Third-Party Inspection Firewall Issues
Third-Party Inspection Firewall Issues
00:37
So this destination PC is is any like other third party accountant and they have their own,
correct?
00:49
06:48
07:01
07:10
Okay.
07:14
Yeah, inspection.
07:16
07:19
Just a second.
07:21
07:27
07:37
07:47
Yeah.
08:00
So, there is a default route pointing towards some another clearingLet me share this on the page.
08:09
So what this one is, this one is the route, the default route was transit gateway clearing
attachment.
08:16
Uh And this attachment, this attachment is redford, is associated with another transit gateway
connecting.
08:25
08:26
08:34
yeah And as per the architecture which I found on the internal case, so that transit detail should
be this one.
08:46
0137.
08:58
09:06
09:20
09:22
This is your...
09:25
09:29
09:31
09:34
09:36
09:59
Yeah, so...
10:02
10:08
10:10
So, you know, all this 252, the destination is 250, 250 is the third party, right?
10:18
Yeah.
10:19
If you look at the diagram, our destination is 252 in 254, these are our third parties.
12:01
12:46
13:12
13:46
Yeah, sure.
13:48
I'll be here.
13:51
13:57
Hey, Satish.
14:01
14:09
Satish, can I also ask, we use this meeting, claims chat,for this purpose because the verifiers can't
see that other Teams umm chat.
14:21
14:24
14:26
14:27
14:29
Thank you.
14:30
14:33
I can let you use this Teams chat as well for me.
14:35
17:40
Hey, Josh.
17:41
17:42
Hello.
17:50
Joshua, can you start sharing his screen for us then, please?
17:54
OK, ready.
18:06
18:10
So can you can we try capturing what is our next floor should beIf everyone was seeing the
screen, that's the definition that you see, they will already explore that.
18:26
So yeah.
18:29
18:47
18:50
You can search for 10.240, OK, you already see this traffic, right?
18:52
18:55
18:59
You're also...
19:00
19:04
19:08
19:09
19:11
Oh, OK.
19:40
So from this 10.2 portage, you are not receiving any mapping as well, right?
19:46
19:52
Uh, on the firewall, do you see the allow logs, the inspection?
19:56
Yeah.
19:58
And the routing on that firewall is, like in the routing of that firewall for this IP, 10.175
ispointing towards the doesn't have the routes on the firewall towards like to the transit gateway
or let's say the TPC endpoint.
20:21
20:28
We can do one thing, we can take the low load zone clearing attached.
20:36
On this is a .
20:40
Can you tell me the, in the, now let us do this, the time waiting?
21:00
Uh, sure.
21:10
21:38
21:40
22:04
Can you just copy this log with that?
22:06
22:11
22:13
Paste button.
22:14
Uh, yeah.
24:03
...
24:03
...
24:06
24:10
24:11
24:11
24:31
24:36
24:37
So it's getting to the third party inspection firewall, umm and then once it goes out, we don't
know where it's going.
24:46
Like it may not be getting to Behrend, but I can't say because I've got nothing back.
24:52
24:56
25:00
Yeah, then you can also where they have continuous things.
25:04
Okay, yeah, I'm not seeing anything on the first firewall from Barent, but I can see Genesis
originated traffic.
25:20
Okay, so second firewall, I can see the Barent coming in as well, and it's the same as the other
day.
25:25
So it comes into Barent, hits the firewall, goes off, we don't see anything back.
25:31
25:37
25:42
Okay.
25:42
25:48
I would be thinking then, just give me a few seconds to confirm that.
25:52
Yeah.
25:56
If that is the case, then whatever work we did to send it over to the inspection is kind of black
hole to reply to.
26:03
Yeah.
26:16
So...
26:17
nothing in East-West, anything originated from Genesis is not making this far as East-West.
26:24
Yeah.
26:24
So, Yesh, I just want to let you know, in the last meeting that we did, if you see my screen,There
was a 10-00/8 going to our existing .
26:38
26:40
We removed the .
26:46
27:06
I think that is not required because you have already appointed a default route towards your
firewall, right?
27:13
To the third party party.
27:19
Because this this default route which has a target towards VPC, then further this traffic will go to
the firewall, right?
27:28
And then the firewall will inspect and forward this traffic backto the endpoint and then the
endpoint will forward this traffic to the transit window, correct?
27:40
Yeah.
27:41
27:46
27:47
27:52
Can you check the default format for this transit window products?
27:58
28:00
28:02
28:04
28:13
In this transit, you can see our source is uh from the destination VPC which is 1017.
29:37
29:41
29:45
29:46
So we are in third party but once it goes to the inspection firewall right, then it just disappears.
29:55
And still it's coming till our new country and then sending to them.
30:04
30:05
30:10
30:16
Yeah.
30:18
30:22
Yeah.
30:22
We have the...
30:26
30:29
UhCDC, okay, this is your East-West VPC, then CDC, then CDC.
30:53
Let's take another transit geter goal of this CD, peering attachment between the East-West VPC
instruction.
31:05
31:09
31:30
31:32
31:45
Yeah, that.
31:58
32:02
Did you search for the earlier one which we were searching?
32:06
Uh, okay.
32:10
32:16
255 or 156?
32:23
Yeah.
32:28
32:29
32:35
There is something in between this, like there is something in the inspection which is not
allowing for Akit to go through from destination to source or from source to destination.
32:48
32:52
James here.
32:53
32:56
33:01
But there's one thing to change, like if the traffic is by default open, right, if we are considering
explicitly anything.
33:10
33:15
Like from the firewall, the traffic should reach the attachments.
33:21
And when we initiate from one site, we see it in the first inspection agency, which should then go
through our second transit gateway to the second inspection agency.
33:34
33:43
33:53
So, there are two inspections because the first is east-west, right?
33:57
33:58
So, traffic from east-west is getting introduced to the inspection which we see which is
currently...
34:10
Sorry, Yash, just to confirm, so it was coming from the east-west side, we see it in east-west,
then we see it in the...
34:20
in the new spectrum that you see, okay, but we we never see a reply.
34:24
34:27
Now if I, if we do it the other way, and also, we see traffic going to the new spectrum there, if
you see, when it leaves the east, it never hits the east-west one.
34:42
34:49
So we have NACL as well, you know, if I show, if I, you know, get the system...
34:59
We have the NACL services, but let me show you the subnets...
35:06
35:18
Hello.
35:18
Yeah.
35:20
If I look at this management one, yeah, because maybe the thing is not...
35:27
Mostly...
35:28
35:35
35:47
35:51
35:54
35:59
36:05
So again, what is the, you know, I'm looking at security groups at the new instruction file.
36:15
What will be the idealIt's not a good idea to be open, yeahIn the asks, if we can open that, yeah.
36:24
So on the inspection, you can see we're basically allowing the 10 network to the 10 network in
vice processor, so it's a lot more open than it should be.
36:34
36:36
36:39
So what, yes, if outbound is allowed, yeah, in most, it has to be allowed, but yeah, I can...
36:45
36:46
36:51
37:12
So this is inbound group or the traffic which will arrive from the destination, right?
37:19
Yeah.
37:21
I think now it should work.
37:25
37:28
Let's...
37:29
Because...
37:31
37:33
37:37
No.
37:38
I've got a consistentLeon, can you just ping the IP which you are trying to bring and also this
website which you are bringing?
38:14
38:15
38:20
38:25
38:38
So currently these things are running from destination account, right, Sadhu?
39:02
39:06
Okay.
39:08
OkaySo these are the docs, these are the current things, right?
39:18
39:20
Okay.
39:26
74264.
39:29
39:34
39:36
So this is going into the inspection, if we see the firewall, then we should be able to seeOK, so
can you please check again logs on this attachment?
40:36
Yeah, 2DDB.
40:37
Yeah, 2DDB.
40:40
And check for the latestYeah.
40:50
40:57
41:03
Yeah, this one is the peering attachment between inspection UPC and this destination among the
UPC.
41:13
41:50
41:53
41:58
42:03
Wait, waitThis is the round table for which this is inspection VPC route table?
42:08
42:18
42:23
42:27
42:38
42:52
Okay, yeah, so yeah, here the route is there for 10-170, I think, 10-175, 10-150 power.
43:02
43:05
I think, no, no, I think hereHow it is not required because once the traffic lands on the peering
attachment but see what is happening right now the traffic itself is not arriving at peering
attachment, right?
43:24
43:28
Yeah, the peering attachment between the third party and installation ATC.
43:32
Okay.
43:33
43:38
Yeah.
44:47
Here we don't need to require to add the route because what will happen?
45:09
UhOnce firewall forward the traffic to VPC at one right again, then VPC on endpoint has the
subnet has the default route towards peering attachment, correct?
45:19
Now once traffic land on the peering attachment, it will report the route table of this another
another transit peering attachment which was your third party transit gateway.
45:31
137 peering and in in that peering attachment route table all the routes are there 10, 175, 10, 175,
253 routes are there.
45:41
Okay.
45:43
Shashi, can you just show us the route table, you know, the peering is routing.
45:51
45:55
So most likely the traffic is when getting inspected from firewall, it is got arranged at the peering
or the peering attached.
46:10
46:11
46:14
46:19
And then the VPG endpoint will forward this traffic to the proper attached.
46:25
46:32
.........
48:26
Or else what we can do, just to confirm if the traffic is not arriving at the peering attachment, we
can take step by step flow logs fromInspection VPC attachment and then PLU attachment so we
can get a...
48:58
49:04
Hello?
49:15
49:32
...
52:33
Yeah, Satish, can you check the flow logs on this inspection UPC attachment once?
52:40
52:45
52:57
53:02
Inspection...
53:03
00 a.m.
53:18
53:25
Okay, this one is, so let's just understand, okay, time 240 is the source, time 1 certified
destination.
53:33
53:36
Okay, yes.
53:38
53:41
53:47
53:49
53:56
There is no investor.
54:06
54:14
Hello?
54:15
Sayal?
54:18
Um..
54:19
55:00
55:10
55:14
A PRing attachment.
57:13
Destination here...
57:15
time 175.
57:31
AttachmentAttachment attachment.
57:48
East-West traffic.
57:50
This inspection.
00:14
00:15
00:19
OK, just see this attachment.
00:22
00:23
1024054156.
00:26
00:28
Now the first line which we see that the Uh traffic is arriving at the attachment TGW 58D means
this is the source attachment right?
00:41
And beside given is our source inspection VPC and the subnet.
00:46
00:53
I think there is one routing issue is there when traffic is moving out of the inspection ETC right
on the inspection ETC attachment.
01:40
You can see it is going back again to the same peering attachment to the east, West, correct.
01:48
OK, yeah.
01:50
01:55
02:16
02:18
02:46
04:14
Can you see which on this routing this transit to the roundtable associated to which attachment I
just shared in the chat.
04:23
04:31
04:38
Yeah, associated with the East West and also the main East West and also OK in the diagram if I
show you this one.
04:44
04:47
04:50
So for on the East West tracking for 175, then on 175 is forwarding our PRA for PRA.
05:05
OK, so I'm going to show that there is any issue with the routing, but still I'm not sure why it is
forwarding routing back to the peering attachment.
05:17
05:19
Yeah.
05:21
05:24
This is not the existing or existing CDC attachment attachment for the peering one.
05:31
05:33
05:36
Okay.
05:37
To internal anything here pointing to 10, 240 and there is a default route pointing towards .
05:44
05:49
05:52
05:55
Okay.
05:55
These are .
05:57
06:02
06:06
That's why I wanted to check, you know, let's say that let's let's say source is our on 10 and the
OK finish is correct.
06:13
Yeah.
06:13
So it is this firewall.
06:16
06:21
06:27
No, I I have.
06:29
06:31
Yeah.
06:32
Yeah, the 101 simplified step was to the pairing, pairing attachment and then attachment, you
know, is with the inspection.
06:39
06:42
AADAA is this one.
06:48
AADA, yeah, but AADA is fine, but the other side of the gateway, this is the attachment, pairing
attachment.
06:55
06:56
07:01
OK, inspection, VPC, why this attachment, why it's attachment and not the not the not attached.
07:09
07:11
07:17
07:22
Can you can you take just take VPC flow load off the inspection VPC once?
07:30
Because we see whether traffic is moving back to the east-west peering attachment.
07:59
09:24
Set it to.
10:22
Yes.
10:24
I don't know.
10:27
10:34
10:41
10:42
10:43
10:46
10:55
Trying 5062.
11:11
11:14
11:37
00:19
Yeah.
00:22
Only thing is allowed by the firewall, but we maybe we can ask James to open some other code.
00:29
00:33
00:39
00:51
01:37
ICMP was being allowed a little more bypass than the inspection VPC was changed.
01:44
01:48
01:51
01:53
01:58
Yeah, firewall is allowing ICMP, but it's not allowing other ports.
02:02
Sure.
02:03
But what I'm getting at is ICMP was working when we were bypassing the.
02:08
Oh yeah, you're saying it's allowed.
02:12
Yeah, correct.
02:12
02:15
Yes.
02:15
So yes.
02:16
Yeah, yes.
02:16
You know, when when the when we started working on the way.
02:22
02:26
Yeah.
02:27
02:31
SG on the firewall.
02:34
02:43
02:50
So you think there's something wrong with the firewall?
02:53
02:56
That's it.
02:57
03:04
OK.
03:12
It's strange though because James was saying he saw ICMP out pounds.
04:46
But why is it getting blocked in when I'm seeing that in the 14 measure?
04:52
05:54
00:06
Yeah.
00:06
00:10
00:13
02:31
02:38
Yeah.
02:40
02:54
Yeah.
02:54
03:03
So currently like the traffic is getting allowed from the firewall like it was saying like it is a one
way traffic.
03:13
03:21
03:36
03:38
03:41
03:42
I can do 5 to.
04:01
04:12
05:02
05:06
Yeah, yeahI mean, I don't know if it's getting to the other end and the sim is getting dropped,
being dropped or the sim is not getting there.
05:21
06:05
06:07
This is the main inspection traffic is going through the inspection we see.
06:16
06:39
Let's check the routing for 10175 on this firewall when it is forwarding to because we need to
check the routing where the firewall is forwarding OK.
07:09
07:15
07:20
I'm sorry.
07:23
07:32
So James wants to show wants to see how you are forwarding the traffic to.
07:39
So yeah, James, if we can help with like from the firework inspection firewall where the traffic is
routed for this 10 or 175?
07:56
08:03
08:04
08:08
08:10
Yeah.
08:13
08:16
08:19
Yeah, it's the ramps out from the inspection firewalls and if there's no PC that we need to check,
yes.
08:26
So like I want to check basically on the the firewall has the internal routes also, right, like for
10175 it is pointing towards some LAN or so, so citation you go to network place and set
advance.
08:46
08:53
09:06
09:10
So this says whatever AZ the traffic comes in on, make sure it goes out.
09:16
09:17
So we just forward back out to the big reload dots at any time.
09:33
10:19
10:22
10:25
Ping to fast?
10:28
10:30
Yeah.
10:30
Yeah.
10:43
Okay.
10:44
10:46
10:47
11:27
Firewall gateway load balance traffic forward the inspection to firewall the traffic east West of
us looking for another one.
11:53
Satish, can you just let me take that screenshot for the I think we need we need to involve to see.
12:20
12:46
12:52
12:54
12:56
12:58
OK, yeah.
14:23
We might need to open the because we can only see this ohh one way traffic right on the fire.
14:41
15:16
15:18
We are seeing the ether, but now after we need to check where it is going.
So the log which to the log which we saw were on the inspection, not on the eastwest building,
right?
00:26
00:29
Yeah, the allowed one which we saw one way traffic logs.
00:32
Yeah, it is.
00:35
00:41
00:43
So this is the main part right between the distribution account and this.
00:59
Yeah, this is the.
01:03
01:07
01:13
Traffic is getting forwarded by East West and there is no issue over there.
01:18
01:27
02:57
03:44
I'm well.
03:44
Thank you.
03:47
Yeah.
03:50
So I see you mentioned checking that you can look on that a lot in the case.
03:56
Yeah, so I just want, I just explained the new architectures that we have.
04:02
Yeah, so currently what we're seeing is we are seeing one bit traffic, you know.
04:07
One bit traffic.
04:08
04:12
No response from?
04:14
Yeah.
04:14
04:16
04:20
So I just we have a server at on premises here Genesis and we have to connect to the third party
account and we'll an example of and the and our existing transit gateway and then and then
comes back to instant transit gateway.
04:41
04:44
It inspects in the, you know, new subnet, but after that, it just drops.
04:51
04:59
Are you seeing, are you seeing the ingress on the inspection file?
05:05
05:10
OK, so yes, yeah, so Victoria, I just, I just pasted the traffic flow on the set.
05:20
05:22
So when traffic arrives from the on premise, there is one East West firewall which will perform
the inspection then pass over traffic to me another inspection firewall.
05:34
So from East West traffic gets inspected and then over the peering attachment it goes to another.
05:41
Uh, inspection VPC which has the firewall and then that firewall will again perform the
expression and uh hand over the traffic to the peering attachment with another account.
05:51
05:55
So what we are seeing like on the firewall we can only just see the one way traffic like the traffic
is going out but there is no response back.
06:06
So we just wanted to check like so this can you show that firewall runs inspection VPC firewall.
06:14
Yeah.
