{"id":29,"date":"2022-05-15T20:27:46","date_gmt":"2022-05-16T01:27:46","guid":{"rendered":"https:\/\/cloudlearning365.com\/?p=29"},"modified":"2022-10-14T09:38:11","modified_gmt":"2022-10-14T14:38:11","slug":"enable-private-connectivity-to-workloads-deployed-in-multiple-default-vpcs-part-1","status":"publish","type":"post","link":"https:\/\/cloudlearning365.com\/?p=29","title":{"rendered":"Enable private connectivity to workloads deployed in multiple default VPCs &#8211; Part 1"},"content":{"rendered":"\n<p>Scenario: One of our customers are primary in Azure, after merger and acquisitions, them acquired hundreds of AWS accounts, where workloads are deployed to default VPCs, which all have this address space: 172.31.0.0\/16<\/p>\n\n\n\n<p>They are looking for a solution to provide bi-directional private connectivity to these workloads in AWS from Azure without overhead of route management, also provide visibility to the traffic.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Here below is the proposed solution: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"606\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/10\/Overlap-IP-1024x606.png\" alt=\"\" class=\"wp-image-665\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/10\/Overlap-IP-1024x606.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/10\/Overlap-IP-300x177.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/10\/Overlap-IP-768x454.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/10\/Overlap-IP-1536x908.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/10\/Overlap-IP.png 1691w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In above diagram, Azure workloads are deployed in spoke vNets, these spoke vNets are attached to hub Transit FireNet and are fully routable.<\/p>\n\n\n\n<p>USEProdApp1Priv is deployed in private subnet.<\/p>\n\n\n\n<p>USEShared1Pub have an EIP that we can SSH to.<\/p>\n\n\n\n<p>Azure side have a summarized real CIDR of 10.100.0.0\/16<\/p>\n\n\n\n<p>AWS side top right corner, account1, we would use a Cisco CSR 1000<\/p>\n\n\n\n<p>AWS bottom right corner, account2, we would use a standalone Aviatrix Gateway<\/p>\n\n\n\n<p>Let&#8217;s take a look at the differences between Cisco CSR and Aviatrix Gateway<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Part 1 &#8211; Cisco CSR 1000 to Aviatrix Spoke GW mapped NAT configuration<\/h3>\n\n\n\n<p>Testing environment:<\/p>\n\n\n\n<p>Aviatrix Controller: 6.6.5545<br>Aviatrix Gateways: 6.6.5545<br>Cisco CSR 1000: 16.09.08<\/p>\n\n\n\n<p>Since bi-directional traffic is needed, in this configuration, IPs have one to one mapping.<\/p>\n\n\n\n<p>Azure side real CIDR: <strong>10.100<\/strong>.0.0\/16, we will use <strong>100.96<\/strong>.0.0\/16 for it&#8217;s virtual CIDR. <\/p>\n\n\n\n<p>AWS side will use virtual IP: 100.96.<strong>64.36<\/strong>, when tries to reach Azure side real IP: 10.100.<strong>64.36<\/strong><\/p>\n\n\n\n<p>Traffic flow from AWS side to Azure side, note NAT happens on Landing Spoke Gateway. (SIP = Source IP, DIP = Destination IP)<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td>AWS Client \/ CSR<\/td><td>Landing Spoke GW<\/td><td>Transit GW<\/td><td>Prod Spoke GW<\/td><td>Azure Client<\/td><\/tr><tr><td>SIP<\/td><td>172.31.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><\/tr><tr><td>DIP<\/td><td>100.96.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>AWS side real CIDR: <strong>172.31<\/strong>.0.0\/16, we will use <strong>100.64<\/strong>.0.0\/16 for it&#8217;s virtual CIDR.<\/p>\n\n\n\n<p>Azure side will use virtual IP: 100.64.<strong>0.10<\/strong>, when tries to reach AWS side real IP: 172.31.<strong>0.10<\/strong><\/p>\n\n\n\n<p>Traffic flow from Azure side to AWS side, note NAT happens on Landing Spoke Gateway. (SIP = Source IP, DIP = Destination IP)<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td>Azure Client<\/td><td>Prod Spoke GW<\/td><td>Transit GW<\/td><td>Landing Spoke GW<\/td><td>CSR \/ AWS Client<\/td><\/tr><tr><td>SIP<\/td><td>10.100.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><td>10.100.<strong>64.36<\/strong><\/td><td>100.96.<strong>64.36<\/strong><\/td><\/tr><tr><td>DIP<\/td><td>100.64.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><td>100.64.<strong>0.10<\/strong><\/td><td>172.31.<strong>0.10<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Launch CSR<\/h4>\n\n\n\n<p>In this test, selected: <strong>Cisco Cloud Services Router (CSR) 1000V &#8211; BYOL for Maximum Performance,<\/strong> you may need to subscribe to the market place image<\/p>\n\n\n\n<p>Default c5.large<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"690\" height=\"1024\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-690x1024.png\" alt=\"\" class=\"wp-image-34\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-690x1024.png 690w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-202x300.png 202w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-768x1139.