Score:0

AWS to pfsense site-to-site vpn

au flag

First of all, am a pfsense and AWS noobie, and this is my first big task on either system.

After creating a Site-to-site vpn between my PFsense andAWS instance, i can see the connections is stablished but no traffic is being send over the tunnel.

The configuration used:

  • pfsense public ip: XX.XXX.XXX.XXX
  • AWS public ip: YY.YYY.YYY.YYY
  • AWS vpc network: 10.50.0.0/16
  • my vpn network: 10.8.252.0/24
  • my local network: 10.8.240.0/20

Here you can see the connection stablished from the pfsense side: pfsense pfsense 2

The AWS side of the tunnel: AWS

I have 2 VMs running on each side of the VPN and try to ping each other, with no success

My tests were:

  1. after trying to ping between the 2 ends of the vpn, its not successfull
  2. trying a traceroute on each end, both end reach the router (pfsence and AWS border) but no traffic. So i tried to set a default route on each end to ensure the connection, still nothing.
  3. recreated the connections by trying different ip ranges, same problem.

What am i doing wrong? Can you help me with this?

thanks in advance. AWS Padawan

I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.