01-04-2019 10:28 AM
Hello,
Is there planned AWS Transit Gateway integration? There is mention but no detail in this video:
https://www.youtube.com/watch?v=6fhwoAwYrug
Other than operational ease, the Transit Gateway advantages appear limited. Traffic between VPCs is not encrypted. VPC segmentation is via routing and does not traverse a firewall.
03-11-2019 01:11 PM
Hi @jperry1 ,
My concern with this design is the VPC attachment from TGW SN to the TGW. Rather than using ECMP VPN links 'that I have been unable to find documentation on', the data sent across that connection will be in the clear; right?
What are your thoughts on that?
02-06-2020 06:21 PM
Fantastic documentation here in the manual build https://github.com/PaloAltoNetworks/TransitGatewayDeployment, I think you left out one thing. A need to add default route on FW2 pointing to eth1, otherwise the outbound traffic will be dropped by the firewall.
03-10-2020 12:39 PM
I am on my third or fourth attempt to walk through the Manual build guide and every time I reach Page 22, step 8, the TGW Attachment "attach-spoke1" is not available as a target. Only the tgw-security gateway.
03-10-2020 12:44 PM
Please switch the deployment guide and reference architecture here.
https://www.paloaltonetworks.com/resources/reference-architectures/aws
03-10-2020 01:08 PM
Hi @DewhirstR ,
Hope all is well and you get this worked out.
Take a look at page 13-15 and verify the VPC attachments for both spokes to the TGW. Verify Associations in the TGW Route Table for the VPCs.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!