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-1035x1536.png 1035w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image.png 1171w\" sizes=\"auto, (max-width: 690px) 100vw, 690px\" \/><\/figure>\n\n\n\n<p>Select your key pair and select the default VPC and a public subnet. Will need to obtain an EIP later for production workload<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"714\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-1-1024x714.png\" alt=\"\" class=\"wp-image-35\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-1-1024x714.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-1-300x209.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-1-768x535.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-1.png 1146w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Obtain public IPs of Aviatrix Spoke Gateways in Landing vNet, CSR need to establish IPSec connections to these two public IPs<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"263\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-2-1024x263.png\" alt=\"\" class=\"wp-image-36\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-2-1024x263.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-2-300x77.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-2-768x197.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-2-1536x395.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-2.png 1739w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>As such, need to modify CSR security group to allow UDP 500 and UDP 4500 from these two public IPs:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"664\" height=\"1024\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-3-664x1024.png\" alt=\"\" class=\"wp-image-37\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-3-664x1024.png 664w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-3-194x300.png 194w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-3-768x1185.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-3-996x1536.png 996w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-3.png 1141w\" sizes=\"auto, (max-width: 664px) 100vw, 664px\" \/><\/figure>\n\n\n\n<p>Launch instance<\/p>\n\n\n\n<p>Allocate EIP, then associate the EIP with CSR<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"814\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-4-1024x814.png\" alt=\"\" class=\"wp-image-39\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-4-1024x814.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-4-300x238.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-4-768x611.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-4.png 1234w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Test connect to CSR<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh -i &lt;your-pem-key&gt; ec2-user@54.176.62.223 -oKexAlgorithms=+diffie-hellman-group14-sha1<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Create Site to Cloud connection using Mapped NAT in Aviatrix Controller<\/h4>\n\n\n\n<p>Goes to Aviatrix controller web page, SITE2CLOUD -&gt; Setup -&gt; 2 Create a New Site2CloudConnection -&gt; ADD NEW<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"466\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-5-1024x466.png\" alt=\"\" class=\"wp-image-41\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-5-1024x466.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-5-300x137.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-5-768x350.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-5.png 1247w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>VPC ID\/VNet Name : Select Landing vNet<br>Connection Type: Mapped<br>Connection Name: This is the name used for Aviatrix to track the Site2Cloud connection<br>Remote Gateway Type: Generic<br>Tunnel Type: Route Based<br>IKEv2: Enabled by default<br>Enable HA: Checked as we do have two gateways deployed for HA<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"903\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-6-1024x903.png\" alt=\"\" class=\"wp-image-43\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-6-1024x903.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-6-300x264.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-6-768x677.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-6.png 1478w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Primary Cloud Gateway: Select Primary Aviatrix Landing GW<br>Remote Gateway IP address: Enter CSR&#8217;s public IP<br>Backup Gateway: Select HA Aviatrix Landing GW<br>Remote Gateway IP Address (Backup): Enter CSR&#8217;s public IP<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"835\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-7-1024x835.png\" alt=\"\" class=\"wp-image-44\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-7-1024x835.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-7-300x245.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-7-768x626.