcNetwork), but not the EC2 instance in vpcDev.