06:15
06:21
06:25
So we are sending different traffic S/A towards this green-way load balance endpoint on EZA,
EZB and EZC, right?
06:34
06:42
06:46
06:48
UhCan you help us like taking a log on the side to check if the firewall is sending back this
traffic to the endpoints and then further it is going towards the transit gate or not.
07:06
OK, so from load balancer perspective, yes, we only we do only have BTC flow logs.
07:16
OK, yeah.
07:17
Those those are the only in terms of logs to have a look at.
07:21
We only have flow logs that are available at the gateway point.
07:26
Yeah of view.
07:28
Maybe one I would like to ask on the transit gateway side of things, have you enabled appliance
mode?
07:35
07:38
Yeah.
07:38
So appliance mode is enabled for both the inspection UPCS needs to extend the final inspection
PC.
07:46
We are seeing the traffic incoming, but yeah, on the firewall we are not able to see any response.
07:53
07:57
I saw, I verified the routing is correct, all the configuration routables are attached and all.
08:04
We just want to verifySo let's let's have a look at, I think you shared with me the load balancer
on the chat.
08:17
08:20
08:24
OK, then again, we'll need to see the VPC to reach the flow logs.
08:29
If the flow logs are there, we'll need to ensure that they're in custom format.
08:35
So that that would allow us to have a view on the gateway load balancer side of things.
08:40
But between the gateway load balancer and the firewall, these are on GENI.
08:45
So ideally from that perspective, we're not able to see anything much more than on what your
firewall appliance has to say.
08:55
So allow me to just check VPC flow logs and see what format they are in, if enabled.
09:04
09:37
Is it, is it, is it just to confirm again, is the traffic not being seen on the the inspection VPC in the
traffic flow that you shared on 75F?
10:03
This is where you are seeing no return traffic to the third party account.
10:11
Or is it as well not seen on the East West VPC where inspection VPC where it ends with BD244
on both the VPC's I think we are not able to see the return traffic.
10:30
Yes.
10:35
So in this diagram, this VPC, right, something is wrong either with this VPC, the traffic hits this
firewall, but after that, you know, the respond doesn't come at all.
10:50
Either some, you know, this kind of the third party, the traffic reaches this instructions VPC, but
after that it doesn't.
11:00
11:08
11:09
11:14
11:38
I'm just looking at the VPC flow logs.
11:40
11:44
11:46
11:51
11:55
It will take some time for the custom one to take effect.
12:02
Let me just send on the team's chat to what the EMS is actually for me to do looking at.
00:13
00:16
00:16
00:18
00:20
So so that I I'm able to just so you want something, you know, just get rid of them.
00:27
00:32
00:35
00:35
00:36
00:40
Endpoints.
00:41
Yes, it is.
00:43
00:44
00:47
00:47
Okay.
00:48
Yeah.
00:50
Endpoints.
00:51
Endpoints.
01:03
01:06
01:10
01:16
01:26
01:28
Yeah.
01:29
Thank you.
01:38
01:41
OK.
01:56
02:00
02:03
OK, sure.
02:04
Thank you.
00:26
01:10
So this is.
01:15
01:18
01:22
let's go to custom let's go to custom let's see the time I'll just stop last 30 minutes from now let's
see.......
01:35
and I'm searching for the source againthis one, but there's some multiple things happening here.
02:02
02:06
02:09
But we need to be looking at the source of the of the the one that's sent in the king.
02:16
So you're looking at 10, 10, 20, so these are the ones that are sent in the king.
02:20
Okay.
02:24
Is that to Amanda?
02:29
Yeah.
02:32
02:51
02:56
03:00
So this we can...
03:02
03:05
03:13
03:26
03:27
03:32
03:45
Yes, yeah.
03:58
04:25
04:30
04:35
Like this?
04:37
04:38
Is that in there?
04:39
Okay.
04:40
04:41
I'll take the sources and destination from the from the chat as well.
04:53
Yeah.
04:56
05:20
05:47
Yes.
05:47
05:49
Okay.
05:49
And you can also look through the number ENI as well.
05:55
And let's see whether you have any ICs corresponding to your software.
06:00
And you know the stages are not really for us, so I'll just add it here.
06:06
Okay.
06:06
06:15
06:17
07:01
We download this.
07:05
Just probably clearing all of that site that you know for a project meeting for now and then.
07:15
07:20
07:28
...
07:29
07:33
That's, you know, it's not like an easy step, because it involves multiple new components, and I
guess we got each and every layer.
07:44
07:46
we know where the issue is, but we actually don't know exactly.
07:50
07:53
We haven't.
07:55
Did you?
07:56
I know Baron, the inspection on the test again because it did originally, originally go last
Wednesday.
08:06
Yeah.
08:06
08:08
08:09
Hello.
08:10
08:13
OK.
08:13
08:23
I thought the verifies would have asked you, but obviously not them.
08:30
We actually, in the design, there was no inspection procedure, because they already inspected
here, but...
08:48
08:52
08:55
No worries.
08:58
09:09
Yes.
09:33
OK, transition.
09:36
Yes.
09:36
Do you want.
09:45
09:48
09:49
And then...
10:02
Okay.
10:04
Do you have any other thoughts sending traffic to this festival destination as well?
10:10
10:12
10:29
10:40
10:46
11:11
Last 30 minutes.
11:18
11:31
11:35
So the ingress here on the traffic that you shared on the chat earlier, so the ingress here reaches
the 975F gateway in Bandanza endpoint.
11:46
And the next hub should be the transit gateway umm735B0DB, correct?
11:56
Yeah.
11:56
And when we look at the routing for for this, remind us going through together.
12:02
12:09
Yeah, yeah, sure.
12:13
12:15
Thank you.
12:16
12:22
The simplest one what you see here, it is associated with all our VPCs, given the direct
connection gateway.
12:27
12:32
12:34
12:40
12:45
And this out table, our east-westWe searched for also associated with this content and this, you
know, for this table we have propagated everything.
12:57
We wanted to know around the data from cases, even other UPCs, right?
13:02
And also, we have some static, we have static rules for the clear impact.
13:11
13:23
13:29
13:31
13:32
13:35
13:41
13:44
13:46
Yeah, in the...
13:48
Attachment of the steering assessment, we are sending everything to the inspection VTC and
inspection VTC.
14:00
14:06
9.5S.
14:07
So, for this route, we are sending M175, 252 and 254 to the period.
14:17
14:25
14:28
For this one, you will prepare the external one and it won't be.........
14:47
The main thing what we have observed, we are not seeing any from firewall because if the traffic
is better expected, then the traffic should be viewable based on the VPC .
15:12
15:16
However, I just want to see if from the routing table, I want to see that I think they have
downloaded this.
15:26
15:28
And from the source of what I'm seeing here being 7252.32.
15:39
15:43
15:48
18:06
22:31
22:32
22:38
Okay.
22:39
22:50
22:59
23:00
So let's see.
23:31
23:39
23:45
23:48
24:01
24:07
And back end hardware, you know, there's no hardware we send to the endpoint.
24:18
24:20
24:23
So this place here we're looking at isI give to the dependence of endpoints, let me just say.
24:31
24:42
UCB.
24:48
Just a moment.
24:53
25:10
...
25:18
So, appliance mode has to be enabled on the on the VPC attachment or...
25:22
25:27
attachment, right?
25:29
No, it is not.
25:30
Yeah So, yes, you're confirming that on the inspection BPT assessment appliance mode has been
enabled.
26:01
Okay.
26:01
26:46
And could we have a look at the file on the itself, or after we see this, the plan ?
26:51
26:58
Can we look at the firewall, just confirming we just went through, you mentioned on the
inspection VPC firewall we've already, I mean inspection VPC attachment we've enabled the
plans for.
27:10
Okay, cool.
27:12
Can we look at this, once you see on your firewall, I believe you are looking at the different
routes.
27:19
27:23
27:26
Yeah.
27:45
27:49
28:00
28:04
Yes, so if you look at the forward graphic, you see how the result is sent packets for no received.
28:12
So the the traffic is getting to the firewall, being sent out, but we don't see the return.
28:19
Okay, so let's look at first the ingress package as sent by the endpoint.
28:26
28:27
28:32
28:39
Yeah.
28:45
So I'm looking at, we're looking at the source to you as it goes to the new transit gateway.
28:56
29:07
Yeah, yeah, yeah, yeahUh, Satish, it might be on the other far wall.
29:54
Okay, but, you know this I'm trying to apply here, but why is this not working?
29:59
Is it not overlaps?
30:02
30:05
Okay.
30:15
30:19
30:25
30:27
30:34
Yeah.
30:36
31:01
31:04
Maybe just .
31:51
Yes.
31:51
32:04
Yes.
32:05
32:30
32:32
32:51
It goes back to 135, 253, 36, just to confirm again that's IP.
33:06
33:12
33:21
33:26
33:33
And so once it receives it, can we see the the next packet thumbs up?
33:41
34:01
34:04
Um, sure.
34:04
On this...
34:06
34:11
34:14
Uh..
34:14
Uh, okay.
34:14
I see.
34:14
I see.
34:14
34:19
Uh..
34:20
532.
34:21
It's...
34:25
Okay.
34:28
I see...
34:29
source...
36:06
36:08
Could you just select one of that control again from the panel?
36:14
36:18
36:21
36:23
36:28
36:35
C is the...
36:39
3 is it the one...
36:43
36:48
37:29
37:33
It was easy.
37:34
A, B and C.
37:35
37:38
Sure.
37:39
So we have the static branch to them and we're routing the 10 networks to it.
37:44
37:48
So these these are the GENI interfaces andThey should correspond to the AZs of Gateway Load
Balancer, the address.
38:04
38:09
Yeah.
38:13
Yes, I have to go pick up my daughter from JK.
38:16
38:19
38:27
38:28
We're just trying to see the the routing between now the inspection VPC in terms of the
endpoints of the AG and WP.
38:34
38:39
38:42
Thanks.
39:35
39:39
39:46
Yeah.
39:47
So now...
41:20
So, just give me a moment, I'm also giving a second eye on burn...
41:24
41:39
Could you just go to your VPC flow logs, please, on the cloud?
41:42
41:45
41:49
Okay.
41:49
41:51
Sure, no problem.
41:52
42:09
42:13
...
42:13
42:24
42:29
42:39
42:41
42:46
42:50
42:52
42:53
Or is it continuous?
42:56
42:57
42:59
So you could just put last 30 minutes or 10 minutes, I don't know, could use a custom filter.
43:05
43:08
Okay.
43:08
Yeah.
43:12
...
43:12
43:18
Here we go.
43:45
43:47
43:53
Sorry, could you just help me out with how you do this?
43:56
43:59
Not sure.
44:01
Export.
44:02
Exporting CSV.
44:08
44:09
It's alright.
44:18
44:21
44:26
It's...
44:27
44:28
44:34
Mm-hmmYep.
44:35
44:39
Um..
44:39
44:42
I think it's because it's not, there's a way we could do it, but let's just keep it simple.
44:47
44:48
So, based on the format, it's field one, two, three, four.
45:02
I'm just trying to look at the packet source address, packet source is quick.
45:08
45:14
45:16
45:39
So based on this, if we look at this particular egress flow, let's see what ENI this is, what ENI is
this.
45:49
45:54
46:21
So, but on the ENR is A41, so this PGW attachment on which is on this that is on 2C.
46:45
46:48
...
46:48
I can use that to ingress again, just change the filter to ingress.
47:03
So let me just scroll to the left a bit, let's see the ENI.
47:11
49:38
49:41
49:48
I just wanted to clarify, so the medical suitability does mean once that were notified to the
organization service, it's a multi-disciplinary, it's not a screen or we have the .
50:02
50:05
50:08
There is consensus within the group that there was this clarification around the decision making.
50:17
Um, we certainly.
51:10
51:11
51:18
51:24
The The one, I don't know which particular file you'd logged in, Ali.
51:31
51:35
So, let me ask, do you see any other return traffic for another destination or is it just only this...
51:44
51:48
51:51
And previously, we had to wait with them without the inspection, but as soon as we did that, we
getSo essentially, you're not able to get any fix through irregardless of the source, so you're just
troubleshooting based on different sources, right?
52:12
So you don't have any successful flows through this particular setup?
52:18
Yeah, my question was, are you having any successful flows through this particular inspection
on WebPT?
52:30
52:35
You know As I was saying, this inspection DPC is new, and this whole intrinsic gateway is new.
52:43
52:45
52:48
So we we are able to get it working both ways without the inspection DPC.
52:56
53:00
As soon as we added the inspection PPC, so for instance, if we start from here, we see it go into
the inspection PPC, we see it leave, but it never comes back.
53:11
Now, if we start from the other end, so we we have other firewalls here, I see it hit this firewall,
this inspection PPC, I see it hit this one, but then it's forwarded out, but we never see the return.
53:27
53:29
That's why I think we need to look at the the egress from the inspection BPC, its routes, and then
the return.
53:37
53:43
I'll go back to your original question, so this is a new inspection BPC, so we have no other traffic
than this going through it.
53:51
53:53
So just checking on that because ideally what happens is when the traffic addresses to the VPC,
the first drop point will be the transit gateway subnets, they're routed to the firewall, the gateway
advance endpoint.
54:10
So the traffic is received back from the firewall on Geneve, the the gateway advance endpoint
will now make a routing decision based on the output.
54:20
So, what I'm observing is I'm not seeing any any flows out.
54:30
54:33
54:35
54:43
So we can see, we can see ingress flows going into the firewall.
54:52
54:55
So my expectation would be, if you were to filter egress, just filter egress, I could see egress
flows with the same format, only that it's the same packet that went in as now egressing the Git
Rule bouncer endpoint after the inspection.
55:11
55:15
egress from the Gateway Advance, but you see all the egress here are from the Gateway ENI
pressing into there.
55:23
So we can see the ingress traffic from the Gateway ENI, right?
55:28
55:34
Uh But now when we check for egress traffic now, we don't see any egress traffic fromIt will
burn the endpoint.
55:46
55:49
So I just want to see if I can't see any any metrics that will print.
55:53
55:57
56:01
It will burn the internal metrics, if there's anything obvious that can point to a mismatch of
something.
56:06
56:07
56:12
Nothing...
56:14
56:17
56:21
So what's...
56:25
Yeah, just look it up, because...
56:28
56:35
It definitely won't...
56:36
56:39
Oh, okay.
56:39
So it's 1500.
No, we've already done that, but we did try shutting down one of the firewalls, just to see if it
just happened to the firewall behavior, it's still the same.
00:15
Yeah, because I'm just thinking there has to be, there has to be something...
00:26
00:27
00:31
00:36
I'm just looking, because you need to have it in the section with the city.
00:46
01:24
Uh..
01:25
01:30
I had a...
01:30
01:36
01:45
01:48
01:51
01:53
01:56
02:02
02:04
02:06
I'm just curious on if you're getting jinny pads because if I'm not forwarding the jinny pads...
02:20
then I might not be receiving .
02:23
02:26
02:30
02:31
You know, this is the second one, because the first one is the three.
02:37
02:41
02:44
02:49
Sorry.
02:49
02:51
02:53
02:56
03:03
Yes.
03:03
03:15
Yep.
03:16
03:23
Uh, yep...
03:25
03:37
03:46
03:51
03:55
04:00
Because if we if we look at this, this is just, let me look at this font again here.
04:06
04:12
So the font,Sorry.
04:34
OK.
04:35
So the first is working account AD, then the interface is this source destination.
04:40
04:43
04:47
04:52
04:58
This is the interface on the interface that you'll be pointing to on your firewalls, right?
05:05
05:06
So if you look at this particular, if you look at this particular traffic, we're only seeing
unidirectional traffic, right?
05:14
05:15
05:17
05:19
So it means, even on ENI level, people are about getting this traffic on its ENI.
05:29
So if, for example, if you switch to, let's say, the the culture port, you're currently using 443.
05:39
05:44
05:47
I see it's...
05:48
05:51
Yeah.
05:51
05:53
05:55
Okay.
05:56
C5.
05:57
06:09
but for some reason it's not recapitulating the packet and sending it back to .
06:14
So I don't know what's what's broken into me, because it looks like something I'm kidding.
06:19
Because the reason I , because I know I'm not seeing any drops on on the metrics.
06:25
06:39
Let me just...
07:23
07:28
07:31
07:41
07:47
07:52
08:05
08:09
08:11
So you're saying you think the re-encapsulation after it's come in, we're having some issue there.
08:19
08:21
For example, when you do this, let's go to the flow logs we just enabled.
08:29
For that, I'll give you the answer that's working, right?
08:32
08:35
08:37
08:38
08:40
08:42
So the issue here is just the traffic is not getting back to the faster.
08:46
Yeah.
08:46
08:49
08:57
We have...
09:02
OK, so that's as simple as the interface, the Mac protocol, the IP address.
09:09
You guys have already confirmed for me that the endpoint is correct.
09:16
Um We know that.
09:23
09:27
09:29
09:32
09:38
09:40
09:43
I'm just picking this from one of the Fortrikate Appliances configurations.
09:50
Just a moment.
09:53
Let's see.
10:01
10:58
So, can you just for information, we have 133 and 118.
11:05
11:09
Yeah, I thought that there's two differentOK, so you can see the zones sending in new traffic on
an ephemeral report as the source.
11:51
These are.
12:04
12:08
Yeah.
12:10
Well, there's a supplemental and say that the towers will not match any free load.