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-7.png 1481w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Remote Subnet (Real): 172.31.0.0\/16<br>Remote Subnet (Virtual): 100.64.0.0\/16<br>Local Subnet (Real): 10.100.0.0\/16<br>Local Subnet (Virtual): 100.96.0.0\/16<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"430\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-8-1024x430.png\" alt=\"\" class=\"wp-image-45\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-8-1024x430.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-8-300x126.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-8-768x322.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-8-1536x644.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-8.png 1621w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Click OK to create the Site2Cloud connection<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">CONFIGURE CSR<\/h4>\n\n\n\n<p>Select the newly created Site2Cloud connection, and click on Edit button <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"109\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-9-1024x109.png\" alt=\"\" class=\"wp-image-46\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-9-1024x109.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-9-300x32.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-9-768x82.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-9-1536x163.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-9-2048x218.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Under <strong>Connection Detail<\/strong>:<\/p>\n\n\n\n<p>Vendor: Cisco<br>Platform: IS, ASR, or CSR<br>Software: IOS(XE)<\/p>\n\n\n\n<p>Click on <strong>DOWNLOAD CONFIGURATION<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-11-1024x614.png\" alt=\"\" class=\"wp-image-48\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-11-1024x614.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-11-300x180.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-11-768x461.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-11-1536x921.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-11.png 1551w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This will create a text file for configuring your CSR<\/p>\n\n\n\n<p>Sample content of the file, I&#8217;ve highlighted sections need to be changed, note that although we do have two tunnels, only one can be active due to static route.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>! Aviatrix Site2Cloud configuration template\n!\n! This configuration serves as a general guideline and may have to be modified to\n! be functional on your device.\n!\n! If the provided encryption or authentication type is configured as 'n\/a', then\n! there was not a known mapping from the selected type to the encryption or\n! authentication type expected by the Cisco device.  Please reference the Cisco\n! documentation for your device and replace 'n\/a' with the expected configuration.                                                                                                 \n! \n! This connection has two IPsec tunnels between the customer gateway and \n! Aviatrix gateways in the cloud. Tunnel #1 is the primary tunnel. The \n! customer gateway should be configured in such a way that it should\n! switch over to tunnel #2 when tunnel #1 fails.\n! \n! You need to populate these values throughout the config based on your setup:\n! &lt;crypto_policy_number&gt;: the IKE crypto policy number\n! &lt;tunnel_number1&gt;: the primary IPSec tunnel interface number\n! &lt;tunnel_number2&gt;: the backup IPSec tunnel interface number\n! &lt;ios_wan_interface1&gt;: the primary source interface of tunnel packets\n! &lt;ios_wan_interface2&gt;: the backup source interface of tunnel packets\n! &lt;customer_tunnel_ip1&gt;: any un-used IPv4 address for the primary tunnel interface\n!                        when static routing is used (e.g. 1.1.1.1)\n! &lt;customer_tunnel_ip2&gt;: any un-used IPv4 address for the backup tunnel interface\n!                        when static routing is used (e.g. 1.1.1.3)\n! &lt;netmask&gt;: netmask for customer_tunnel_ip. Please use 255.255.255.255\n!\n! --------------------------------------------------------------------------------\n! IPSec Tunnel #1 (Primary)\n! --------------------------------------------------------------------------------\n! #1: Internet Key Exchange (IKE) Configuration\n! A policy is established for the supported ISAKMP encryption, \n! authentication, Diffie-Hellman, lifetime, and key parameters.\n!\ncrypto ikev2 proposal avx-s2c-20.127.181.210\n  encryption aes-cbc-256\n  integrity sha256\n  group 14\n  exit\n!\ncrypto ikev2 policy <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">&lt;crypto_policy_number&gt;<\/mark>\n  proposal avx-s2c-20.127.181.210\n  exit\n!\ncrypto ikev2 keyring 54.176.62.223-20.127.181.210\n  peer 54.176.62.223-20.127.181.210\n    address 20.127.181.210\n    identity address 20.127.181.210\n    pre-shared-key P0645IO6UJ8Z8uEf0eXapGxKXlck35L0c124rjFc\n    exit\n  exit\n!