Skip to main content

Site2Cloud With Customized SNAT

This document demonstrates how to create a Site2Cloud connection between two VPCs by using a VGW and an Aviatrix gateway. The Aviatrix gateway also serves as a Source NAT device and translates source IPs of traffic initiated from a peering VPC to an IP address selected by users.

Environment Requirements

There are two VPCs as illustrated in the diagram below. The VPC-1 CIDR is 10.0.0.0/16 and the VPC-2 CIDR is 172.19.0.0/16. The Site2Cloud connection is between a VGW in VPC-1 and an Aviatrix gateway in VPC-2. s2c-snat You will also configure customized SNAT at the Aviatrix gateway, which translates the source IP of traffic initiated from VPC-1 (10.0.0.0/16) to a user selected IP address (192.168.1.10 in this example). This way, VPC-2 VMs will see all packets from VPC-1 with the same source IP address (192.168.1.10).

Steps to Configure Site2Cloud Connection and SNAT

  1. Install an Aviatrix gateway in VPC-2 by following these instructions.
  2. Create an Unmapped external connection between the VGW in VPC-1 and the Aviatrix gateway in VPC-2.
    When creating the connection, select Generic for Remote Device Type.
  3. Update VPC-1 Route Tables at AWS portal to ensure that traffic with VPC-2 (172.19.0.0/16) as the destination takes the VGW as “Target”:
    FieldValue
    Destination172.19.0.0/16
    TargetVGW ID
  4. Configure Customized SNAT at the Aviatrix gateway. a. In Aviatrix CoPilot, go to Cloud Fabric > Gateways > Spoke Gateways. b. Select the Aviatrix gateway created in VPC-2. c. On the Settings tab, expand Network Address Translation (NAT) section. d. Set Source NAT toggle On. e. Select Customized SNAT. f. Configure the following SNAT rule.
    FieldValue
    Src CIDRVPC-1 CIDR (10.0.0.0/16)
    Src PortLeave it blank
    Dst CIDRVPC-2 CIDR (172.19.0.0/16)
    Dst PortLeave it blank
    Protocolall
    ConnectionNone
    MarkLeave it blank
    SNAT IPsUser selected IP (192.168.1.10)
    SNAT PortLeave it blank
    s2c-snat2 g. Click Save. The rule appears in the table. h. Set Apply Route Entry toggle On to commit the rule.

Test Site2Cloud Connection and SNAT

Use the following tools to test the connection and verify the source IP NAT to the IP selected.
  • Go to Diagnostics > Cloud Routes > External Connections to verify that the external connection status is Up.
  • Ping from an Ubuntu VM in VPC-1 to another Ubuntu VM in VPC-2.
  • Turn on “tcpdump icmp -n” at the Ubuntu VM in VPC-2. Verify the source IP of the pings is 192.168.1.10.