Hello!
We have an AWS VPC setup with one private subnet only and hardware VPN access (scenario 4). The private subnet contains one Windows EC2 instance which we connect to using SG105 UTM through RDP. Everything works fine and we are able to connect to the instance.
We want to give outbound internet access to the private instance using the UTM as the gateway - which we are not able to do!! There are several articles on how to launch a NAT instance within the public subnet of the VPC and configure it to provide outbound internet access to the private instance. We don't want to do that. We want our UTM to act as the gateway for the instance.
For this we tried several configurations with no success. As far as AWS side of configurations go, everything is setup right (we think). The Route Table is configured to send all traffic (i.e. 0.0.0.0/0) to the virtual private gateway and the security group is configured to allow outbound HTTP traffic to 0.0.0.0/0.
On the UTM side of things, we have defined a SNAT rule with the following parameters:
Traffic From: AWS EC2 Instance
Using Service: HTTP
Going to: Any IPv4
Change Source To: WAN (Address)
Automatic Firewall Rule: Check
Rule Applies to IPSec Packets: Check
This configuration is not working and we don't really understand what we might be doing wrong here. Any insights?
Thanks!!
This thread was automatically locked due to age.