\ncrypto ikev2 profile 54.176.62.223-20.127.181.210\n  match identity remote address 20.127.181.210 255.255.255.255\n  identity local address 54.176.62.223\n  authentication remote pre-share\n  authentication local pre-share\n  keyring local 54.176.62.223-20.127.181.210\n  lifetime 28800\n  dpd 10 3 periodic\n  exit\n!\n!---------------------------------------------------------------------------------\n! #2: IPSec Configuration\n! The IPSec transform set defines the encryption, authentication, and IPSec\n! mode parameters.\n!\ncrypto ipsec transform-set 54.176.62.223-20.127.181.210 esp-256-aes esp-sha256-hmac\n  mode tunnel\n  exit\ncrypto ipsec df-bit clear\n!\ncrypto ipsec profile 54.176.62.223-20.127.181.210\n  set security-association lifetime seconds 3600\n  set transform-set 54.176.62.223-20.127.181.210\n  set pfs group14\n  set ikev2-profile 54.176.62.223-20.127.181.210\n  set security-association lifetime kilobytes disable\n  set security-association lifetime seconds 3600\n  exit\n!\n!---------------------------------------------------------------------------------------\n! #3: Tunnel Interface Configuration\n! The virtual tunnel interface is used to communicate with the remote IPSec endpoint \n! to establish the IPSec tunnel.\n!\ninterface Tunnel <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">&lt;tunnel_number1&gt;<\/mark>\n  ip address 169.254.56.181 255.255.255.252\n  ip mtu 1436\n  ip tcp adjust-mss 1387\n  tunnel source <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">&lt;ios_wan_interface1&gt;<\/mark>\n  tunnel mode ipsec ipv4\n  tunnel destination 20.127.181.210\n  tunnel protection ipsec profile 54.176.62.223-20.127.181.210\n  ip virtual-reassembly\n  exit\n!\n!\n! --------------------------------------------------------------------------------\n! IPSec Tunnel #2 (Backup)\n! --------------------------------------------------------------------------------\n! #4: Internet Key Exchange (IKE) Configuration\n!\ncrypto ikev2 keyring 54.176.62.223-20.85.248.161\n  peer 54.176.62.223-20.85.248.161\n    address 20.85.248.161\n    identity address 20.85.248.161\n    pre-shared-key SyeqOQqT1cvMO2uwR4jHciXSn8Yn3AVYr8CE1dNh\n    exit\n  exit\n!\ncrypto ikev2 profile 54.176.62.223-20.85.248.161\n  match identity remote address 20.85.248.161 255.255.255.255\n  identity local address 54.176.62.223\n  authentication remote pre-share\n  authentication local pre-share\n  keyring local 54.176.62.223-20.85.248.161\n  lifetime 28800\n  dpd 10 3 periodic\n  exit\n!\n!---------------------------------------------------------------------------------\n! #5: IPSec Configuration\n! The IPSec transform set defines the encryption, authentication, and IPSec\n! mode parameters.\n!\ncrypto ipsec transform-set 54.176.62.223-20.85.248.161 esp-256-aes esp-sha256-hmac\n  mode tunnel\n  exit\n!\ncrypto ipsec profile 54.176.62.223-20.85.248.161\n  set security-association lifetime seconds 3600\n  set transform-set 54.176.62.223-20.85.248.161\n  set pfs group14\n  set ikev2-profile 54.176.62.223-20.85.248.161\n  set security-association lifetime kilobytes disable\n  set security-association lifetime seconds 3600\n  exit\n!\n!---------------------------------------------------------------------------------------\n! #6: Tunnel Interface Configuration\n! The virtual tunnel interface is used to communicate with the remote IPSec endpoint\n! to establish the IPSec tunnel.\n!\ninterface Tunnel <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">&lt;tunnel_number2&gt;<\/mark>\n  ip address 169.254.41.117 255.255.255.252\n  ip mtu 1436\n  ip tcp adjust-mss 1387\n  tunnel source <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">&lt;ios_wan_interface2&gt;<\/mark>\n  tunnel mode ipsec ipv4\n  tunnel destination 20.85.248.161\n  tunnel protection ipsec profile 54.176.62.223-20.85.248.161\n  ip virtual-reassembly\n  exit\n!\n!---------------------------------------------------------------------------------------\n! #7: Routing Configuration\n! The static route directs the local traffic to the Aviatrix remote subnets via the tunnel\n! interface. When the primary tunnel, Tunnel&lt;tunnel_number1&gt; is down, the &lt;tunnel_number1&gt;\n! should be replaced with the backup tunnel, &lt;tunnel_number2&gt;.\n!\nip route 100.96.0.0 255.255.0.0 Tunnel<mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">&lt;tunnel_number1&gt;<\/mark>\n!---------------------------------------------------------------------------------------\n!\n!\nFor vendor specific instructions, please go to the following URL:\nhttp:&#47;&#47;docs.aviatrix.com\/#site2cloud\n<\/code><\/pre>\n\n\n\n<p>Sample completed configuration:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>! Aviatrix Site2Cloud configuration template\n!\n! This configuration serves as a general guideline and may have to be modified to\n! be functional on your device.\n!\n! If the provided encryption or authentication type is configured as 'n\/a', then\n! there was not a known mapping from the selected type to the encryption or\n! authentication type expected by the Cisco device.  