12:16
12:17
12:19
12:21
Because ideally, it will run the same tuple, the same tuple, on the traffic, not disabled for our
policies.
12:30
OK.
12:32
12:39
Maybe there could be some some points that's messing up because I guess if there was any
interference or maybe the Genevaders or something that usually has the.
12:52
the tunnel like in the headers, but I should have seen drops due to invalid to headers or
something like that.
12:58
12:59
13:01
But there must be a configuration that's separately causing this not to recapitulate the packets.
13:07
I don't know why, but the recapitulation seems not to be helping in the file.
13:13
Um, yeah.
13:13
13:17
14:06
We have policy.
14:07
We have a route.
14:23
14:27
14:33
IP.
14:35
We just set the interface, but this is this is what we've done on east-west and that that works fine.
14:42
14:46
14:47
15:00
15:17
So, what?
15:19
100.
15:19
I'm sorry?
15:23
15:29
16:10
16:30
Yeah.
16:36
OK.
16:39
16:43
16:45
16:46
16:52
16:53
Is it possible to just share with me the output for that from your Peter?
16:57
I'll be.
16:58
17:00
17:11
17:13
17:16
In case I come across anything else that we might be looking at or need to look at...
17:23
17:25
I'll get in to set up another meeting for tomorrow and we can continue troubleshooting.
17:32
No worries.
17:33
Thank you.
17:34
17:37
That's it.
17:37
17:40
17:42
Sorry, sorry, sorryIt's a value add that I can give at the meeting organizer.
17:49
Are you...
17:51
18:01
18:02
So...
18:05
18:09
18:14
18:18
Okay.
18:18
18:21
Yeah, sure, sureI guess I was asking, do you want me to set up another meeting?
18:27
No, no, just in case you can run through this and then we'll invite everyone.
18:34
Everything I've listened to, I must admit I've been in and out and multitasking...
18:40
From what I've heard since you've said since you've been doing this, it sounds like...
18:45
18:49
There's something going on down where from the firewalls gateway load bounce.
18:52
Yeah.
18:53
18:59
So...
19:00
19:03
19:06
I would probably cancel that if you want parents included, given their time zone.
19:13
19:14
As long as they're running their constant things, which they are, then we don't need them.
19:19
Alright, yeah, just maybe drop back into this meeting chat.
19:23
Because I set it up, and NTT is generating with both parents andSo if you put any updates into
this current meeting chat, you should see that, yeah.
19:36
If you set up another meeting, you'll be able to chat.
19:44
19:45
Thanks everyone.
19:47
Thanks everyone.
19:48
19:50
Thank you.
00:14
00:16
00:30
Yeah, so in this customer is trying to attach a route, like he's trying to announce the route table
with the peering attachment for the cloud.
00:44
So basically this is the traveling unit in US West 2 and this is the peering attachment with the
core network.
00:53
PGW attached R64 for this the customer is trying to announce the route tables.
01:00
Uh Now this particular transit gateway almost has around 171 route tables, right?
01:08
And what I found like the maximum number on this peering attachment, this one for this, which
is currently, yeah.
01:20
01:23
01:30
01:34
So this is the limit right which which we have to see like how many route tables can we.
01:40
01:42
01:43
Yeah.
01:45
01:52
01:55
There is no use.
02:23
So what they do is, they will create a peering with the transit key.
02:30
Then using the peering, they will create the route table attachments.
02:35
02:38
So Indian, uh, yeah, the arrow is here to cloud the client's route table and not.
02:49
For this clearing attachment, this is the attachment I did not clearing with another.
02:58
I also want to see that in the public also that there is women.
03:07
It is a default limit currently set to 20 for clearing attachment with this one.
03:20
announcement.
03:22
03:37
03:40
03:43
Basically optical announcement means it may create that attachment, the transit gatewayThat is
what it should be meaning routable adoption for creating a routing segment.
03:56
04:01
04:03
Go back to the customer that are.
04:06
04:10
04:15
04:25
Google it.
04:25
04:30
04:35
04:37
Yeah, search for the error message also and I want you to search for the event also because if that
is a CMI write on a API call, we will get what are the details on the API call.
05:05
I want to search it in Google like what do we get for that API account.
05:39
05:49
Oh, sorry.
05:55
06:06
00:14
00:16
00:30
Yeah, so in this customer is trying to attach a route, like he's trying to announce the route table
with the peering attachment for the cloud.
00:44
So basically this is the traveling unit in US West 2 and this is the peering attachment with the
core network.
00:53
PGW attached R64 for this the customer is trying to announce the route tables.
01:00
Uh Now this particular transit gateway almost has around 171 route tables, right?
01:08
And what I found like the maximum number on this peering attachment, this one for this, which
is currently, yeah.
01:20
01:23
01:30
So the current limit which I can see.
01:34
So this is the limit right which which we have to see like how many route tables can we.
01:40
01:42
01:43
Yeah.
01:45
01:52
01:55
There is no use.
02:23
So what they do is, they will create a peering with the transit key.
02:30
Then using the peering, they will create the route table attachments.
02:35
02:38
So Indian, uh, yeah, the arrow is here to cloud the client's route table and not.
02:49
For this clearing attachment, this is the attachment I did not clearing with another.
02:58
I also want to see that in the public also that there is women.
03:07
It is a default limit currently set to 20 for clearing attachment with this one.
03:20
announcement.
03:22
03:37
03:40
03:43
Basically optical announcement means it may create that attachment, the transit gatewayThat is
what it should be meaning routable adoption for creating a routing segment.
03:56
04:01
04:03
04:06
04:10
04:15
Google it.
04:25
04:30
04:35
04:37
Yeah, search for the error message also and I want you to search for the event also because if that
is a CMI write on a API call, we will get what are the details on the API call.
05:05
I want to search it in Google like what do we get for that API account.
05:39
05:49
Oh, sorry.
05:55
05:57
06:06
OK, so I'm just going through the clips just a [Link], so basically this connection is a hosted
connection from the problem partner which is your so we don'[Link] have an activity with
[Link], these are two different connections, right?One is with the ACMP and one is with
the [Link] for us, we are simply connected to AWS [Link] are not managing those
[Link], I can see both the connections are basically a part of which in the parent
[Link] the IT is a part of the Equinix [Link] basically the manage the parent
connection is managed by the [Link] at that time the parent connection went down and due
to which your connection was a part of that [Link] that is why the connection went down for you
also because the whole leg was down.I went down for around 37 [Link] yeah, I
[Link] why did it went down?So basically this needs to be checked from the equinix
side because they are a separate partner for eight [Link] we do not directly, you know,
communicate with them on this because this is a [Link] this is a part of [Link], please do
you guys not have any?Yeah, visibly it is appearing, but we do not have the visibility on how
they are managing the the legs on their [Link] it's look, therefore they must [Link], if they
are but that is a separate but we cannot directly ask minutes while going down because as it's a
posted [Link] like customer will reach out to the they feel like the posted connection
which is a part of the leg went down because this was not to do the any kind of maintenance
from the that's what I'm saying we don't we don't do anything [Link], I understand AWS is a
point of contact, but it is not a dedicated connection, right?Now look at me, how how will I reach
out to if I don't have any connection?[Link], that whole team like we have in the and and I
believe you know as we talk to like that whole team to check like this motion like like in the
every case when there is a into the [Link] we are not like [Link] must be more
connections to went [Link], because the whole lag went [Link], because let's say there
are 70 connections in that [Link] if the lag goes down, it is not a customer related issue, but it is
also not [Link] is related to the [Link] me check on [Link], that's what I'm telling
[Link] must be having [Link] is not AWS managed parent DX connection,
right?[Link] I think basically like what I said earlier, this is a parent connection right, which is
not managed by AWS, which has been managed by the partner of [Link] I don't think we have
the like visibility or we can communicate with the partner [Link] if there is anyone like which
knows about the winning support or networking because and this was a personal connection
[Link] creating this connection, they must have, you know, get in contact with the [Link] is
there anything like that or otherwise I need some time to check if there is any alternate context or
something that we can provide it to you for [Link] the does not cover like this is not the
lag which is managed by AWS, this is managed by the [Link] like if there is no such process
then we can reach out directly to the partner just to take out like where this lag, why this lag went
[Link] this is not in like you know AWS kind of [Link] come into the picture so but
I'll try to get alternate the or something is [Link] this kind of issues there are some on the DC
side which get performed without any notification or [Link] this was a or
something you probably have got an notification or [Link], we have the dashboard,
[Link] we can see all [Link], no, because of this is the like we don't have that visibility like
what was the maintenance, what was the issue was that if there was a dedicated PX, then we
would have the full visibility like we [Link] was kind of something [Link]'s why they
[Link] it be possible for you to explain how your router is connected to that?Is it not
connected to Equinix?It is connected to the [Link] there must be a circuit ID, right?Or you
are just taking the connection and you are [Link], like there is no but mostly in this case, in this
case of.I mean it's not like this [Link], like it will be the like the like on the on profile
and between and the third [Link] can one customer manage that?So basically this lag is itself
in the managed [Link] like basically Phoenix is like working at an MMR between customer and
[Link] even it's this is basically sitting in between the customer and the AWS [Link]
that is kind of a setup it [Link] let me [Link] allow me sometime.I need to check on this
basically allow me some time.I'll just try [Link] you want to call back later?I'll just provide it on
the [Link] it is fine with all, else you need a call.I can give your call back as [Link], let me
check if there is any possibility.
I'll give you, I'll give you a few minutes.I'll be back in 5 [Link] both these accounts are in
different region or in the same like source or region is different or destination region is different
or both are [Link], no region is all same, region is all [Link] what can be done?We can
just use one single transient gateway and share it with another [Link] in that peering will be
not [Link], that's what I initially [Link] that would be then tough to manage because
you would have to then single language from those [Link] let me think about this, just around
this.I'm taking a break for 5 minutes, so let's get to [Link] [Link] VPCK is [Link] are
looking to the next some of the the attachment which is 7, which is [Link]'s spinning, it's been a
64D0K attachment [Link] I need a different effort or [Link], the first one is
this [Link], this [Link] GPCs have to each [Link] the goal of the goal that
customers have is to route all the traffic from this source transit estimation to all the internet
[Link], we have something called [Link] basically right now all the traffic on all the
OPCs goes out from this DPRES [Link] right now what we need to do is instead of all
95 traffic going from this OPC, we want it to go from transit gateway towards that transit
[Link] why is that so?Because in the destination there are twosort of firewalls and like
one for flawed and one for not [Link] customer wants to get the traffic, get the outbound
traffic filtered through those [Link] broad traffic through the fraud one, not working, to the
not [Link] this is the destination that I'm talking [Link] is the destination customer
[Link]'s a transit gateway which is already [Link] you knowSo, [Link]
there are two [Link] non-prod, there is a strong prod appliance for firewall, and prod is [Link]
what we need to do is to take first of all, have all the control directly from source to this this
[Link] then from here,Do the prod passive to prod and not prod passive to the non-
[Link] is the meaning of the [Link], so basically like there are two like first is your
main networking account and another is your...Another is also networking account but for the
other network [Link], and what is the source we can see here?Source [Link] this is the
source VPC because here we have the traffic [Link] has like multiple VPC attachments uh
which means like traffic going down towards that traffic [Link] this is the VPC
attachment, this [Link] if you check the route tables here, so let's say we have this fraud
routing for the for the fraud [Link], let's consider this one which is [Link] So this is the
like fraud [Link] are the routes for the [Link], broad [Link] I want
to understand is how, like, what changes .So it was both sides from the .So, like, I thought the,
basically there should be an exit point for this broad and not broad, but do we have some kind of
like architecture like how it looks like?or from where to where we need to .So from this it is you
know tough to understand what is the requirement [Link] is like no set, but I can I
can explain [Link] you can ask me question and let me know what I .Maybe you could draw it
or something likegoing for the traffic screen because this account okay from the case which you
opened does this account has the transit key?No the case that I've opened is the case through
which we log case we do so I'll share all the [Link] for all the round [Link] for all the
round [Link] me first check [Link] which region this transit gateway is in source account
US1?two peering attachments with this transit gateway and multiple VPCs are [Link] for all
the VPC, do we need to make this change?Yeah, so basically for the prod and the non-prod
[Link] what are prod in one prod, but I think we can get from the routing, with prod in the
[Link] from my end I cannot like verify like what is the problem.I do not have
[Link], I have the [Link] know, I just want to just take one example and forget about the
[Link] let's let's consider the fraud [Link] this is like the this is the routing and share the
route [Link] if I were to just simply change, if I want these routes to be, so you can see the
default route is currently through the [Link], means default it is going to the [Link],
okay, got [Link] this is the egress [Link], yeah, got [Link] you want [Link] now what?You
want to send it via peering attachment, right?Yeah, so all outbound caffing goes to that other
landing zone, which [Link], I mean this is connected by the PRA [Link] cider will be
the same [Link] cider will be the same [Link] cider will remain the same,
right?[Link], let me just check [Link] this will automatically set the all out one transfer to
the peering [Link], okay, [Link] that one, right?But if once I'm here, so once we get
the traffic here,Then I guess my question is from here, like how customer will [Link] would
be the routing here?Where?In this, in the [Link] destination, let's say this is the non-fraud,
sorry this is the fraud routing, right?[Link] here is the main [Link] we need to
made in [Link] to the roundtable again for [Link] [Link] destination?Yeah,
[Link] get the [Link] click on the associate roundtable, right?See the
routes?Yeah, [Link] are some routes forJust click on the [Link], so here you can see
410 is your again egress VPC, right?The [Link], so here we'll replace this with the
peering [Link] the same peering [Link] are asking about the return traffic,
right?From destination to [Link], what I'm asking is, so I think what I'm asking is, we we
changed the route here, right?We changed the route [Link] from here, for these particular DPCs,
for these particular DPC attachments, the route will go towill come here, like all the traffic would
just like say from fraud line, fraud to [Link] if we come here and from now, from here,
um how does it segregate, like how does it know that it's coming from the fraud, fraud VTCs
which is actually these ones?depends on the...if you're not able to segregate like this is a prod,
this is just like we are giving the name it is a prod traffic and not [Link] to segregate it is like...I
think this is the actual question from [Link] So they want to know like what routing
changes to make to allow only the prod [Link] the traffic coming from these attachments to
these ones which is the [Link] do they have any firewall or something to inspect or it is
just traffic routing between source and destination?No, here is the [Link] is actually
here in this [Link] this is all [Link] is all beingI mean, plan to actually enable the next
[Link] is in this [Link] there are two fibers, prod and one [Link] they want the traffic to
be routed such that the prod traffic, you know, it only goes to the prod fibers and non-prod to
[Link] for that, I think we would need first of all the details of what are the prod VPC and
non-broad VPC becauseFrom the route table, we cannot just, you know, make the [Link],
I can tell [Link] all the VPCs that you see in these attachments, these are fraud [Link] one
on the source transit gateway?Yeah, this is source [Link], this is [Link] [Link] have
created like one table which is specific for the fraud [Link] are the fraud [Link], so
which means traffic will come from the broadway PC attachment to this peering attachment that
will then traffic needs to be forwarded to the firewall from when it arrives to the destination
transit gateway 17:32From that transit gateway traffic needs to be forwarded to the firewall,
correct?Yes, that's [Link], in the transit, in the source transit gateway, I'm seeing like there
are multiple, almost like how many VPGs are [Link] are two attachment and other are
VPC.1, 2, 3, 4, 5, 6, 5, [Link] me it is showing like a lot of more VPCs.I think there are multiple
VPCs.I'm talking about the source transit.I can see [Link], so all these 28 attachments are prod
VPC?No, some of them are prod, some of them are [Link] you ask me which one is prod.I was
taking just an example from the route table because we have already segregated prod and one
port page in this round [Link] this route table has uh routes for this round table has been...these
are the third [Link] round table has thisCan you share me the VPC IDs?Because I'm searching
this route table, but I'm unable to see this route table attached to [Link] It is [Link]
has no [Link] only has [Link] before we make any changes, I think we need to
understand like from destination where traffic needs to be [Link], no, we're not making
[Link] basically what I understand till now, there are two products, two-part of the VTC,
one is prod and non-prod [Link] for the prod VTC, you are currently routing traffic to the
Egress [Link] we have to replace that default route pointing towards Egress VPC towards the
peering attachment of the destination transit [Link] from that, in that destination
transit gateway account, there is a net scope or let's say a firewall which is [Link]
through that transit gateway, that traffic needs to be forwarded to the firewall [Link] firewall
ENI will be two, one for the prod and another one will be for the [Link] accordingly, I
think step by step we have tosee which are the prod cider, which are the non prod cider and
accordingly we have to segregate the route people [Link] I'll just, yeah I know because there are
many so I'm just taking one for [Link] [Link] like this one for [Link] this is like
the, this is one of the prod [Link] me see this VPC write [Link], let me just go with this
VPC route where it is forwarding so we can just make a blueprint out of [Link] how the routing
is currently forwarding and what changes would we [Link], so this one is a prod [Link] has
subnets in VUS 20 [Link], this VPC CIDR [Link] Transit gateway subnets are 902
and [Link], so for this VPC,uh I can, so there are two subnets associated with Transit
Gateway with this VPC, right?I'll just sharethem in the [Link] I share it in the time chat so it
will be easy for you just to toggle this?Yeah, yeahShare it in the time [Link], one is .another
subnet which is a Froshid transit [Link] these two other subnets which are currently associated
with this production VPC with transit [Link] let's see what these two subnets has the
[Link] basically these two subnets has one local route and there is one default route towards
[Link] this is one default route which is pointing towardsa LAND [Link]'s see now what
this LAND gateway points [Link] this LAND gateway has been submitted in [Link]
this NAT gateway is pointing this route towards this [Link] gateway is in the subnet and
this subnet has two [Link], one is 10/8 and another is default route towards the internet
[Link] if the trafficwas for the internet, then it will follow the second [Link] this is internet
routed, then this will follow 10/[Link] let's see the transit gateway routtable for this VPC
for 10/[Link] So for this VPC,In the Transit Gateway Route table, there is no default [Link]
are the specific VPCs [Link] are the specific VPCs [Link], this is...These routes are available
under Transit Gateway Route [Link] you can see, for [Link], 2 volt VPC, 2 volt [Link], so
why it does not have 00 because this VPE has a direct internet access via internet [Link]
the associated route table with this VPC is this [Link] me share the associated route table so you
can get an [Link] is the associated route table IP with this [Link] So basically for this
production, VPC has its own internet gateway and it is routing the internet traffic through its
internet gateway [Link] is not forwarding traffic to any other VPC for [Link] is just
forwarding to the [Link], this one is the internet out of it, right?[Link] basically this,
what I understood now, all the production VPC has their own internet [Link] you give me
another production VPC so we can compare with this?[Link] if if that is the same, then the
case would be like all the production VPCs has their own internet [Link]'s takeThis is also a
production EPC, right?Let's open [Link] for this VPC, there are two subnets associated and these
two subnets are the default route towards transit gateway [Link] VPC do not has its own
internet [Link] these are the subnets associated with transit gateway and this is the route in
the subnet route [Link]'s see where this transit gateway [Link] it should send this traffic
to the Egress [Link] this VPC do not has its own Transit [Link] Sorry, Internet
[Link], so for this VPC's Transit Gateway Route table, there is a default [Link]
towards this VPC, which is our Egress VPC [Link] this VPC has the internet gateway,
correct?Okay, [Link] from here we have two scenarios and I believe there are really these two
[Link] there are two types of [Link] is AMS, for AMS they get through
Egress VPC and for others they just manage it through [Link] if you take just each of these
scenarios and how would this traffic, I mean, what changes?yeah so basically now the
destination account is this one 22909 and this destination account has this Transit Gateway ID
[Link] is your destination Transit Gateway in which your net scope will be
[Link] let's [Link] for 8x5 in thisThe so for the VPC internet, [Link] [Link]
what changes for this VPC, in the subnet router, we will find the source value, which will be
[Link] the round table we will make a [Link] will be the link, as I just said in the
last...This route we have which will be default to peering [Link] you zoom towards
theThis [Link], [Link], let's...Do you have...
