AWS IPsec links: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 52: | Line 52: | ||
|vpn-0329f8fc12afa0c09 | |vpn-0329f8fc12afa0c09 | ||
|cserouter1 | |cserouter1 | ||
|129.94.39.21 | |129.94.39.21<br />cserouter1 | ||
|0.0.0.0/0 | |0.0.0.0/0 | ||
|ipsec.1 | |ipsec.1 | ||
Line 64: | Line 64: | ||
|vpn-0640a3802b05574e5 | |vpn-0640a3802b05574e5 | ||
|vmfarm endpoint for testing | |vmfarm endpoint for testing | ||
|129.94.242.18 | |129.94.242.18<br />centos7 | ||
|172.16.254.0/24 | |172.16.254.0/24<br />(csgproduction) | ||
|ipsec.1 | |ipsec.1 | ||
|13.238.86.95<br/>169.254.52.236/30 | |13.238.86.95<br/>169.254.52.236/30 |
Revision as of 17:01, 1 August 2022
Sydney VPC list
VPC name | VPC ID | IPv4 CIDR | Description | Notable hosts |
---|---|---|---|---|
nw-sydney | vpc-0e6039446916e2d4e | 10.197.84.0/22 | CSE production | nw-syd-cfengine-hub |
nw-sydney2 | vpc-0d909b2f0f3cab97a | 10.197.92.0/24 | Network experiments | experimental-networking-nw-sydney2 (54.253.107.94) |
csgproduction | vpc-081c8a619f02801f6 | 172.17.254.0/24 | CSG production | techdocs, cfplaypen |
aws1 | vpc-044951ecd1f85d3a2 | 172.16.254.0/24 | Non-CSG production | comp6443, cs1511-request-tracker, zzen9212-pen-testing-server1, zzen9212-pen-testing-server2 |
Sydney AWS VPN (IPsec) list
AWS region | VPN name | VPN ID | Description | Customer gateway | Remote CIDR | Type | Tunnel 1 | Tunnel 2 | Comments | Status |
---|---|---|---|---|---|---|---|---|---|---|
Sydney | aws-ipsec-to-k17 | vpn-0329f8fc12afa0c09 | cserouter1 | 129.94.39.21 cserouter1 |
0.0.0.0/0 | ipsec.1 | 52.63.191.33 169.254.187.12/30 |
52.64.121.168 169.254.38.88/30 |
All tunnel options set to defaults at AWS end | Not in use |
Sydney | aws1 | vpn-0640a3802b05574e5 | vmfarm endpoint for testing | 129.94.242.18 centos7 |
172.16.254.0/24 (csgproduction) |
ipsec.1 | 13.238.86.95 169.254.52.236/30 |
54.79.34.39 169.254.176.252/30 |
All tunnel options set to defaults at AWS end | Not in use |
Sydney AWS VPN (OpenVPN) list
aws-ipsec-to-k17
aws1
Connect to CSE endpoint:root@vmfram5 # ssh -l root -A site-to-site-vpn-k17-endpoint.cseunsw.tech