Please reference the Cisco\n! documentation for your device and replace 'n\/a' with the expected configuration.                                                                                                 \n! \n! This connection has two IPsec tunnels between the customer gateway and \n! Aviatrix gateways in the cloud. Tunnel #1 is the primary tunnel. The \n! customer gateway should be configured in such a way that it should\n! switch over to tunnel #2 when tunnel #1 fails.\n! \n! You need to populate these values throughout the config based on your setup:\n! &lt;crypto_policy_number&gt;: the IKE crypto policy number\n! &lt;tunnel_number1&gt;: the primary IPSec tunnel interface number\n! &lt;tunnel_number2&gt;: the backup IPSec tunnel interface number\n! &lt;ios_wan_interface1&gt;: the primary source interface of tunnel packets\n! &lt;ios_wan_interface2&gt;: the backup source interface of tunnel packets\n! &lt;customer_tunnel_ip1&gt;: any un-used IPv4 address for the primary tunnel interface\n!                        when static routing is used (e.g. 1.1.1.1)\n! &lt;customer_tunnel_ip2&gt;: any un-used IPv4 address for the backup tunnel interface\n!                        when static routing is used (e.g. 1.1.1.3)\n! &lt;netmask&gt;: netmask for customer_tunnel_ip. Please use 255.255.255.255\n!\n! --------------------------------------------------------------------------------\n! IPSec Tunnel #1 (Primary)\n! --------------------------------------------------------------------------------\n! #1: Internet Key Exchange (IKE) Configuration\n! A policy is established for the supported ISAKMP encryption, \n! authentication, Diffie-Hellman, lifetime, and key parameters.\n!\ncrypto ikev2 proposal avx-s2c-20.127.181.210\n  encryption aes-cbc-256\n  integrity sha256\n  group 14\n  exit\n!\ncrypto ikev2 policy <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">1<\/mark>\n  proposal avx-s2c-20.127.181.210\n  exit\n!\ncrypto ikev2 keyring 54.176.62.223-20.127.181.210\n  peer 54.176.62.223-20.127.181.210\n    address 20.127.181.210\n    identity address 20.127.181.210\n    pre-shared-key P0645IO6UJ8Z8uEf0eXapGxKXlck35L0c124rjFc\n    exit\n  exit\n!\ncrypto ikev2 profile 54.176.62.223-20.127.181.210\n  match identity remote address 20.127.181.210 255.255.255.255\n  identity local address 54.176.62.223\n  authentication remote pre-share\n  authentication local pre-share\n  keyring local 54.176.62.223-20.127.181.210\n  lifetime 28800\n  dpd 10 3 periodic\n  exit\n!\n!---------------------------------------------------------------------------------\n! #2: IPSec Configuration\n! The IPSec transform set defines the encryption, authentication, and IPSec\n! mode parameters.\n!\ncrypto ipsec transform-set 54.176.62.223-20.127.181.210 esp-256-aes esp-sha256-hmac\n  mode tunnel\n  exit\ncrypto ipsec df-bit clear\n!\ncrypto ipsec profile 54.176.62.223-20.127.181.210\n  set security-association lifetime seconds 3600\n  set transform-set 54.176.62.223-20.127.181.210\n  set pfs group14\n  set ikev2-profile 54.176.62.223-20.127.181.210\n  set security-association lifetime kilobytes disable\n  set security-association lifetime seconds 3600\n  exit\n!\n!---------------------------------------------------------------------------------------\n! #3: Tunnel Interface Configuration\n! The virtual tunnel interface is used to communicate with the remote IPSec endpoint \n! to establish the IPSec tunnel.\n!\ninterface Tunnel <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">1<\/mark>\n  ip address 169.254.56.181 255.255.255.252\n  ip mtu 1436\n  ip tcp adjust-mss 1387\n  tunnel source <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">GigabitEthernet1<\/mark>\n  tunnel mode ipsec ipv4\n  tunnel destination 20.127.181.210\n  tunnel protection ipsec profile 54.176.62.223-20.127.181.210\n  ip virtual-reassembly\n  exit\n!\n!\n! --------------------------------------------------------------------------------\n! IPSec Tunnel #2 (Backup)\n! --------------------------------------------------------------------------------\n! #4: Internet Key Exchange (IKE) Configuration\n!\ncrypto ikev2 keyring 54.176.62.223-20.85.248.161\n  peer 54.176.62.223-20.85.248.161\n    address 20.85.248.161\n    identity address 20.85.248.161\n    pre-shared-key SyeqOQqT1cvMO2uwR4jHciXSn8Yn3AVYr8CE1dNh\n    exit\n  exit\n!\ncrypto ikev2 profile 54.176.62.223-20.85.248.161\n  match identity remote address 20.85.248.161 255.255.255.255\n  identity local address 54.176.62.223\n  authentication remote pre-share\n  authentication local pre-share\n  keyring local 54.176.62.223-20.85.248.161\n  lifetime 28800\n  dpd 10 3 periodic\n  exit\n!\n!---------------------------------------------------------------------------------\n! #5: IPSec Configuration\n! The IPSec transform set defines the encryption, authentication, and IPSec\n! mode parameters.\n!\ncrypto ipsec transform-set 54.176.62.223-20.85.248.161 esp-256-aes esp-sha256-hmac\n  mode tunnel\n  exit\n!