OK, let me [Link], DX connection [Link], connection state [Link], so it was down for
around 36 minutes, I think, [Link], now I think I...Yeah, currently it is showing [Link] let me
check why it was [Link] [Link] is for [Link], so during the 36 minutes
there was no receive [Link] are not receiving any RX signal from the on Prem router or the
[Link] receiving signal has gone to 0 during this 36 [Link], the RX went to 0
[Link]'s why the connection went down for around 36 [Link], [Link] optical
signals which we used to have across both the peers, right, the transmission optical signal and the
receiving optical [Link] basically, yeah, [Link], right, right, rightSo basically like
[Link] to have the RX signal from the on Prem on premise side, [Link] during this period the
RX signal went to [Link] basically there was no RX we were receiving from the on Prem
[Link], no, noThe RX is basically like the connection terminated your any on Prem router or
on Prem other devices.I'll do one thing.I'll share this metrics with you on the [Link] you can just
check with the on-prem team or if they have any interface details, if the interface optical signals
were put at this [Link] basically the time frame when this connection went down, let me also
check the time frame that is [Link], 346 [Link] from 346 UTC to 424 UTC, the RX
signal was [Link] what about the observation?Yeah, I'll put it on the [Link]
[Link], I'll do [Link], you just put your findings in the ticket on the [Link], sure.I'll
just drop you an e-mail with the with my findings and the [Link] I'll also check with
my [Link], [Link] this because I'm also we have router.I think it's managed by our data
[Link], OK, OKI I need to check on that [Link], got [Link], no issues.I'll just provide you the
summary so you can have a talk with [Link] if anything further near you can just update it on
the [Link] I'll just help you out with [Link] [Link] [Link] you very [Link]'s
say I search for the [Link] on the Google [Link], so it will generate a query in
the back end to provide a resolution for this [Link], so there will be a local [Link],
there there is a local resolver on each of the browser which will first which will first check for
[Link], local cache on the browser [Link] the local cache is available on the browser itself, it
will just provide you the resolution for the [Link], so this is basically all as a recursive query
where you are having your cache your resolution stored in a [Link] let's assume let's say we have
searched for the [Link] on the [Link] the back end it will run a query to provide
the resolution for this [Link], so basically there is a local DNS resolver on each of the
system on each of the [Link], so this DNS resolver will first check the local caching of the
browser if it has [Link] if it if it has the resolution for this query or [Link] cache means your
browser cache, your ISP cache.
OK, all this OK and if the cache is available and it provides the resolution then it is called as the
recursive [Link] it it is called as a recursive [Link], now let's assume the cache does not
have any resolution to the asked [Link] what it will do?Now the DNS resolver will send
this query to the root name [Link] DNS resolver will take this query to the root name server,
which means on the [Link] a specific question like Tell me what is the top-level domain
for this resolution, for thisDomain like we have search for the [Link], so DNS
resolver will take this query to the root name server and there are 13 root servers OK in [Link]
root zone architecture wise there are 13 root server in the root [Link] now root server will will
check for the referral top level domain server OK which which has the resolution for [Link]
domain OK [Link] [Link] root name root name server will give the referral of top
level domain server to the DNS resolver [Link] DNS resolver will go to that top-level domain
server again ok now root now the DNS resolver will ask the top-level domain server what is the
resolution for this domain ok means what is the resolution alternate what is the IP of this website
where is it hosted ok now authority now top-level domain server willGive the referral to the
authoritative name server which has the alternate IP or the resolution for this
[Link] authoritative top level domain server give referral to the DNS
[Link] DNS resolver again goes to the referred authoritative name [Link] now
authoritative name server is the entity which [Link] the [Link] contains all the
[Link] like phone book which contains all the phone [Link] authoritative name
server will check for the asked query which is [Link] will find for the associated IP
address and it will provide this IP address or the server IP address to the DNS [Link] DNS
resolver got [Link] DNS resolver will establish a TCP 3-way handshake with this server where
this [Link] is [Link] it is established the webpage will load for the
[Link] [Link] this was the iterative way where it went to the internet and then
cameMake them with [Link] give me one [Link] was the normal DNS workflow
which is used to resolve the query which we have [Link] this is the normal then what about the
difficult one?This is only the difficult one because I have explained you on the ahNo.I have
explained you on the upper part like how it [Link] let's assume ah we are again trying to
do a resolution for [Link] [Link] have typed in [Link] on the google
[Link] what will happen the client OS, client OS in which which laptop we have typed,
the laptop of that OS, the DNS resolver usually which is your [Link] the public Google DNS like
8.8.8 which our ISP [Link] ok If resolver checks its cache which means if the cache is there on
the ISP server or let's say on the [Link] the cache is there, it will immediately return user
[Link] it is not,If it is not cached then it will start the [Link] will start the
process?DNS [Link] resolver will start the [Link] process to get the ah
resolution for the [Link] what will happen now, this resolver will take this query to the
root DNS [Link] the root DNS server it will get a referral to the top level domain server
which serveswith .com [Link] there are multiple domains as you know .com, .in, .uk, .[Link]
there are two types of [Link] One are country domain and others are generic [Link]
country domains include like .in, .uk, .eu and generic domains include .com, .[Link] this kind of
[Link] basically root DNS server will check which type of domain it [Link] .com is a generic
[Link] now root DNS server will give a referral to the top level domain server which has the
information about generic [Link] it will give referral to the top level domain which has the
information about .com domain to the 3DNS [Link], in DNS, we will get that to
[Link], same with the top level domain server will give the referral to an
authoritative name [Link] name server is a server which keeps all the records like
A records.A records just for IPv4.A record is for [Link], so Authoritative Name Server keeps
A record and IPv6 record of this DNS, of this [Link] is A?Of this domains.A record is a
DNS record which is associated with the domain for its IPv4 [Link], so there in DNShow
a resolution gets is IP address, how a query [Link] basically with the domain, there are records
attached.IPv4 records, IPv6 [Link] there are 8-10 records uh in the in the [Link] 8-10
hours?I didn't remember all the calls right [Link] should check on Google and tell me,
right?This is not your [Link] should provide me the correct answers.I'm [Link] me
first cover [Link] the authoritative name server will be having A records and or IPv6 record for
this [Link] it?Hmm Now, subscription to the DNS resolver and DNS resolver will
get to that server and establish a three-way handshake and after that our webpage will show up
on the browser for [Link] you got it?The simple [Link] it will do
iterative query?Why it will do iterative query if it doesn't have any cache or information about
the AskDipQuery a [Link] it has a cache Then it won't do iterative [Link] it do not
have cache, it will go to the root [Link].....................................................So, this was a
normal flow of the uh [Link], now there are two types of query which we see in [Link] is
first query?Sonari, you are listening right?Recursive query and another one is?Root
[Link] Root [Link] dodiye?Iterative [Link], basically Recursive Query is used
to pull out the cache [Link] iterative query, if there is no cache, no information about
the ask resolution, then it will go to the generated query and...DNS regarding my job questions
pooja .Workflow workflow what is root name server, top level domain server, authoritative name
[Link] Name Server main gum ko [Link] are 13 Root Name Servers under Root
Zone which has the information about the Top Level Domain [Link] Level Domain Server
has the information about Generic Domains and Country [Link] specific to Top Level
Domains also has the information about Authoritative Name Server for each of the [Link]
Authoritative Name Server has the information about the associated IPv4 and IPv6 addresses or
other DNS record types for the asked [Link] [Link], it's a [Link]
is [Link] [Link] let me search DNS [Link] So common DNS records
[Link] maps a hostname to an IPv4 [Link] record which hosts to an IPv6
address of the [Link] name [Link] A record is basically to map ipv4 address to
the [Link] A record is to map ipv6 address to the hostSo, we have cname record, canonical
name [Link] is alias?Alias...........exact name copy.....like uh....cname record
alias...[Link] So,I am Lagirabot Canonical Name Records provide an alias of one
name to another Likudoi Tum bolo Maliklonge yaar ni rai ka maini tum bolo Maliklonge so so
canonical sorry CName record canonical name records creates an aliasof one name to
[Link] example [Link] to [Link] exchange [Link]
[Link] record specifically Mail servers.......Mail servers........We took the first domain we
took the we take example of [Link] domain so for [Link] we have the mail server
as [Link] like thisSo every e-mail for the domain [Link] will [Link] this mail
server which is [Link] it is just we are mentioning in our MX record that this is
the mail server for our [Link] it?Good idea, right?Samal Nani [Link] another is Name
Server [Link] Name Server record is basically a list of authoritative DNS server for the
[Link] [Link] saw like authoritative name server contains A records for A records for
the domain [Link] Name Server records has the list of authoritative DNS server which
DNS servers for the [Link]'s say for [Link], top level domain server provides us list
of 5 authoritative game [Link], [Link] you can go to any of this
file to have your answer, to have your query [Link] [Link] what I [Link]
another one is PTR [Link] record is a pointer [Link] basically pointer record is the
reverse DNS [Link] What currently we are doing when we are typing [Link]
on browser, we are doing forward DNS [Link] simply if we type directly the IP address then
what it will give us the [Link] happens in the forward query?We provide the domain and
in return we get the [Link] in the reverse record, what will happen?We provide the IP and we
will get the [Link]?So this is just a simple reverse record we can [Link]
[Link]?Got it?If these are enough records, nobody asks more than [Link] have these 4
records clear in mind A Record, Wadia Record, CNAME Record, MX Record, BTR Record and
Name Server [Link] are the records stored on a DNS Server, particularly DNS [Link]
Records [Link] are lot of many records, but these are not [Link] We are not going in
a very deep DNS architecture, because we are not going to work on DNS [Link] here,
what are the most important records are there, so these are the most [Link] are required
in every resolution.A Record, QUADA Record, Name Server Record, Canonical Name Record,
MX Record, PTR Record and one [Link] [Link], there is Service Record and I will
tell you.I will tell [Link], there is one Service Record and uh X Record and State of Authority
[Link] more records are [Link], basically what is Service Record?Those service records
specify host and port for the specific [Link]'s say [Link] runs on which port?1433,
correct?So let's say if any website is hosting its SQL service, assume Amazon is hosting its SQL
service to the [Link] Amazon will use which port?1433 for its SQL, correct?So,
Amazon needs to provide one, also needs to have one service record which will uh indicate that
which service or which port does this, sorry, which specifies the host and port which SQL
service will will [Link] means your domain name and port means your port [Link],
let's say Amazon hosts the SQL server, [Link] 1433 ok so this domain will
have this service record because it is serving on 1433 ok got it..................................What is DNS
Zone Transfer?DNS Security?DNS Security DNS Security DNS Zone Transfer We call DNS
Security DNS Zone Transfer OhWhat is the difference between Authoritative Name Server and
Non-Authoritative Name Server?So, Authoritative Name Server means the original
owner......................................................[Link], every job, when we do nslookup on laptop,
right?For any [Link] you performed any kind of nslookup?I [Link], when you perform
nslookup for any particular domain on your laptop, you will get two [Link] authoritative
answer or non-authoritative [Link], it will have non-auth, so basicallyWhat is the difference
between authoritative answer and non-authoritative answer?So the authoritative answer directly
comes from the authoritative DNS servers for that [Link] the server who is responsible
for hosting the zone [Link] me explain you with an [Link] we are doing a DNS
resolution for [Link] basically for this domain there would be an owner who will
be owning this [Link]'s say you own this domain and you have your own DNS server and
let's say assume [Link] is your own DNS server and on that DNS server you have
hosted this domain [Link], originally you are the owner of this [Link]
[Link], whenever we perform a query and we get the authoritative answer, we get the answer
authoritative which means this this answer, this resolution is is coming from the original owner
or the uh DNS server who owns this [Link] usually what happens to save the timeok our
ISP our ISP store this resolution in the cache in in global DNS like Google DNS 8.8.8 Cloudflare
DNS 1.1.1 okay so basically what happens now when you type in [Link] you will
immediately get the answer because it is cached in your ISP's uh cache correct so now you are
gettingNon-authoritative answer because you are not getting it from the original [Link] are
getting it from your ISP.I am not getting this resolution from Manisha.I am getting this
resolution from [Link] there is [Link] when I am getting this resolution from my ISP
cache, it will be called as Non-authoritative [Link] when the cache is not available, it will
do a iterative query which means now myresolution query will go to you, to the original owner
and then come back to [Link] that will be the authoritative [Link] it?Non-authoritative
means I am getting it from the cache which is not the original owner and authoritative means I
am getting the answer from the original owner who owns the domain and the DNS server.
25
Speaker 1
Okay, so team, I have done the basic checks and all. I haven't found any issue. I've got the BGP
logs
also, but I cannot see any issue in the logs that represent something because mostly it... There
is one
question, are you able to receive the route that AWS is currently advertising on this VPN? Yes.
Okay.
Then I think there might be some miss configuration on Checkpoint Because I can see the BGP
session is the BGP messages are getting exchanged and all.
Speaker 2
Yes, but how it's a miss configuration in Checkpoint if the BGP is working?
Speaker 1
No, there is two aspects.
Speaker 2
If it was a miss configuration in checkpoint, maybe the tunnel won't even go to established state.
Speaker 1
Basically, see, here we do not have that much visibility on Checkpoint, like how it is advertising
the
route, because AWS will totally depend on the peer device to receive the routes for on-prem. If
there
would be any issue on AWS, then you could not have received the AWS routes also on
Checkpoint. I
can see the BGP route table, but here there are only the internal BGP routes which are getting
learned.
Speaker 2
Can you see if there is any difference between the two peers? For example,.
Speaker 1
Both the VPNs are terminated on same checkpoint device or it's- No, it's different gateways.
Both
gateways are different. Okay. Let me check. Okay. Remote route ID. Remote route ID is 253.
Bgp
neighbor is 10.
Speaker 2
98. If you can see any difference in the configuration in the AWS side, between those sites, I
don't
know.
Speaker 1
Let me check. What is this router ID? I can see if the gateway- I can give you the BGP ASN
number if
you want. Yeah, you can give it for both the VPNs. I just want to confirm. This router ID, I can
see it is
configured same for both the VPN.
Speaker 2
The configuration should be the same. They're exactly the same. It's just two separate sites.
Speaker 1
I still didn't get how come the router should be same. If both the sites are different and the
customer
gateway are also different.
Speaker 2
Yeah, the hardware is different. The cluster, the checkpoints, getways are different. The ASN
numbers
are different. This is the only difference. And the IP addresses, of course. I wrote in the chat the
ASN
numbers of Jerusalem and Eritrea.
Speaker 1
Okay.
