We're migrating to a new jump host, migrating from a machine in-house. We also have 100+ customers that we will still need to communicate with via SSH. Their firewalls currently allow our primary office in via SSH, but not our AWS host. It takes time to migrate 100+ customers' firewalls, so until that is finished, we want to route all traffic for these IPs over a VPN that's already established so the traffic exits from our office and not the Internet Gateway (IGW) on Amazon.
I'm missing a few details in my education with regard to routing, so if someone could explain this to me, that would be great...
The VPC has this routing table:
0.0.0.0/0 -> igw
172.31.254.0/24 -> local
172.27.0.0/16 -> vgw
8.8.4.4 -> vgw
8.8.4.4
is Google's secondary DNS server that's open to all and has ICMP enabled, perfect for testing.
traceroutes show no hops. The connection seems to die after going nowhere. I'm obviously missing something, but I do not know what. How can I complete this setup so all traffic shoved to the Virtual Gateway (vgw) goes over the VPN?
full gallery here, individual images below
route table subnet associations
vgw details Not much useful here.
vpn status Only 1 tunnel is configured.
vpn static routes This is where the route table pulled the 172.27.224.0/24
address from.