\ncrypto ipsec profile 54.176.62.223-20.85.248.161\n  set security-association lifetime seconds 3600\n  set transform-set 54.176.62.223-20.85.248.161\n  set pfs group14\n  set ikev2-profile 54.176.62.223-20.85.248.161\n  set security-association lifetime kilobytes disable\n  set security-association lifetime seconds 3600\n  exit\n!\n!---------------------------------------------------------------------------------------\n! #6: Tunnel Interface Configuration\n! The virtual tunnel interface is used to communicate with the remote IPSec endpoint\n! to establish the IPSec tunnel.\n!\ninterface Tunnel <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">2<\/mark>\n  ip address 169.254.41.117 255.255.255.252\n  ip mtu 1436\n  ip tcp adjust-mss 1387\n  tunnel source <mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">GigabitEthernet1<\/mark>\n  tunnel mode ipsec ipv4\n  tunnel destination 20.85.248.161\n  tunnel protection ipsec profile 54.176.62.223-20.85.248.161\n  ip virtual-reassembly\n  exit\n!\n!---------------------------------------------------------------------------------------\n! #7: Routing Configuration\n! The static route directs the local traffic to the Aviatrix remote subnets via the tunnel\n! interface. When the primary tunnel, Tunnel&lt;tunnel_number1&gt; is down, the &lt;tunnel_number1&gt;\n! should be replaced with the backup tunnel, &lt;tunnel_number2&gt;.\n!\nip route 100.96.0.0 255.255.0.0 Tunnel<mark style=\"background-color:#ffe2c7\" class=\"has-inline-color\">1<\/mark>\n!---------------------------------------------------------------------------------------\n!\n!\nFor vendor specific instructions, please go to the following URL:\nhttp:&#47;&#47;docs.aviatrix.com\/#site2cloud\n<\/code><\/pre>\n\n\n\n<p>Now goes to CSR<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>conf t<\/code><\/pre>\n\n\n\n<p>Then paste the modified code into CSR console<\/p>\n\n\n\n<p>Switch back to Aviatrix Controller, SITE2CLOUD -&gt; Setup -&gt; Refresh, in a few minutes and you should see the connection status is Green and Up<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"148\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-12-1024x148.png\" alt=\"\" class=\"wp-image-50\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-12-1024x148.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-12-300x43.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-12-768x111.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-12.png 1307w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If the connection doesn&#8217;t come up in a few minutes, you can go to SITE2CLOUD -&gt; Diagnostics -&gt; Select the connection -&gt; Action: Run analytics or Show Logs <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Observe route tables in Azure vNets<\/h4>\n\n\n\n<p>It&#8217;s worth to note that Aviatrix inject RFC1918 routes into spoke subnets route tables pointing to Aviatrix Spoke Gateways, this steers all traffic towards transit.<\/p>\n\n\n\n<p>In the Landing vNet, since we just created a Site2Cloud connection with static route, Aviatrix controller is aware of this intention and programed AWS virtual CIDR 100.64.0.0\/16 point to Aviatrix Spoke Gateway in Landing vNet<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"421\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-18_54_21-USELanding-Private-subnet-1-rtb-Microsoft-Azure-1024x421.png\" alt=\"\" class=\"wp-image-54\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-18_54_21-USELanding-Private-subnet-1-rtb-Microsoft-Azure-1024x421.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-18_54_21-USELanding-Private-subnet-1-rtb-Microsoft-Azure-300x123.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-18_54_21-USELanding-Private-subnet-1-rtb-Microsoft-Azure-768x316.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-18_54_21-USELanding-Private-subnet-1-rtb-Microsoft-Azure-1536x632.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-18_54_21-USELanding-Private-subnet-1-rtb-Microsoft-Azure.png 1976w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Then how do we get traffic to other connected spoke vNet or even across transits? Note below, Prod spoke vNet only have RFC1918 routes added, and 100.64.0.0\/16 is missing:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"413\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-14-1024x413.png\" alt=\"\" class=\"wp-image-55\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-14-1024x413.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-14-300x121.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-14-768x310.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-14-1536x620.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-14.png 1923w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">Allow Site2cloud connection to be accessiable across transit<\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>Select newly created Site2Cloud connection, and click on Edit button:<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"198\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-15-1024x198.png\" alt=\"\" class=\"wp-image-56\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-15-1024x198.