Speaker 2
Maybe you can do a traffic capture and I'll try to advertise a new route to AWS. I don't know if
you can
see.
Speaker 1
I cannot see the live capture, but I would be able to see if you are advertising, if we are after
some
time, after the BGP update, if the routes are visible or not. That thing we can I just have a doubt
regarding this route. Because two remote device can't have the same route connecting. I don't
know if
that is good. Is it three, four minutes, autonomous system. I'm trying to advertise any single
route
from this Jerusalem VPN.
Speaker 2
You want me to advertise new route?
Speaker 1
Yeah, if you can, or if you are advertising, just remove this route 3. 0 and 5. 0 and re-advertise
them
again.
Speaker 2
Okay. On second.
Speaker 1
. But when I'm looking at remote route or ID, it's the same.
Speaker 2
..
Speaker 1
But. I'm saying that if your both VPNs are at different checkpoints, then your router ID is same.
It's
different... No, it's different. It's different. It's different? It's different. It's 2 or it's 3.
Speaker 1
Okay. I deleted the routes and advertised them again. Okay. Let's see. Okay. No, not too. It's
okay. No,
not too. It's okay. No, not too. It's okay. No, not too. It's okay. No, not too. It's not going to be
fine.
Okay. You don't accept it. Perfect.. Can we do for the fire this context?
Speaker 1
Okay. I'm going to take a deep deep deep deep deep deep deep deep deep deep deep deep
deep
Okay, I'm still unable to receive the route. Then, EGP event.
Speaker 2
Maybe there's a route map setting that's on your router.
Speaker 1
The route map settings are basically dynamically adjusted. There are now manual configuration
in
that. When As you automatically advertise the route, the readers will send the route map as for
the
advertisement. Let me check. Okay, just a second. I'm seeing some logs.
Speaker 2
I can also restart the BGP if you want.
Speaker 1
Okay, just a second. I can see some logs. Okay. You are advertising 1. 3 in 1. 5, right? Okay.
Speaker 2
What?
Sure, you can reach out any time on the case if there is any further assistance. If you have any
new info, we will update the case. Sure, sure.
Thank you very much again for your help. Thank you very much. Thank you, thank you very
much guys.
Okay, bye bye. Have a good day. Bye, you too
So, I need some help to renew the SAML in Identity Provider for AWS Ethereum Client. Let me
share my screen and explain a little bit. Can you see my screen now? Yes, it is.
Okay, cool. So, we have several SAML accounts, and we have a VPN, only one VPN. It's using
the
SAML provider, CMT VPN Client Azure.
So, we are using this CMT VPN Client Azure. So, today, what I tried is to add the new XML file
for
the search. I've done that.
The issue is in Azure site, it's active and disable the date. So, even though we didn't enable the
search, it still can work. However, when they disable the old one and activate the new one, I will
get some error message.
Sorry, I didn't take an error message. It will fail. Let me check.
I didn't have the screenshot taken. So, once I connected using the new search, it failed. So, I'm
not sure why it's an issue.
And I tried different things, it didn't work out. So, I need your help on this. Okay, so, let me
check.
Just a second. So, your VPN is in AP service. Okay, Asia-specific.
Yes, Asia-specific too. Okay. Authentication options.
So, is there any specific error message that you captured? I think I have it captured somewhere.
Let me find it. So, you are unable to connect the VPN after replacing the new IDP, right?
Replacing with the new IDP.
Yes, right. Okay. Yeah.
I couldn't, I think it will say the credential failed something. Let me check my history. I couldn't
find the error message again.
It's just saying some credential failed. Yeah. So, it is kind of throwing an authentication error?
Yeah.
Okay. Great, great. Okay, I see.
Wow. So, after updating the SAML, we don't need to restart anything with the VPN, right? Oh,
no, that is not required. Let me check again.
Allow me a few minutes. I'll just check and let you know what can be the issue or where we can
troubleshoot further. So, you haven't re-imported the older XML data, right? You just replaced
the older XML data with new, correct? Yes.
Okay. I just replaced it with another data. Okay, I got it.
And any endpoint related configuration, have you made changes like rotating the endpoint or
something? I noticed the issue URL and SSO service locations are the same. The sign-in URL
and
the metadata URL changed a little bit. Okay, the sign-in URL and the metadata URL.
I can show you my screen now. Okay, there is one thing we need to do here. It goes to change
a
little bit.
The middle part changed, but the issue and SSO service location are the same. Okay, okay.
Okay, just a second.
So, this one is the client VPN, right? Let me check just to confirm. This one is the C VPN. Which
one? Oh, sorry.
Yeah, that's the one. Okay, that's the one. I think we have to re-associate the VPC in which your
endpoint is deployed.
How could we do that? Yeah, just let me check. Before that, I think we have to make notes of
the target network routes and authentication which we have currently. Let me check the
process.
Let me download all the details for you, the routes and all. Download as CSV. [Link] and
target.
These are the subnets. These are authentication rules. Okay, we are good to go.
I have downloaded all your details regarding the routes and all. Let me just verify. [Link].
Okay, we can go ahead.
Can you share your screen? Yeah, sure. So, we will just simply re-associate the subnet and
again
re-associate them. Okay.
Yeah. These are the subnets. Can you see the screen? Yeah.
Okay, so you can select the first subnet. Okay, re-associate this. Click on this.
Yeah. I can click on it. Yeah.
Yeah, re-associate. Yeah, you can select that also. It will take around 10 to 15 minutes.
Yeah. So, it was working earlier, right? Before replacing the metadata. Yeah, it's really working.
Actually, when we activate the old certificate back, it's still working. Okay. Yeah, so now it's
working.
I need to ask my colleague to enable the new certificate and test again. Okay, got it. Yeah.
So, currently on AWS client VPN endpoint, you have the old metadata or the new one? New
one.
Okay, got it. Yeah, so I just want to validate another thing.
Even though here I have replaced the metadata, it's still working. Does that mean that at the
backend in AWS, it's storing all my metadata and the check? Possibly, it will be storing the
metadata. Yeah, that's why it is working with when your colleague is using the old profile, then
they're able to connect.
Yeah, got it. I'll mute myself. I'm sure.
Yeah, I'm sure. No worries. Yeah.
Yeah. Can I mute myself? Okay. Now we can re-associate the target network.
Yeah, it has been done. So, after this step has been done, we should have another test on it,
right? Yeah, right. By downloading the open VPN config file, you can test it.
Okay. Otherwise, we'll have to look from the client logs, basically. So, from the logs, we can find
out what is happening.
So, is there any change from the IDP side when you receive this new XML data? Earlier, have
you found any change as compared to the older XML data? No, everything was deployed via
this confirmation. And I can see things are matching up. Okay.
Yeah, nothing from my end. Okay. Let's see.
I guess we lost some route table. Yeah, I have taken the screenshots and downloaded the CSV
file for you, for the routes and authorisation tools and all. Yeah.
Thank you. Even this would work. I'm afraid of that.
I couldn't do the similar thing in production. Yeah, right. Yeah, as you can see here, there is a
target networking association connected to this confirmation.
I'm wondering, next time when we deploy via the CICD, it will give us some issues. Okay. Yeah.
Okay. So, I have checked for the XML data which you asked, like, does AWS store the XML
data?
So, basically, like, once we replace the XML data with the new one, at that time, normally, the
client VPN endpoints need to be, you know, reassociated with the subnets. Otherwise, the client
VPN will work on the older XML data only.
So, I think that could be one of the issues because once you are also trying to connect with the
new profile, AWS is still authenticating the user with older profile or older XML data. So, that
might also be an issue. So, this association is the only way? Yeah.
So, what it will do, it will just flush the old XML data which is associated with the client VPN
endpoints. Yeah, okay. Could you please share that documentation with me? Yeah, let me
check
if there is any document available.
This file is longer than 30 minutes.
Go Unlimited at [Link] to transcribe files up to 10 hours long.
So, I need some help to renew the SAML in Identity Provider for AWS Ethereum Client. Let me
share my screen and explain a little bit. Can you see my screen now? Yes, it is.
Okay, cool. So, we have several SAML accounts, and we have a VPN, only one VPN. It's using
the
SAML provider, CMT VPN Client Azure.
So, we are using this CMT VPN Client Azure. So, today, what I tried is to add the new XML file
for
the search. I've done that.
The issue is in Azure site, it's active and disable the date. So, even though we didn't enable the
search, it still can work. However, when they disable the old one and activate the new one, I will
get some error message.
Sorry, I didn't take an error message. It will fail. Let me check.
I didn't have the screenshot taken. So, once I connected using the new search, it failed. So, I'm
not sure why it's an issue.
And I tried different things, it didn't work out. So, I need your help on this. Okay, so, let me
check.
Just a second. So, your VPN is in AP service. Okay, Asia-specific.
Yes, Asia-specific too. Okay. Authentication options.
So, is there any specific error message that you captured? I think I have it captured somewhere.
Let me find it. So, you are unable to connect the VPN after replacing the new IDP, right?
Replacing with the new IDP.
Yes, right. Okay. Yeah.
I couldn't, I think it will say the credential failed something. Let me check my history. I couldn't
find the error message again.
It's just saying some credential failed. Yeah. So, it is kind of throwing an authentication error?
Yeah.
Okay. Great, great. Okay, I see.
Wow. So, after updating the SAML, we don't need to restart anything with the VPN, right? Oh,
no, that is not required. Let me check again.
Allow me a few minutes. I'll just check and let you know what can be the issue or where we can
troubleshoot further. So, you haven't re-imported the older XML data, right? You just replaced
the older XML data with new, correct? Yes.
Okay. I just replaced it with another data. Okay, I got it.
And any endpoint related configuration, have you made changes like rotating the endpoint or
something? I noticed the issue URL and SSO service locations are the same. The sign-in URL
and
the metadata URL changed a little bit. Okay, the sign-in URL and the metadata URL.
I can show you my screen now. Okay, there is one thing we need to do here. It goes to change
a
little bit.
The middle part changed, but the issue and SSO service location are the same. Okay, okay.
Okay, just a second.
So, this one is the client VPN, right? Let me check just to confirm. This one is the C VPN. Which
one? Oh, sorry.
Yeah, that's the one. Okay, that's the one. I think we have to re-associate the VPC in which your
endpoint is deployed.
How could we do that? Yeah, just let me check. Before that, I think we have to make notes of
the target network routes and authentication which we have currently. Let me check the
process.
Let me download all the details for you, the routes and all. Download as CSV. [Link] and
target.
These are the subnets. These are authentication rules. Okay, we are good to go.
I have downloaded all your details regarding the routes and all. Let me just verify. [Link].
Okay, we can go ahead.
Can you share your screen? Yeah, sure. So, we will just simply re-associate the subnet and
again
re-associate them. Okay.
Yeah. These are the subnets. Can you see the screen? Yeah.
Okay, so you can select the first subnet. Okay, re-associate this. Click on this.
Yeah. I can click on it. Yeah.
Yeah, re-associate. Yeah, you can select that also. It will take around 10 to 15 minutes.
Yeah. So, it was working earlier, right? Before replacing the metadata. Yeah, it's really working.
Actually, when we activate the old certificate back, it's still working. Okay. Yeah, so now it's
working.
I need to ask my colleague to enable the new certificate and test again. Okay, got it. Yeah.
So, currently on AWS client VPN endpoint, you have the old metadata or the new one? New
one.
Okay, got it. Yeah, so I just want to validate another thing.
Even though here I have replaced the metadata, it's still working. Does that mean that at the
backend in AWS, it's storing all my metadata and the check? Possibly, it will be storing the
metadata. Yeah, that's why it is working with when your colleague is using the old profile, then
they're able to connect.
Yeah, got it. I'll mute myself. I'm sure.
Yeah, I'm sure. No worries. Yeah.
Yeah. Can I mute myself? Okay. Now we can re-associate the target network.
Yeah, it has been done. So, after this step has been done, we should have another test on it,
right? Yeah, right. By downloading the open VPN config file, you can test it.
Okay. Otherwise, we'll have to look from the client logs, basically. So, from the logs, we can find
out what is happening.
So, is there any change from the IDP side when you receive this new XML data? Earlier, have
you found any change as compared to the older XML data? No, everything was deployed via
this confirmation. And I can see things are matching up. Okay.
Yeah, nothing from my end. Okay. Let's see.
I guess we lost some route table. Yeah, I have taken the screenshots and downloaded the CSV
file for you, for the routes and authorisation tools and all. Yeah.
Thank you. Even this would work. I'm afraid of that.
I couldn't do the similar thing in production. Yeah, right. Yeah, as you can see here, there is a
target networking association connected to this confirmation.
I'm wondering, next time when we deploy via the CICD, it will give us some issues. Okay. Yeah.
Okay. So, I have checked for the XML data which you asked, like, does AWS store the XML
data?
So, basically, like, once we replace the XML data with the new one, at that time, normally, the
client VPN endpoints need to be, you know, reassociated with the subnets. Otherwise, the client
VPN will work on the older XML data only.
So, I think that could be one of the issues because once you are also trying to connect with the
new profile, AWS is still authenticating the user with older profile or older XML data. So, that
might also be an issue. So, this association is the only way? Yeah.
So, what it will do, it will just flush the old XML data which is associated with the client VPN
endpoints. Yeah, okay. Could you please share that documentation with me? Yeah, let me
check
if there is any document available.
This file is longer than 30 minutes.
Go Unlimited at [Link] to transcribe files up to 10 hours long.
So, basically the maximum that they are sending is 56.98, but as per the IPCET configuration it
should be 46.98 to 46. So, they are saying this is only we are getting that we are downloading
the configuration file. In the configuration file then what are we getting, see this is the IPCET
configuration file and they are saying like the time received from the VGP peer in the end.
So, when I get to the connector next hop is not anything wrong, it is the VGP peers and they will
have to do that, I mean they have to use like next hop cell because these are not the IPGP
peers, these are VGP peers. So, we need to like we need to have the VGP peers. So, we need
to
have the VGP peers.
So, we need to have the VGP peers. So, we need to have the VGP peers. So, we need to have
the
VGP peers.
So, we need to have the VGP peers. So, we need to have the VGP peers. So, we need to have
the
VGP peers.
So, we need to have the VGP peers. So, we need to have the VGP peers. So, we need to have
the
VGP peers.
So, we need to have the VGP peers. So, we need to have the VGP peers. So, we need to have
the
VGP peers.
So, we need to have the VGP peers. So, we need to have the VGP peers. So, we need to have
the
VGP peers.
So, we need to have the VGP peers. So, we need to have the VGP peers. So, we need to have
the
VGP peers.
So, we
[Link],140 --> [Link],560 [speaker_0]
Lucas Zestarsky.
[Link],800 --> [Link],600 [speaker_1]
Hi, Lucas. Uh, we have-
[Link],620 --> [Link],760 [speaker_0]
Zes-
[Link],770 --> [Link],420 [speaker_1]
... someone to visit with you, Lucas.
[Link],440 --> [Link],650 [speaker_2]
Hello.
[Link],700 --> [Link],660 [speaker_0]
Eskimada. Ah, yeah. Hello, Lucas. How are you doing?
[Link],740 --> [Link],779 [speaker_2]
Yeah, I'm fine. I'm fine. Thank you.
[Link],000 --> [Link],400 [speaker_0]
Good. Okay. So ... Yeah, Abhishek, so is anyone else joining or can we start?
[Link],420 --> [Link],860 [speaker_2]
No, only me. We can start.
[Link],850 --> [Link],540 [speaker_0]
Hey, ǀ (Chinese) ?
[Link],550 --> [Link],940 [speaker_1]
Uh, yes. Yes, ǀ (Chinese) . People will join us.
[Link],000 --> [Link],300 [speaker_0]
Okay.
[Link],310 --> [Link],560 [speaker_1]
So we can start then.
[Link],160 --> [Link],720 [speaker_0]
Okay, so ... Okay, let me open the case. Mm. Okay, so what-
[Link],780 --> [Link],790 [speaker_2]
Yes.
[Link],790 --> [Link],700 [speaker_0]
... is the issue? Like, um, basically, uh, when I go, gone through the case, so there is one
specific prefix, uh, which, uh, you are currently advertising over the, uh, new VIF, right? Which
Okay. Sure.
[Link],930 --> [Link],220 [speaker_2]
If you want.
[Link],260 --> [Link],780 [speaker_0]
Yeah.
[Link],420 --> [Link],100 [speaker_2]
Okay. And this, um ... Yeah. I have, uh, uh, six interfaces of this.
[Link],160 --> [Link],100 [speaker_0]
Okay.
[Link],000 --> [Link],760 [speaker_2]
And two of them are, I would say the old one. Uh, they are production. They, they are used now.
[Link],820 --> [Link],200 [speaker_0]
Okay.
[Link],220 --> [Link],620 [speaker_2]
They are, uh, they're hosted.
[Link],660 --> [Link],770 [speaker_0]
Uh-huh.
[Link],770 --> [Link],460 [speaker_2]
Uh, but the pro- they're a hosted versions of the connection.
[Link],540 --> [Link],780 [speaker_0]
Okay.
[Link],820 --> [Link],500 [speaker_2]
I- it works okay since, I don't know, one year or something like that. But there are ... But now
I'm planning immigration-
[Link],520 --> [Link],610 [speaker_0]
Uh-huh.
[Link],620 --> [Link],980 [speaker_2]
... to full redundancies, so I bought four direct connect.
