I have a hardware VPN tunnel configured through Amazon Web Services (AWS), to a subnet which contains private instances behind an Elastic Load Balancer. I would like to have instances at the other end of the tunnel be able to access my private instances, through the Load Balancer, by referencing a Public IP.
This is a requirement of a big corporate network, where they refuse to map private (e.g., 10.x.x.x, 172.16.x.x) addresses into their network. I have been told that the public IP's must be "NAT'ed" to the private IP's on our end. Would this be done using an Elastic IP and AWS NAT Gateway somehow?
To give a specific example of what I am looking for, suppose at the other end of the tunnel (corporate side), a client accesses the Elastic Load Balancer instance (e.g., elb-00000000.us-east-1.elb.amazonaws.com), which maps to a public IP. I want to include/map that public IP such that it is accessed through the secure VPN tunnel.
Alternative architecture suggestions are welcome; as long as fills requirement to access a load-balanced private instance through the VPN tunnel without routing the private address space into the remote corporate network.