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-15-300x58.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-15-768x148.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-15-1536x297.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-15.png 1578w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Scroll and Enable <strong>Forward Traffic to Transit Gateway<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"663\" height=\"167\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-10.png\" alt=\"\" class=\"wp-image-47\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-10.png 663w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-10-300x76.png 300w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Aviatrix Controller -&gt; MULTI-CLOUD TRANSIT -&gt; List -&gt; Spoke -&gt; Select primary Landing Gateway -&gt; ACTIONS -&gt; Auto Advertise Spoke Site2Coud CIDRs<br><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"514\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-16-1024x514.png\" alt=\"\" class=\"wp-image-57\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-16-1024x514.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-16-300x150.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-16-768x385.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-16-1536x770.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-16.png 1571w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>When you click on Enable, you should see 100.64.0.0\/16 is been advertised now, since it&#8217;s part of landing spoke Site2Cloud CIDRs<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"395\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-17.png\" alt=\"\" class=\"wp-image-58\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-17.png 703w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-17-300x169.png 300w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/figure>\n\n\n\n<p>Check Prod vNet route table again, and you can see that 100.64.0.0\/16 gets added by Aviatrix controller pointing to Prod Spoke Gateway<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"442\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-18-1024x442.png\" alt=\"\" class=\"wp-image-59\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-18-1024x442.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-18-300x130.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-18-768x332.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-18-1536x663.png 1536w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-18.png 1936w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Test connectivity<\/h4>\n\n\n\n<p>From the CSR 172.31.10.60 ping via GigabitEthernet 1<\/p>\n\n\n\n<p>ping USEProdApp1Priv 10.100.<em>64.36<\/em> using virtual IP: <strong>100.96<\/strong>.<em>64.36<\/em><\/p>\n\n\n\n<p>ping USEShared1Pub 10.100.100.4 using virtual IP: <strong>100.96<\/strong>.<em>100.4<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1016\" height=\"444\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-19.png\" alt=\"\" class=\"wp-image-61\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-19.png 1016w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-19-300x131.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-19-768x336.png 768w\" sizes=\"auto, (max-width: 1016px) 100vw, 1016px\" \/><\/figure>\n\n\n\n<p>From USEShared1Pub 10.100.100.4<br>ping CSR 172.31.10.60 using virtual IP: <strong>100.64<\/strong>.<em>10.60<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"894\" height=\"411\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-20.png\" alt=\"\" class=\"wp-image-62\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-20.png 894w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-20-300x138.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-20-768x353.png 768w\" sizes=\"auto, (max-width: 894px) 100vw, 894px\" \/><\/figure>\n\n\n\n<p>From USEProdApp1Priv 10.100.64.36<br>ping CSR 172.31.10.60 using virtual IP: <strong>100.64<\/strong>.<em>10.60<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"354\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-21.png\" alt=\"\" class=\"wp-image-63\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-21.png 888w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-21-300x120.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-21-768x306.png 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">How about workloads on the same Default VPC as CSR?<\/h4>\n\n\n\n<p>We need to perform following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Add route table on subnets to point to CSR 172.31.10.60 for CIDR range: 100.96.0.0\/16. In my case since I&#8217;m deploying it to the same subnet as CSR, I needed 0\/0 pointing to IGW as well.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"807\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-21_05_30-VPC-Management-Console-\u2014-Mozilla-Firefox-1024x807.png\" alt=\"\" class=\"wp-image-69\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-21_05_30-VPC-Management-Console-\u2014-Mozilla-Firefox-1024x807.