[Link],040 --> [Link],160 [speaker_0]
Okay. Okay. Mm-hmm.
[Link],180 --> [Link],540 [speaker_2]
And, uh, I, uh, wanted to switch to the new connections, but step by step.
[Link],600 --> [Link],740 [speaker_0]
Okay.
[Link],760 --> [Link],460 [speaker_2]
So, uh ... And how it looked like, that I still using all the time the old connections, and I just, uh,
tried to use the new ones.
[Link],480 --> [Link],780 [speaker_0]
Mm-hmm. Okay.
[Link],790 --> [Link],980 [speaker_2]
And I h- and I hit the issue, uh, which I isolated in this way.
[Link],080 --> [Link],540 [speaker_0]
Uh-huh.
[Link],560 --> [Link],060 [speaker_2]
That, uh, I'm still, uh, uh ... we can focus only these, uh, two connections.
[Link],080 --> [Link],080 [speaker_0]
Mm-hmm. Okay.
[Link],180 --> [Link],940 [speaker_2]
And the problem is when, uh, when, uh, I start to advertise my prefix-
[Link],000 --> [Link],420 [speaker_0]
Okay.
[Link],160 --> [Link],080 [speaker_2]
... so the AWS goes using this link.
[Link],120 --> [Link],660 [speaker_0]
Okay.
[Link],700 --> [Link],280 [speaker_2]
So AWS, because it is specific, uh, it is 32-
[Link],290 --> [Link],340 [speaker_0]
Uh-huh.
[Link],350 --> [Link],220 [speaker_2]
... prefix. But, but, but for the return traffic-
[Link],360 --> [Link],860 [speaker_0]
Uh-huh.
[Link],870 --> [Link],560 [speaker_2]
... I'm using the old connection. Then I noticed the problem, that I'm sending the traffic to AWS.
[Link],600 --> [Link],900 [speaker_0]
Mm-hmm.
[Link],320 --> [Link],500 [speaker_2]
But, but AWS retries, sent me retries.
[Link],520 --> [Link],740 [speaker_0]
Uh-huh.
[Link],760 --> [Link],340 [speaker_2] So it looks like my response, uh, was not delivered
to AWS.
[Link],380 --> [Link],750 [speaker_0]
Yeah, yeah. Okay.
[Link],780 --> [Link],800 [speaker_2]
And, and I suspect the reason might be that by accident-
[Link],000 --> [Link],080 [speaker_0]
Mm-hmm.
[Link],090 --> [Link],580 [speaker_2]
... the, the old connection uses some logical device.
[Link],640 --> [Link],020 [speaker_0]
Okay.
[Link],900 --> [Link],840 [speaker_2]
And the new connection also uses the same logical device. And is it a problem in AWS but for
in,
for the same logical device-
[Link],160 --> [Link],250 [speaker_0]
Mm-hmm.
[Link],250 --> [Link],520 [speaker_2]
... I have, uh, two connections. And for some how AWS drops such, uh, traffic.
[Link],560 --> [Link],090 [speaker_0]
Yeah. So basically what is happening right now, um-
[Link],090 --> [Link],540 [speaker_2]
Uh, because it is not my de- desired config. I'm not planning to keep such config, but I just hit
the issue during the switching-
[Link],900 --> [Link],070 [speaker_0]
Mm-hmm.
[Link],120 --> [Link],400 [speaker_2]
... perhaps. Yeah.
[Link],410 --> [Link],900 [speaker_0]
Yeah. So mostly what is happening currently, like, uh, on the case, uh, uh, this prefix was given
to me, like s- specific prefix which you advertised on the new VIF. Uh, this one. Let me share it
in the chat. Mm. Yeah. So this, uh, prefix you are advertising over the new VIF, right? Uh, slash
32.
[Link],920 --> [Link],660 [speaker_2]
Okay.
[Link],720 --> [Link],980 [speaker_0]
It is-
[Link],040 --> [Link],220 [speaker_2] I'm checking, I'm checking.
[Link],260 --> [Link],300 [speaker_0]
Yeah.
[Link],100 --> [Link],290 [speaker_2]
Yes, yes. It is-
[Link],420 --> [Link],430 [speaker_0]
So-
[Link],560 --> [Link],960 [speaker_2]
... it's on the-
[Link],980 --> [Link],230 [speaker_0]
Yeah.
[Link],230 --> [Link],850 [speaker_2]
... same prefixes ǀ (Chinese) .
[Link],960 --> [Link],498 [speaker_0]
Okay. Okay. So what is happening, uh, on the old VIF, right, which you are expecting to get the
return traffic from AWS on the same VIF. So like, currently you have, uh, two hosted VIF which
are having the, uh, slash 24 prefixes in this way. I'm sharing the, what we are seeing on the
AWS side with, uh, which, uh, on which VIF we are receiving the, uh, prefix with the shortest AS
path and the longest pre- AS path. Okay. And, uh, so basically from this, uh, from the old VIF,
what I saw, current ... If you are, uh, uh, let's say initiating traffic from any of the old VIF, right,
and these old VIFs are advertising, uh, slash 24, um, prefix on the AWS side. But on the newer
side, on the newer VIF, what it is, uh, what is happening, you are advertising the most specific
prefix, or, uh, we can say the, uh, longest prefix match, right? Uh, so what is happening, when
you are trying to reach the end point, which is .125/32, or the old VIF, on AWS side, it is learning
the same, uh-... prefix with the shorter AS path and with the most specific longest, uh, match
prefix. So for return route, AWS is, uh, choosing the new VIF as the best path. So due to what is
happening, you are sending the traffic from old VIF, but the return traffic AWS is sending on the
newer VIF. So that is, uh, some kind of causing an asymmetric routing. So there-
[Link],527 --> [Link],597 [speaker_2]
Yeah.
[Link],597 --> [Link],008 [speaker_0]
... you're seeing the, yeah, connection might get lost or something, other strange thing
happening. So that is the-
[Link],027 --> [Link],037 [speaker_2]
Okay.
[Link],037 --> [Link],847 [speaker_0]
... current issue. And, uh, let me check if this is causing due to the... both the connections are s-
are on the same logical device. Uh, let me ch- uh, check on this. Allow me a few minutes.
[Link],907 --> [Link],727 [speaker_2]
Yeah. Yeah. Okay. But what, uh, what I wanted to mention that in general, the AWS
documentation says [Link],768 --> [Link],097 [speaker_0]
Mm-hmm.
[Link],097 --> [Link],428 [speaker_2]
... that they are ready for active/active setup.
[Link],438 --> [Link],438 [speaker_0]
Yeah.
[Link],488 --> [Link],327 [speaker_2]
It's meaning that I can have asymmetric, uh, routing.
[Link],147 --> [Link],188 [speaker_0]
Yeah. So, for-
[Link],227 --> [Link],688 [speaker_2]
Uh, so, so, I-
[Link],707 --> [Link],777 [speaker_0]
Yeah.
[Link],107 --> [Link],928 [speaker_2]
So I expect that, uh, when, uh, when I will not, uh, uh... I'm hearing myself when I'm talking. Uh,
can you, for a moment, turn off, I don't know, microphone? Because-
[Link],008 --> [Link],207 [speaker_0]
Okay.
[Link],217 --> [Link],347 [speaker_2]
... there is a mess here.
[Link],438 --> [Link],027 [speaker_0]
Yeah.
[Link],788 --> [Link],068 [speaker_2]
Oh, okay. Now it's so much better. It's much better. Okay. Uh, in general, AWS support
active/active, uh, connection. So in my opinion, I can, uh, uh, send the return traffic using any
links. Uh, but this pa- this particular, uh, thing does not work probably because I am connected
to the same logical device on the AWS. And perhaps this configuration does not work because,
uh, please look on my screen. Uh, uh, I expect that, uh, when I turn on my, uh, new links
(background noise) and I turn off the old one, I think that this configuration should work. That
AWS will send the traffic w- with this link, but I will send the traffic back using this, this, or this
link because, uh, it is normal active/active, uh, asymmetric pattern. I, uh... So, so in my opinion,
it should, uh, work. But, uh, perhaps the issue is, that it does not work now because
accidentally these two links, uh, are connected to the same logical device on AWS. Like,
perhaps this specific configuration does not work. Because normally, A-AWS says that you can
use the active/active asymmetric patterns. It allow us to balance, uh, using, uh, um, ECMP, or
something like that. Yeah.
[Link],408 --> [Link],208 [speaker_0]
Mm-hmm. So basically, ECMP will work in this case when you will advertise this prefix with the
same AS path, uh, prepend from both the VIF. So what it is currently, uh... So which old VIF, u-
on the which old VIF are you sending back the traffic? Uh, if you can just point it, point me out
there. Um...
[Link],647 --> [Link],568 [speaker_2]
Uh, so basically, it is not a problem that, uh, I am connected to the same logical device, but the
problem is that I am advertising the different, uh, mask lengths?
[Link],588 --> [Link],387 [speaker_0]
Mm-hmm.
[Link],407 --> [Link],728 [speaker_2]
Yes.
[Link],748 --> [Link],916 [speaker_0]
The different mask length will also not a problem. If you want to utilize, um, both the VIF as an
active/active setup, so in this case, what, um... if they are on the same logical device, let's say,
uh, VIF in this case. So in this case, uh, the pa- the AS path that we are prepending on the old
VIF which you are using to advertise this specific prefix and the newer VIF should be same. So
in that case, it can... uh, AWS can perform a load balancing. Because what is happening
currently, on both the VIF, AWS is learning via different AS path. Means, on the older VIF it is
the longer AS path, and on newer VIF it is shorter. So in here, AWS is not doing any, uh, equal
ga- equal cost multi-path load balancing. It is just routing-
[Link],928 --> [Link],168 [speaker_2]
Okay.
[Link],178 --> [Link],468 [speaker_0]
... the traffic to the-
[Link],478 --> [Link],478 [speaker_2]
Okay.
[Link],478 --> [Link],228 [speaker_0]
... newer VIF. Yeah.
[Link],288 --> [Link],498 [speaker_2]
Okay. So sorry. Uh, AWS also supports active/passive. Uh...
[Link],588 --> [Link],598 [speaker_0]
Yes.
[Link],598 --> [Link],647 [speaker_2]
And, uh, but do they, AWS expect that the traffic is symmetrical? Uh, can I configure it in this
way-
[Link],708 --> [Link],916 [speaker_0]
Yeah.
[Link],916 --> [Link],058 [speaker_2]
... that, uh, that, uh... Like, can you turn off microphone for a moment? 'Cause again, I'm
hearing-
[Link],058 --> [Link],468 [speaker_0]
Yeah, yeah, sure, sure. [Link],478 --> [Link],051 [speaker_2]
... there's some mess. Yeah. So, uh, can I configure it in inactive/passive in this way, but, uh,
AWS sends traffic to me using this link, and I'm sending the traffic back using this link. Is it
possible or it is completely dead end and I need to make sure that...The traffic is symmetrical. If
something is sent, we have this link. I need to response also this link.
[Link],372 --> [Link],271 [speaker_0]
It depends on the like you can influence the AWS with any uh, pattern you want like active
active or active passive. But the thing comes to the on prem device, like when you are sending
traffic from let's say one uh, RT1 WAF and you are receiving traffic from RT2. So the on prem
device should be having some asymmetric routing thing kind of thing enabled on the interface
where your WAF is terminated or any virtual interface on the firewall.
[Link],332 --> [Link],852 [speaker_2]
Okay, but I am ready for asymmetrical routing. I configured my devices that they are aware
that the same prefix can go into using the different interfaces. So I am completely fine that the
traffic goes into the different interface. I can accept it.
[Link],012 --> [Link],551 [speaker_0]
Okay then. Then it is fine. Then if you want to utilize this setup as an active passive, then it is
also fine. The current then the current configuration which you are doing, which you have like
which is causing traffic to receive by AWS on older WAF and traffic from AWS getting sent by
the newer WAF. So in that case, if the asymmetric routing is enabled on the on premise device,
firewall or router, then the traffic will not get dropped or anything would happen.
[Link],992 --> [Link],051 [speaker_2]
Okay, so, so why does now I, AWS does not accept the traffic but, um, AWS sends the traffic to
this link? It is advertised with because it is advertised with mask 32.
[Link],212 --> [Link],391 [speaker_0]
Yes.
[Link],431 --> [Link],551 [speaker_2]
And I am standing back using this link. The problem is with the mask.
[Link],612 --> [Link],031 [speaker_0]
Yes.
[Link],112 --> [Link],632 [speaker_2]
Or the, or the problem is that we are connected to the same logical device.
[Link],671 --> [Link],331 [speaker_0]
No, the problem is basically what AWS direct connect routing preference is. It will first check the
longest prefix match. Okay.
[Link],112 --> [Link],121 [speaker_2]
Okay.
[Link],171 --> [Link],132 [speaker_0]
So the longest prefix match. Yeah, the longest prefix match is here, slash 32, which is on the
newer WAF. And after that it will check the path prepend. So which is also getting higher
prioritization for the newer WAF. So that is why it is causing AWS to send back the response
traffic to the old, to the new WAF. [Link],232 --> [Link],712 [speaker_2]
Okay, it is completely understandable. But-
[Link],771 --> [Link],071 [speaker_0]
Yeah.
[Link],092 --> [Link],311 [speaker_2]
AWS sends traffic using this.
[Link],352 --> [Link],171 [speaker_0]
Yeah.
[Link],571 --> [Link],012 [speaker_2]
But for the outgoing traffic I prefer this link. And I'm seeing on my TCP dump. But I am sending
the traffic to AWS. So what is the reason why AWS somehow do not accept this traffic? Drops it
on something? The problem is mask, or the problem is that these two links are connected to the
same logical device and it is for some reason not, uh, not supported.
[Link],051 --> [Link],202 [speaker_0]
Okay. So the one problem is which I like, we discussed earlier, which is like the longest prefix
match and the path. So one concern with this, let me check on another concern which you are
asking, which is this. If this is causing you to be on the same logical device. Uh, I think it mostly
do not cause this. Let me check on this. Allow me a few minutes. ...
[Link],232 --> [Link],212 [speaker_2]
Yeah.
[Link],252 --> [Link],821 [speaker_0]
Hello. Hello. Hello. Hello. Hello.
[Link],472 --> [Link],252 [speaker_2]
Haa, bol.
[Link],352 --> [Link],952 [speaker_0]
Arey ek case hai uspe dekh liya hai tere.
[Link],972 --> [Link],512 [speaker_2]
Hmm.
[Link],521 --> [Link],992 [speaker_0]
Main chat pe deta hoon. Chat pe diya hai. Theek hai. Ab, ye upar wala hai naa, iska woh old
VIF
is the old VIF and the new WIF. Theek hai. Old VIF...
[Link],002 --> [Link],331 [speaker_2]
Par kya share kar raha hai? Nahi dikha mujhe kuchh.
[Link],352 --> [Link],212 [speaker_0]
Arey maine select ko chat par share kiya.
[Link],232 --> [Link],132 [speaker_2]
Hmmm, status change karta hoon main. Live laga leta hoon. Abhi kya kar raha hun? Haa, ab
bolo. [Link],172 --> [Link],132 [speaker_0]
Toh yeh dekh. Iska ek old VIF hai aur ek new VIF hai, theek hai. Old VIF abhi currently setup
hai.
The space ka production traffic chal raha hai. Aap old VIF se ye, ye wala prefix advertise kar
raha hai on prem se. Pura slash 24 wala theek hai. AS path ye hai uska. Theek hai. Ab yeh kya
kar raha hai? New VIF hai. Ek specific IP advertise kar raha hai usi prefix mein se, theek hai.
125
slash 32. Theek hai.
[Link],152 --> [Link],652 [speaker_2]
Haa, haa.
[Link],712 --> [Link],101 [speaker_0]
Aur shorter AS path le raha hai, theek hai usse. Toh ab yeh jab woh, haa, toh ab yeh jab 1.125
ke liye traffic apne on prem se ye old VIF se bhej raha hai naa, toh ho kya raha hai AWS isko
new VIF par return bhej raha hai, theek hai. Kyunki...
[Link],172 --> [Link],371 [speaker_2]
Okay
[Link],712 --> [Link],692 [speaker_0]
Longest prefix bhi match ho raha hai aur AS path bhi shortest hai. Theek hai, toh ye ho raha
hai. Par ek aur reason hai. Maine yeh reason toh bataya para aisa bhi kuch ho sakta hai. Ab
dekh iska ye old aur new device hai naa, dono same logical device par terminate hai.
[Link],712 --> [Link],022 [speaker_2]
Hmmm.
[Link],052 --> [Link],371 [speaker_0]
Toh uski wajah se bhi ho sakta hai. Agar ye dono alag logical device par hote, toh kya yeh issue
hota?
[Link],091 --> [Link],052 [speaker_2]
Aalag hote, alag-alag logical device.
[Link],552 --> [Link],481 [speaker_0]
Old VIF aur new...
[Link],792 --> [Link],692 [speaker_2]
Yeh clouds, yeh jiska VIF hai naa, yeh kaun sa data se associated hai naa?
[Link],288 --> [Link],768 [speaker_3]
Old vif is there, old vif is hosted, right? It is okay, new vif has also been taken by us. Dedicated
display people are migrating.
[Link],908 --> [Link],078 [speaker_1]
Yeah, both of them have DX, means on which terminal is VGWA or what?
