OpenVPN AWS VPC Peering Help
Posted: Mon Jun 10, 2019 8:28 am
I setup OpenVPN Access Server on an AWS VPC in region-1 and I am able to access everything from the client, but I am not able to access anything in region-2 via VPC peering. Anyone have any idea?
region-1 VPC subnet 10.100.0.0/16 <------------peer----------> region-2 VPC subnet 10.200.0.0/16
aws private subnet - 10.100.1.0/24 aws private subnet - 10.200.1.0/24
aws openvpn subnet - 10.100.2.0/24
Openvpn is configured to hand out dynamic ip subnet 10.250.1.0/24 to clients and it is using routing instead of NAT. I am using 10.250.1.0/24 instead of a subnet within 10.100.0.0/16 because I couldn't get it to work with a subnet within 10.100.0.0/16. The source and destination checks are disable for the openvpn instance. Security groups and VPC route tables are all configured. I check them multiple times. On the OpenVpn instance I can ping resources in region 2.
Wondering if subnet 10.250.1.0/24 is the problem since it's not part of any AWS VPC subnet. it's sort of a pseudo subnet.
region-1 VPC subnet 10.100.0.0/16 <------------peer----------> region-2 VPC subnet 10.200.0.0/16
aws private subnet - 10.100.1.0/24 aws private subnet - 10.200.1.0/24
aws openvpn subnet - 10.100.2.0/24
Openvpn is configured to hand out dynamic ip subnet 10.250.1.0/24 to clients and it is using routing instead of NAT. I am using 10.250.1.0/24 instead of a subnet within 10.100.0.0/16 because I couldn't get it to work with a subnet within 10.100.0.0/16. The source and destination checks are disable for the openvpn instance. Security groups and VPC route tables are all configured. I check them multiple times. On the OpenVpn instance I can ping resources in region 2.
Wondering if subnet 10.250.1.0/24 is the problem since it's not part of any AWS VPC subnet. it's sort of a pseudo subnet.