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-21_05_30-VPC-Management-Console-\u2014-Mozilla-Firefox-300x236.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-21_05_30-VPC-Management-Console-\u2014-Mozilla-Firefox-768x605.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/2022-05-15-21_05_30-VPC-Management-Console-\u2014-Mozilla-Firefox.png 1491w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li> Disable source\/destination check on the CSR EC2 instance. (Azure equivalent <strong>Enable IP Forwarding<\/strong>) <\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"319\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-22-1024x319.png\" alt=\"\" class=\"wp-image-66\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-22-1024x319.png 1024w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-22-300x93.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-22-768x239.png 768w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-22.png 1496w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1007\" height=\"673\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-23.png\" alt=\"\" class=\"wp-image-67\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-23.png 1007w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-23-300x200.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-23-768x513.png 768w\" sizes=\"auto, (max-width: 1007px) 100vw, 1007px\" \/><\/figure>\n\n\n\n<p>From test instance 172.31.3.67 in default VPC, it&#8217;s able to:<\/p>\n\n\n\n<p>ping USEShared1Pub 10.100.100.4 using virtual IP: <strong>100.96<\/strong>.<em>100.4<\/em><br>ping USEProdApp1Priv 10.100.<em>64.36<\/em> using virtual IP: <strong>100.96<\/strong>.<em>64.36<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"902\" height=\"643\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-24.png\" alt=\"\" class=\"wp-image-70\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-24.png 902w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-24-300x214.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-24-768x547.png 768w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/figure>\n\n\n\n<p>From USEShared1Pub 10.100.100.4<br>ping test instance 172.31.3.67 using virtual IP: <strong>100.64<\/strong>.<em>3.67<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"834\" height=\"212\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-25.png\" alt=\"\" class=\"wp-image-74\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-25.png 834w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-25-300x76.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-25-768x195.png 768w\" sizes=\"auto, (max-width: 834px) 100vw, 834px\" \/><\/figure>\n\n\n\n<p>From USEProdApp1Priv 10.100.64.36<br>ping test instance 172.31.3.67 using virtual IP: <strong>100.64<\/strong>.<em>3.67<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"836\" height=\"210\" src=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-26.png\" alt=\"\" class=\"wp-image-75\" srcset=\"https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-26.png 836w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-26-300x75.png 300w, https:\/\/cloudlearning365.com\/wp-content\/uploads\/2022\/05\/image-26-768x193.png 768w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cloudlearning-365 wp-block-embed-cloudlearning-365\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"NMl4fZPrsy\"><a href=\"https:\/\/cloudlearning365.com\/?p=77\">Enable private connectivity to workloads deployed in multiple default VPCs &#8211; Part 2<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Enable private connectivity to workloads deployed in multiple default VPCs &#8211; Part 2&#8221; &#8212; cloudlearning365\" src=\"https:\/\/cloudlearning365.com\/?p=77&#038;embed=true#?secret=nve9zcppNz#?secret=NMl4fZPrsy\" data-secret=\"NMl4fZPrsy\" width=\"584\" height=\"329\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Scenario: One of our customers are primary in Azure, after merger and acquisitions, them acquired hundreds of AWS accounts, where workloads are deployed to default VPCs, which all have this address space: 172.31.0.0\/16 They are looking for a solution to &hellip; <a href=\"https:\/\/cloudlearning365.com\/?p=29\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-29","post","type-post","status-publish","format-standard","hentry","category-aviatrix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=29"}],"version-history":[{"count":22,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/29\/revisions"}],"predecessor-version":[{"id":692,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=\/wp\/v2\/posts\/29\/revisions\/692"}],"wp:attachment":[{"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=29"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=29"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudlearning365.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}