[Link],108 --> [Link],138 [speaker_3]
Let's see, hold on.
[Link],138 --> [Link],187 [speaker_1]
Okay.
[Link],028 --> [Link],788 [speaker_3] What is it? New one is 7Q. New one physical
connection ID. Where does it look like? Screen
center. Where does it look like? It is not visible in the associated stage. This is new.
[Link],848 --> [Link],618 [speaker_1]
This is your vif open. This one is your vif, right?
[Link],727 --> [Link],768 [speaker_3]
Yes.
[Link],108 --> [Link],058 [speaker_1]
Which one is public? Okay, okay, okay. All these are public.
[Link],348 --> [Link],048 [speaker_3]
Yes, yes, private. No, it is a public view.
[Link],967 --> [Link],258 [speaker_1]
Hmm. Okay. Public with both of them are also public.
[Link],348 →
Okay, so, hey, do you need me to show you how I do the clean up? From on-prem, you're trying
to
rethread, or from AWS? Yes. Okay, so this is our iCloud server, which is on the other side.
Okay. So,
yeah, so this is one of our, so this is the one which I'm trying to connect.
So it's just saying it's not even going anywhere. Can you do a trace route? Yeah, I can. But a
trace
route is also not actually giving me anything. It's just that. No, actually, okay. It's not doing
anything.
10, 1, 80, 10. I think there is some route issue. I was confused about this particular route. I can
see this
particular route is going to this address now.
So basically that attachment is your DX Gateway attachment. 1085 is your on-prem right? This
one.
Yeah, 1085 is on-prem. So this is our correct attachment right? This got confused me a little bit.
Basically I think, just a second. So there are three routes for 1085 series.
Yes, the other one I was not able to see that something is... I will just share it with you. Okay. So
these
are the three routes for same sider. So basically first one is your supernet which is less 16 and
other
two are your specific siders for 10 and 11 subnet.
So any traffic falling under the 85.10 or 85.11 will follow this longest prefix match paths which
are
other two which are pointing towards the direct connect. So that is fine from here. Do you have
this
AWS instance access?
it represents actually oh this particular server access i'm not having maybe i think it's it i think
the
route is because we are not getting anything on this on-prem which means that might be route
missing on the os let me check
But actually in our OIS we are not putting any kind of routing system. So it's the same OIS which
we
have, sorry the same routes which we are using. Any TCP service you are using on AWS which
you can
try to tell it or something. So sorry can you just repeat it again. So basically the instance which
you
are trying to ping right.
Do we have any specific ports which we can try to telnet or SSH so we can get idea sometime
see ping
might be blocked. Let me see if I can get any kind of because this is a different server. Just give
me a
moment I'm just stop my sharing. Okay. Hey, take the dish. Why are you eating this? I will wash
the
dishes from you. I have washed the dishes from you till today.
I will share my screen now. So this is the server. This is the destination server and the other one
is
source. So this is the AWS server. Let me just double confirm it somehow.
I think there is no route for 1085. Ok, let me see. Let's just say. Yeah, ok it is there. 1085, 1183
via 1085.
Can you do the same thing on the on-prem server? Ok, the route one? Yeah.
Yeah, sure. Because I have already tried it, I think I might get it here. Yeah. Okay, it is checking
distance. 10-180, 10-239. Yeah. There are two waves of all this routes are getting advertised for
10-180
also. This one is 80 SE. And this is a 10-180 distance. Yeah, when I'm trying from AWS, I'm
getting this,
the trace route. Okay.
so this is actually which 10 this is 169 254 252.1 96.3 yeah okay this is the bif only okay so this
is which
which we mentioned right right uh ending with six qbk okay so over that okay
okay this is the one right yes okay so in here an association i think i have added this page as
well so
it's right it should allow okay on the other hand side let me just this is going to this transit
gateway
because i'm just confused about like is there any routing or something which time we can do
one
thing uh just go to your on-prem once
Ok, so you need to go to the server or the console? It's a little out. Server, server, server. On-
prem
server. Ok, yeah. Let's do one thing, just a second. We can capture traffic if it is receiving, if it is
getting
received on on-prem or not. When you are trying to ping from AWS. You mean TCP down?
Yeah. Let
me get the command. I'll just type in this. Ah, ok. I will just share it with you.
So beside source you can add source ip as aws Just let it be source and space aws ip Just
mention
there any space src source Then after that ip
yeah yeah I have to yeah you can just try to run the ping or something let's see if tracking is
working
I'll do the trace route again do the ping once okay first trace route might be ping would lost in
between the okay okay we are means we are receiving icmp echo request correct from AWS
okay now
try to do the same thing just stop this capture
and run this capture on the AWS also and try to ping it from here. This mentions Rose as your
on-
prem IP. I have already done. So we can get like if there is any route missing on any of the site.
Initiate
ping. I have initiated.
But I think it's not coming. Which means there is some issue on the route towards AWS. Which
means
like the outbound from the valley cloud is blocking this. Is that what you mean? Yeah, mostly I
am
suspecting that. Just toggle again to that AWS instance. Okay. Okay, they are not receiving any.
you can see zero package captured I think the traffic is getting dropped in the middle or
something
just try to do SSH or something
Sorry? Yeah, you were trying to do SSH, right? SSH is working fine. I'm already in the machine.
No, no,
via this... Both missions are... Via this, your on-prem machine, are you able to do SSH?
Because I think
SSH would have taken... No, that is not allowed. Okay, okay. Because we have already
restricted all
those things. I'm just trying to...
It was in a different way which I mentioned, which is able to connect. I was just looking like I can
do it
from there and just both are going into the same place. Because right now I am trying to do it
from
there. Just a second. So I just need to confirm it. Both are going into the same place and I think
I can use the same couch which we have there in a little bit. I will just put the chair here. So it
should
be there. Yeah. Give me a moment, I will just finish this up. Yeah, sure. Take it. Thank you. Yes,
my
time is coming at the same time. I show my screen. So this is absolutely the one we're trying to
connect into.
So this is going with the same value. This is 5 but this is the one right? Yeah, that is 50 is the...
Yeah,
dot 50 is Amazon's interface IP. This one is 252. So here it's going to 252.5.
So why it is here we have two different IPs? That is mostly the gateway it should be. But here I
can see
only one. Can you share me the instance just once? This instance ID. This instance which,
okay. Yeah.
The one which I, right now the working one, right? Yeah, right, right. So this is my, this is our
production one. Working for myself. This is the one. Okay. So this is so much E and I.
Mostly the routing is same for both the instances. I think there is some issue in the return routes
towards AWS. You mean like from on-premise to back-end? Yeah, from on-premise. Is that
what you
mean? Yes, from on-premise to AWS, correct. Because we are sending that echo request but
also not
receiving any response and when we are trying to do echo request from on-prem, it is not
reaching
the AWS.
It is getting somewhere dropped or something. It's happening. 1085.11 will terminate on time.
Transit
gateway. Let me see. DX.
1080.[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].0.0.0
.[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].0.0.0
.[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].0.0.0
.[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].[Link].0.0.0
.[Link].0.
something might be on the instance itself on this on-prem instance. Is it, can we try to do any
telnet
on port 443 or something? Is it possible? I'm not sure if this is a working one. Even for the
working
one, I don't think this will be a capable. Because we have some kind of restrictions over that
one. But
I think this is the working one.
If this didn't work, then the other one won't work. This is connection to boost. So it's reaching
and
getting the connection to boost. Because we don't have anything. But the other one, I think
mostly it
should get connected. It's trying. It's just trying. It is not reaching there.
So you mean like it's not even reaching to the AWS right? Yeah, just do you have the transit
gateway
flow logs attachment? Attachment flow logs enable? We can check if we are receiving... We
have just
for the VPC, I don't think we have... But I'm not sure about this particular VPC because this is a
new
VPC. We are not using this as far as... Oh yeah, we have.
This might be complete. Yeah, destination. Uhh, what is the typing you are trying to paint? ENI
right? I
think this one. Let me share it in the chat. This one would be the ENI. 43. Oh yeah? Okay.
Just go to the filter and type in your on-premise IP which is 1085 You can type the whole IP
1183 yeah
1085 1183 It's not showing completely right I think the flow of format is It's showing the rejects I
think
This is only internal traffic Just go to the logs and
Yeah, now we are getting C. This is your outbound traffic. Like from AWS. Yeah, this is from
AWS to
your on-prem. Okay, so this one. You can do one thing. Just go to that log insights once on the
left
tab. Okay. Yeah, at the end, go to the end of first line and hit enter. Here? First line, first line.
here? yeah go to the end just hit enter write I'll just give you one filter just type this filter paste
this
filter on the second line between apostrophes just add the IPs source okay yeah 1085 11 83 I
think
10.180 10.139 Run the query It is not reaching here Traffic is not reaching here So it's mostly
due to
routing issue from other end right? Yeah I think outbound traffic is somewhere getting dropped
or it is
not reaching here But if they have the issue the internet is working fine right?
Inbound is working but outbound is not. Because when we did that ICMP echo request we can
see
like we are not sending. It's coming in. Yeah that is fine like it is coming in but there was no
response
for the request. Reply was not going there.
In this case, the outbound is having issue, right? It is not the inbound runs. Because I just need
to
double confirm if it is complete out issues or it's just the outbound issue. Yeah, it's an outbound
issue.
I think from OS level there might be some issue. The traffic is getting dropped on the interface
or
something. Because if a request is coming, there must be a reply. Auto reply should be there. It
is not
going, actually.
Can you just do ifconfig interface 1085, 1183 Which one is 1085, drop 0, receive back its
transmitter,
it's ok. I think I need to run it, just a second. This is also, sorry, this is. Yeah, that one was
correct. Ok,
got it.
Is there any kind of knackers or rule that has been set over here on this instance? I don't think
so.
Because this is some kind of like the production one so we mostly didn't do any kind of like
usually it
should just work if you don't have it. I think the rock table is this one. Rock table, this one I have
added because I'm only concerned about like this is her out.
Okay, so this is currently VPC, this is Alibaba cloud, right? Yeah, so I'm just comparing these
things.
I'm just logging into this particular one of the machine so that I can just again confirm like if it is
the
same, I'll just start the same over the route.
because I am not the one who set it up so it's completely confused that's all. So that on premise
instance is a Linux right which one it is? Debian or something? No it's a Debian it's a Roku Linux
but
the route that's something I don't understand it why it's coming in but it's not acknowledging or
doing any other thing.
yeah let me see if there is any local firewall dropping ICMP or something you have shared
something
to me? yes on the chat just don't run that command first let's run another command okay run the
second command
it's empty now run the first command sudo iptables empty can you run this command and let us
confirm if the icmp request is getting sent on the correct interface what is that interface? inet2
just run this command once again on this instance on-prem instance sometime it's like echo
request
are receiving on different interface rather than that's you can run this on the on-prem so I will try
the
pin here echo request
okay just run command again and include a hyphen v for detail yes
can you see the written traffic is going via which uh interface just type ip route get and then that
amazon instance ip yeah sure it's 253 okay it's the same and then we can hit zero
just run the same command on the Amazon instance again for the ethernet zero let's see if we
are
receiving the same command and now try to ping from on-prem on AWS is good? yeah there is
AWS
traffic is not receiving on AWS either or on any of the interface
because as as aliclord is able to receive and request is sent from the server so the routing on
the both
sides are fine right yeah like like that should be how right after there is no outbound just run one
more command systemctn
let's run this command otherwise we will see on the transit gateway attachment once if we are
receiving route on one ok did you send something to me? yeah I'm just sending one command
in the
chat ok let's run this once let's see if something in on-premise? yeah on on-premise ok this is
this is
my
Okay, just a second. It is set to zero. Okay, means it is disabled for now. Just try to ping via
sudo. Just
ping, type sudo ping and then this Amazon IP. I am actually in sudo. Okay, you are already in
sudo. I
am in root console. Okay, okay, okay. I am already in root console. Okay, okay. RP filter is not
there
which means mostly no local firewall involved.
Okay, we can do one last thing. I'll just go to that AWS console one. Oh console? Okay. And on
towards
the transit gateway attachments. Okay. Yeah, just search here that DX attachment. DX gateway
attachment. I think let me grab it first. This one might be. This one will be the DX gateway
attachment. Ending with B0. Yeah. I have opened mult to…
Just go to the action, click on action. Create flow log, name for the text flow log. Put it in the
same
place. That is fine. Format is fine. You can just create. Go to the flow log. Go to the flow log
again, the
tab below.
I will just share the unit in the chat transit gate unit okay so one by one we can check for this
three
units okay so let me just close couple of things this one I'm not able to get here the first one
I'll try the second one. I think this is the VPC flow log that might be the easiest. Yeah right
because we
selected the VPC flow logs that's why I think. But it should push the logs too sometimes. These
are all
the VPC ENIs right? It won't show I think over here.
Okay, maybe meanwhile I can do one thing. I can just remove that one and put it into something
different. Yeah, you can do that also. I think that won't work. That group I am suspecting. Yeah,
you
can select your transit data. It will come under VPC. Yeah, I think it is coming under the VPC.
Yeah,
right. Okay. Next. Yeah. So now let's do next.
ok it's already there maybe I'll just try to put it over here nothing is here as of now will it take
some
time? I think this will take some time just keep on generating the continuous traffic if it's not
showing
which means it's not coming just go to and click on view in loginsights
go back to that flow log again yeah you can see there was direct option we can see yeah just
select
the log group here again your tgw flow logs just go to that custom time frame and select 30
minutes
or something yeah yeah select 30 minutes
00,340 --> [Link],359 [speaker_0]
My shift has been ended like 30 minutes before. So, what, what are the next step we are
planning to do?
[Link],440 --> [Link],980 [speaker_1]
Um, I know, uh... (clears throat) I think we just need to wait for another IT or, uh, machines for
us to test. Uh-
[Link],980 --> [Link],899 [speaker_2]
Yeah, yeah. I already requested. I, I already requested, um, which, uh, but the guy is not
available now. He will, he will do later.
[Link],079 --> [Link],459 [speaker_1]
Okay.
[Link],019 --> [Link],979 [speaker_2]
For this current session-
[Link],000 --> [Link],520 [speaker_1]
So, for, um...
[Link],520 --> [Link],240 [speaker_2]
So, uh, uh, maybe, maybe, uh, we, we probably talk first. Maybe we, we come, uh... We, we try
from email later because once, once the, uh, the, the, we already, we can test. Give your result
and okay, we just request from the email. If not, then maybe we need to join back the call
within one or two hours to sell.
[Link],299 --> [Link],939 [speaker_1]
Mm, okay.
[Link],360 --> [Link],700 [speaker_0]
Okay, that sounds good.
[Link],840 --> [Link],180 [speaker_1]
Mm-hmm. Okay. So let, let's talk first time.
[Link],680 --> [Link],799 [speaker_2]
All right.
[Link],840 --> [Link],220 [speaker_1]
Yeah. Thank you, guys.
[Link],040 --> [Link],579 [speaker_2]
Thank you, guys.
[Link],559 --> [Link],599 [speaker_0]
Okay, thank you everyone. Yeah.
[Link],599 --> [Link],179 [speaker_1]
Hi, thank you very much for helping. Bye.
[Link],459 --> [Link],059 [speaker_0] [Link],540 --> [Link],019 [speaker_2]
Bye.
[Link],059 --> [Link],119 [speaker_1]
Bye.
[Link],119 --> [Link],520 [speaker_3]
(laughs) (biola music)
[Link],220 --> [Link],080 [speaker_0]
... then we can move forward, right? So I was, uh, telling that as per the configuration,
Check Point is the initiator, right, for this VPN connection. So whatever the, uh,
"Okay, so here is the thing, Josh. I've updated the case with the information, so I'll be sending
you an email with the details.
So, I think, uh, we need to know where the application is because that is the application which is
using the SSO from the Identity Center.
So, if you can, uh, inform on the case, if you would be able to find where the application is
residing. So, according to that, we can plan, like, uh, if we need to proceed with the manual
rotation of the certificate, or if we need to proceed with the new application setup.
So, it's totally up to you. Uh, just keep me updated on the case so I can manage accordingly.
Yeah, I think you need to have a check on your Notion, if there is any application details, or I'm
not sure if the other person is there or not who set up these things. So, if you can check on the
Notion.
I'll be also trying to find the application, if I can find, through the logs or something. But, I don't
think it would be that simple.
So, if you can just check from your end, if you can find the application detail, and if you can
provide it, so we can proceed with the certificate rotation.
Yeah, so it is, it is not, uh, using any external IDP, it is using its own Identity Center. So, if you
can find the application that is associated with that Identity Center, then it is an easy job for us.
So, in the original account, the **9105** one, this is where the identity center resides. And in
this, currently, the only thing active is the **AWS Access Portal**. And it seems that it is using
the **default identity source**, which is the **AWS SSO itself**.
So, that is why it is not, uh, using a third-party IDP like an Azure or an Okta or any of the third-
party ones.
Okay, so the current setting is that it is using **AWS Directory Service** with a **default
directory**. And the authentication is happening through its **default identity source**.
So, as we were discussing, we just need to, uh, if you, uh, check with the team, if there is a
problem, or if there is no problem, so the easy solution would be just to **rotate the metadata
certificate** of the application.
