Written Labs
Written Lab 7.1: Create a VPN Attachment on a Transit Gateway Using the Console
- Using a web browser, open the Amazon VPC console at https://console.aws.amazon.com/vpc.
- Select Transit Gateway on the right.
- Select Create Transit Gateway in the AWS VPC console.
- Fill in the name tag and description and use AS number 65000 for the autonomous system number (ASN).
- Click Create Transit Gateway.
- Select Site-to-Site VPN Connections on the right.
- Click Create VPN Connection.
- In the Name Tag box, enter a name for your site-to-site VPN connection. Doing so creates a tag with a key of Name and the value that you specify.
- For Target Gateway Type, choose Transit Gateway, and choose the Transit Gateway instance just created to create the attachment.
- For Customer Gateway, do one of the following:
- To use an existing customer gateway, choose Existing, and then select the gateway to use in the pull-down menu. If your customer gateway sits behind a NAT device that’s enabled for NAT traversal, use the public IP address of your NAT device, and adjust your firewall rules to unblock UDP port 4500. If you do not have a public IP to use in this step, leave it blank and follow this lab until the end, but do not create the VPN as a public IP is required.
- To create a customer gateway, choose New.
- For IP Address, enter a static public IP address of your device’s outside interface. If you do not have a public IP to use in this step, leave it blank and follow this lab until the end, but do not create the VPN as a public IP is required.
- For Certificate ARN, if you are using certificate-based authentication, choose the ARN of your private certificate. For the BGP ASN, enter the BGP ASN of your customer network. Reference https://docs.aws.amazon.com/vpn/latest/s2svpn/cgw-options.html for additional information.
- For Routing Options, choose whether to use Dynamic.
- For Tunnel Inside IP Version, select IPv4. For Local IPv4 network CIDR, specify the IPv4 CIDR range on the on-premises customer gateway to specify which subnets are allowed to communicate over the VPN tunnels. Or open it to all networks by leaving this at the default of 0.0.0.0/0.
- In the Remote IPv4 Network CIDR dialog box, specify the IPv4 CIDR range on the AWS side that is allowed to communicate over the VPN tunnels. Or open it to all networks by leaving this at the default of 0.0.0.0/0.
- For the Tunnel 1 options, fill in the inside IPv4 CIDR range, which allows AWS to generate the pre-shared key for the tunnel, and review the tunnel options.
- Review the advanced tunnel information, which includes the following:
- Encryption algorithms for phases 1 and 2 of the IKE negotiations
- Integrity algorithms for phases 1 and 2 of the IKE negotiations
- Diffie-Hellman groups for phases 1 and 2 of the IKE negotiations
- IKE version 1 or 2
- Phase 1 and 2 lifetimes in seconds
- Re-key margin time
- Re-key fuzz
- Replay window size
- Dead peer detection interval
- Dead peer detection timeout action
- Startup action
For more information about these options, see https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNTunnels.html.
- Choose Create VPN Connection. Note that if you do not have a public IP address to terminate the VPN connection, the connection will not be created.
- When completed, delete the site-to-site VPN and the Transit Gateway instance.
Written Lab 7.2: Perform a traceroute
- Open a command console on a client computer; it can be either Windows or Linux.
- Enter traceroute aws.amazon.com (Linux) or tracert aws.amazon.com (Windows).
- Observe the text output of the network route taken from your computer to aws.amazon.com using DNS.
- Enter traceroute 18.154.211.6 (Linux) or tracert 18.154.211.67 (Windows).
- Observe the text output of the network route taken from your computer to aws.amazon.com using its IPv4 address.
- Explore the traceroute utility options using tracert /? for Windows or man traceroute for Linux.
Written Lab 7.3: Use ping
- Open a command console on a client computer; it can be either Windows, Linux, or macOS.
- Enter ping aws.amazon.com on either Linux, macOS, or Windows.
- Observe the text output of the ping responses from aws.amazon.com using DNS.
- Enter ping 18.154.211.6 on your local computer.
- Observe the text output of the network ping replies received from aws.amazon.com using its IPv4 address.
- Explore the ping utility options using ping /? for windows or man ping for Linux.