So, if you are able to find, uh, the other account where the application is there, then we can
**download the metadata** from there and **upload it** in the original account to fix the
problem.
But, if there is an urgent need, then, as we discussed, we'll have to **create a new application**
and set up the whole process again.
So, it's totally up to you. If you want to proceed with the first solution, we can wait for the team to
respond, or if you want to proceed with the second solution, then we can start the work on
**creating a new application** and setting up the SSO and the access.
Uh, can you confirm that the application is there in the other account? And in this account, the
application is not there.
So, as we see, there is no application here in the **6482** account. So, where is the application
residing?
Okay, I'll update the case with the information that the Identity Center is active on the **9105**
account.
Yeah, it's currently using the **default identity source**, which is the **AWS SSO itself**.
Okay, no problem. If you can provide the application details on the case, I'll be updating you on
the things.
Yeah, I'll update the case and I'll send you an email on the case.
Yeah, I didn't see center. This exists. It only, the identity center only exists in our regular
account.
Yeah, if in this account it doesn't exist. Yeah, for all the other accounts it seems to have one.
The identity center is active here, but there are no applications inside it.
Okay. I mean this one is not that account. Yep, they're not the same account. I'm looking at the
HGM management account right now, but it has...
By the way, any chance would you be able to get that information? In which account you have
the AWS SSO setup?
Um, it was set up a long time ago by people who aren't here anymore. I might be some, I might
be able to try ask around a few more people on their notion. Because we simply need to just
rotate that certificate from the Identity Center. Yeah. Yeah. So that is, uh, that would be the
same step. You will just generate the new metadata from the Identity Center and upload it here
on your original account. And again disassociating things, subnets and associating, so you
would be able to get connect. Earlier we thought like it is using an external IDP like Azure or
Google, but it has its own, it's using its own AWS SSO. Yeah. Well, I suppose we'll check the
log and see what we can find. You are to check that. Otherwise if there was an external IDP,
then there was no issue, but there are multiple AWS account. So you're not sure in which
account the SSO is there. All right. Well, I suppose we'll check the log and see if we can figure
something out. Yeah, or else, uh, yeah. Okay, no problem. You can just check if you don't found
or you will not be able to found then the another solution is to create a new application. Uh
yeah. Yeah, that is another way to have the client be up and running. Yeah. Sure. Okay. Okay,
so no issues. Uh okay, I'll be just managing this case throughout the time. So you can just
update on the case if you would be able to found or not. So accordingly we can plan like if you
want to proceed with the new application setting up or not, so all the things. Okay, sounds good.
Yeah. Okay. Sure. I'll just provide you the brief on the case, what we checked and what we
found. So... Okay, so I think we can conclude this call for now, Josh. Are you okay? Yeah.
Yeah. Just let me know if you would be able to find that thing so we can then there is an easy
job, we just we'll just need to rotate the certificate. That's it. Sounds, sounds good. Thanks.
Okay, sure. Yeah. No problem. Okay, bye. Thank you, Josh.”
Transcription result
Smart actions
This call at 6pm today.
Okay. For 6pm okay. For 6pm I would not be there. My shift will be over around four. So I need
to hand over then this case to another engineer.
Not a problem. Just give me a second. What is your time on Monday?
Monday would be the same. 9am to 4pm Sorry, I think my shift is getting changed from Monday.
So I would not be available on Monday. I'll be available from Tuesday to Saturday.
Sunday.
No, I need to hand over them.
Okay. Tomorrow you are available Saturday. No. Right? Yeah. Okay.
So like what is the context? Like what is the issue?
Context is like the traffic is not coming through.
Okay.
So I need to get some information. That is what I'm waiting. Can we set up this call at 3:30 if
your shift is ending, that's fine. 4:30. 3:30 before it's fine.
Okay. In the meantime. Yeah, 3:30 then that would be the same. After 4 I need to hand over.
Then you don't need to give all the information to another engineer. So that would with the case.
So. So if you want me to troubleshoot something, I can do it after the call as well. There is no
issue. You can just provide me the details like resources on AWS which are trying to, you know,
reach on Prem. So I can just. Yeah, so I can do it offline also and provide you the update on the
case before the shifts.
Okay, so give me a second. Let me try to. What? We can do that. Yeah, I need couple of time
for this.
So we can. What we can do is we can schedule it for tomorrow and maybe another engineer
from the AWS will join the call.
I don't think that will be fantastic.
Yeah. So you can tell me the time.
Not tomorrow, on Monday.
Okay, on Monday. What time?
Monday at 11am.
Monday, 11am Yeah, 11am Is available.
Yes. Yeah, apologies because. Because I need some time for this to get some information.
Then I'll come back to you guys. That is fine, right?
You can reach out anytime. There is no issue.
Okay. Okay. Yeah. Thank you guys. I'll. I'll connect you back.
Okay, thank you. Thank you so much Yash for joining. Thank you. Kidnapade ublawa under
daldia basavi chalutundiknao.
Fry garlic and.
Not yet. I was just checking, and I think it’s fine for those two weeks as well. The routing looks
fine for these three weeks too. I might suspect that the traffic is getting dropped somewhere.
Is it because the traffic isn’t traversing over the DX? Otherwise, it should be visible in the DX
attachments or flow logs. It’s leaving Alibaba Cloud, but somewhere in the middle, it’s getting
dropped and not reaching AWS.
Let me check if I can find any logs. If I find something, can you email me back on this case?
Yeah, sure.
Okay. I think if I get something from the backend, I’ll put it on the case. If you get any updates,
just let me know.
Okay. Hello? +1 021920025. Windows support, Active Directory, Windows right side, Windows.
Okay.
From AWS side I think there is something much more you can check. Let me see the
attachment metrics. There is anything dropped on getting dropped on attachments.
Okay. From Alibaba side. Actually I'm able to see both in and out. Hello.
Yes.
Yeah, so this is. Okay, this is from Alibaba side. So just looking like source of destination.
Anything. Anything over here. See, I'm able to see like both in and out. It's already gone from
here. If you see here I can see both in, out, everything. Like if it is in only working means it
should only show me in, right?
Monica
Monica Audio to Text
0
Transcription result
Smart actions
From AWS side I think there is something much more you can check. Let me see the
attachment metrics. There is anything dropped on getting dropped on attachments.
Okay. From Alibaba side. Actually I'm able to see both in and out. Hello.
Yes.
Yeah, so this is. Okay, this is from Alibaba side. So just looking like source of destination.
Anything. Anything over here. See, I'm able to see like both in and out. It's already gone from
here. If you see here I can see both in, out, everything. Like if it is in only working means it
should only show me in, right?
Yeah.
Here I can see both in, out. Everything is in accepted as well.
Okay, but if that is the case, why it is not reaching? Ew.
Just keep in a minute. I can see something from answer Kitty. Looks right now. I think sprinting.
My screen.
Okay.
Okay. You started receiving the logs?
Yes, this. This is.
Okay, just type it in the filter first. Source ID and space destination. I.
Just.
It's 93 I think 239. Just refresh the filter. Set it to 30 minutes. This 1080 is already only getting
advertised on this. There is no other before which it is.
I don't think so. 1084, right?
Yeah.
Okay. We have multiple.
Yeah. Okay. There. That is not issue. It is multiple VLANs or leaves. Traffic should to come over
here.
This again initial anything when we are doing something. Uhhuh. Because anyway there is
some kind of outing with this person. That's the reason why when we are doing the dump over
itunes.
And so for this NRT region, you have only one virtual interface right over dx.
On which one?
On like between Alibaba like your on Prem and aws we have.
We have multiple.
For nrd. I'm seeing only one. There are interfaces in AP South. In AP south there are other
interfaces.
Yeah. Okay.
That is. This is a different configuration than it is attached with Trying to transit virtual. Just try to
initiate pink again this pectoral again with the source and machine.
Over here.
Traffic it's not itself is not reaching here on the DX attachment. This one is the current working,
right or non working.
So non working one.
It. I think the route or traffic is getting dropped in between them before reaching to aws.
It might drop from the provider side.
There are two things like traffic itself. Because if traffic is getting dropped on the provider side.
Right Then from the working for the. For the working it will not work because for that you are
also using the same interface or virtual interface. Right. So I think this is something on the
instance Level which is not allowing traffic to leave the instance.
But if okay from. From Alecloud if it is moved, leaving means I won't be able to get in that VPC
product for Maliclav side, Right? But some people follow them getting things like both in and out
and everything is accepted as well because it's the same same IP which I'm trying. Everything
is. Because I think so. So from Ali cloud side I think we are good. Why? Because it's like it's
coming like we are able to see the things as well. And it is leaving from Aliflor as well. But it is
not reaching aws. So some kind of routing issue happening from AWS side is something which
I'm suspecting as well.
This is NDX obtain 85. It will take direct column 10.18. Just filter that flow logs have been See if
we would have received any traffic on attachments.
This is the test one we have, right?
Yeah, right. That is. I think that is the weakness. You are type one because first the traffic will
land on that. No, not the. Because the traffic from on Prem will.
First I was here. It's coming to VPC attachment All. All the traffic.
Yeah, you can see the source attachment. Source attachment is your dx, right?
Okay.
That is your source attachment. So the first traffic will land on this attachment and then it will go
to your VPC attach. Don't know why traffic for 180 is not reaching Deal. It is getting advertised
over the. Can you share me these two whiffs? Just go back to that virtual interface again NRT
region.
The one which I have shared with you previously.
No, the earlier two which you have. Which. Yeah, this. This Below two. Below two. Yeah, this to
share. Let me see what is the routing in this? Also. Received. This one associated with cmdx.
Just allow me a few minutes. I'll change this to this.
Yes, sure. Can I give.
Sure. Yeah. Okay.
SPK_1
1:20
There is much more you can check.
SPK_1
1:23
Let me see the attachment matrix.
SPK_1
1:27
If there is anything dropped on.
SPK_1
1:28
Getting dropped on attachments.
SPK_2
3:01
Okay.
SPK_2
3:01
From Alibaba side.
SPK_2
3:02
Actually I'm able to see both in and out.
SPK_2
3:10
Hello.
SPK_1
3:12
Yes.
SPK_2
3:14
Yeah, so this is.
SPK_2
3:15
Okay, this is from Alibaba side.
SPK_2
3:18
So just looking like source of destination.
SPK_2
3:20
Anything.
SPK_2
3:20
Anything over here.
SPK_2
3:22
See, I need to see like both in and out.
SPK_2
3:25
It's already born from here.
SPK_2
3:28
If you see here I can see both in, out.
SPK_2
3:32
Everything.
SPK_2
3:34
Like if it is in only working means it should only show me in, right?
SPK_1
3:39
Yeah.
SPK_2
3:39
Here I can see both in, out.
SPK_2
3:41
Everything is in accepted as well.
SPK_1
3:53
If that is the case, why it is not reaching aws?
SPK_2
4:21
Just keep in mind.
SPK_2
4:52
Okay, thank you.
SPK_2
6:11
I can see something from answer KP logs right now.
SPK_2
6:16
I think printing.
SPK_2
6:19
I'm just sharing my screen.
SPK_2
6:20
Yeah.
SPK_2
6:22
Okay.
SPK_2
6:23
So.
SPK_1
6:25
Okay, you started receiving the logs.
SPK_2
6:28
Yes, but this.
SPK_2
6:33
This is not type.
SPK_2
6:35
You can.
SPK_1
6:36
Okay, just type it in the filter first.
SPK_1
6:39
Source IP and space destination.
SPK_1
6:40
I.
SPK_1
7:31
Just refresh the filter.
SPK_1
7:32
Set it to 30 minutes.
SPK_1
8:05
This 10:1.
SPK_1
8:06
It is already only advertonic getting advertised on this.
SPK_1
8:10
If there is no other before which it is.
SPK_2
8:14
I don't think so.
SPK_2
8:16
1085, right?
SPK_1
8:18
Yeah.
SPK_2
8:22
Okay.
SPK_2
8:23
1085 is from under.
SPK_2
8:27
We have multiple.
SPK_1
8:30
Okay, okay.
SPK_1
8:31
There.
SPK_1
8:31
That is not issue.
SPK_1
8:33
It is multiple VLAN for a week.
SPK_1
8:38
Traffic should come over here.
SPK_2
8:41
This again initiate when we are doing.
SPK_2
8:47
Because anyway there is some kind of counting, which is possible.
SPK_2
8:51
That's the reason why when we are doing the dump over.
SPK_1
8:57
So for this NRT region, you have only one virtual interface, right?
SPK_1
9:03
Over DX.
SPK_2
9:06
On.
SPK_2
9:06
On which one?
SPK_1
9:07
On.
SPK_1
9:08
Like between Alibaba.
SPK_1
9:10
Like your on Prem and aws.
SPK_2
9:12
We have.
SPK_2
9:13
We have multiple.
SPK_1
9:16
For nrt I'm seeing only one.
SPK_1
9:21
And there are interfaces in ap.
SPK_1
9:28
In AP south there are other interfaces.
SPK_1
10:02
Okay.
SPK_1
10:02
That is.
SPK_1
10:04
This is a different configuration.
SPK_1
10:06
Then it is fine.
SPK_1
10:07
It will attach with different transit virtual.
SPK_1
10:24
Just try to initiate ping again.
SPK_1
10:26
This filter here again with the source.
SPK_2
10:31
Over here.
SPK_1
10:43
Traffic it's not itself is not reaching here on the DX attachment.
SPK_1
11:10
This one is the current working, right?
SPK_1
11:12
Or non working.
SPK_2
11:15
So non working.
SPK_2
11:36
It's.
SPK_1
12:02
The route or traffic is getting dropped in between them.
SPK_1
12:05
Before reaching to aws.
SPK_2
12:09
It might drop from the provider side.
SPK_1
12:15
There are two things like traffic itself.
SPK_1
12:18
Because if traffic is getting dropped on the provider side, right?
SPK_1
12:22
Then from the working for the.
SPK_1
12:26
For the working it will not work.
SPK_1
12:28
Because for that you are also using the same interface or virtual interface, right?
SPK_1
12:34
So I think this is something on the instance level which is not allowing traffic to leave the
Instance.
SPK_2
12:44
Okay.
SPK_1
12:44
From.
SPK_2
12:44
From any cloud if it is moved easing means I won't be able to get again that VPC product from
Ali cloud side.
SPK_2
12:50
Right.
SPK_2
12:51
But some people follow them getting things like both in and out and everything is accepted as
well.
SPK_2
13:00
Because it's the same same IP which I'm trying.
SPK_2
13:03
Everything is.
SPK_2
13:31
Because I think so from Ali cloud side.
SPK_2
13:33
I think we have goodbye because it's like it's coming like we are able to see the things as well.
SPK_2
13:40
And it is leaving from aliplor as well.
SPK_2
13:42
But it is not creating a reposal.
SPK_2
13:45
Some kind of routing issue happening from AWS side is something which I'm suspecting as
well.
SPK_1
14:11
This is NDX obtain 85.
SPK_1
14:17
It will take direct 180.
SPK_1
14:31
Just filter that flow logs again.
SPK_1
14:34
Let's see if would have received received any traffic on attachments.
SPK_2
15:04
No, This is the attachment we have, right?
SPK_1
15:45
Yeah.
SPK_1
15:45
Right.
SPK_1
15:47
That is.
SPK_1
15:47
I think that is the VPC attachment.
SPK_1
15:52
Because first the traffic will land on that dx.
SPK_1
16:04
No, not the VP attachment.
SPK_1
16:06
Because the traffic from on Prem will first.
SPK_2
16:12
Here it's coming to VPC attachment.
SPK_2
16:16
All.
SPK_2
16:17
All the traffic.
SPK_1
16:20
Yeah.
SPK_1
16:20
You can see the source attachment.
SPK_1
16:22
Source attachment is your dx, right?
SPK_2
16:25
Okay.
SPK_1
16:26
That is your source attachment.
SPK_1
16:32
So the first traffic will land on this attachment and then it will go to your VPC attachment.
SPK_1
16:46
Don't know why traffic for 180 is not reaching till it is getting advertised over the.
SPK_1
16:58
Can you share me these two whiffs?
SPK_1
17:02
Just go back to that virtual interface again NRT region.
SPK_2
17:10
The one which I have shared with you previously.
SPK_1
17:13
No, the earlier two which you have.
SPK_1
17:15
Which.
SPK_1
17:16
Yeah, this this.
SPK_1
17:17
Below two.
SPK_1
17:19
Below two?
SPK_1
17:20
Yeah, yeah, this too.
SPK_1
17:23
Let me see what is the routing in this Also.
SPK_1
18:39
This one is associated with cx.
SPK_1
18:46
Just allow me a few minutes.
SPK_1
18:48
I'll chat this to you.
SPK_2
18:51
Yes, sure.
SPK_2
18:52
Can I give.
SPK_2
18:53
I'll just take your voice and come.
SPK_1
18:55
Sure.
SPK_1
18:55
Yeah.
SPK_2
18:56
Okay.
SPK_2
18:59
It.
This is the two VLANs with the 24 I think yeah yeah okay 10, 1, 3, 0 and 5 okay And for the
working VPN, which route are you advertising? [Link]. [Link], okay. [Link], okay. Route
received on DX, it's 10.1. All right, okay, let me check the VPN. this VPN is present in different
account it's in or it's in the same okay it's in the same zero oh just a few minutes I'll go through
the configuration hmm 10, 12, 13, 14, 15.