No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-13 The following are the tunnel options that you can configure. Dead peer detection (DPD) timeout The number of seconds after which a DPD timeout o
The following are the tunnel options that you can configure.
The number of seconds after which a DPD timeout occurs. A DPD timeout of 40 seconds means that the VPN endpoint will consider the peer dead 30 seconds after the first failed keep-alive. You can specify 30
or higher.
Default: 40
The action to take after dead peer detection (DPD) timeout occurs. You
can specify the following:
Clear
: End the IKE session when DPD timeout
occurs (stop the tunnel and clear the routes)
None
: Take no action when DPD timeout
occurs
Restart
: Restart the IKE session when DPD timeout
occurs
information , AWS Site – – Site VPN tunnel initiation options .
Default: Clear
With Site-to-Site VPN logs, you can gain access to details on IP Security (IPsec) tunnel establishment, Internet Key Exchange (IKE) negotiations, and dead peer detection (DPD) protocol messages.
For more information, see AWS Site-to-Site VPN logs.
Available log formats: json
, text
IKE versions permitted VPN tunnel . You is specify specify
default values .
Defaults :ikev1
, ikev2
The range of inside (internal) IPv4 addresses for the VPN tunnel. You can
specify a size /30 CIDR block from the 169.254.0.0/16
range. The
CIDR block must be unique across all Site-to-Site VPN connections that use the same virtual
private gateway.
The CIDR block does not need to be unique across all connections on a transit gateway. However, if they are not unique, it can create a conflict on your customer gateway. Proceed carefully when re-using the same CIDR block on multiple Site-to-Site VPN connections on a transit gateway.
The following CIDR blocks are reserved and cannot be used:
169.254.0.0/30
169.254.1.0/30
169.254.2.0/30
169.254.3.0/30
169.254.4.0/30
169.254.5.0/30
169.254.169.252/30
Default is IPv4 : size /30 IPv4 CIDR block169.254.0.0/16
range.
(IPv6 VPN connections only) The range of inside (internal) IPv6 addresses for
the VPN tunnel. You can specify a size /126 CIDR block from the local
fd00::/8
range. The CIDR block must be unique across all Site-to-Site VPN
connections that use the same transit gateway.
Default: A size /126 IPv6 CIDR block from the local fd00::/8
range.
(IPv4 VPN connection only) The IPv4 CIDR range on the customer gateway
(on-premises) side that is allowed to communicate over the VPN tunnels.
Default : 0.0.0.0/0
(IPv4 VPN connection only) The IPv4 CIDR range on the AWS side that is allowed
to communicate over the VPN tunnels.
Default : 0.0.0.0/0
(IPv6 VPN connection only) The IPv6 CIDR range on the customer gateway
(on-premises) side that is allowed to communicate over the VPN tunnels.
Default : : : /0
(IPv6 VPN connection only) The IPv6 CIDR range on the AWS side that is
allowed to communicate over the VPN tunnels.
Default : : : /0
The DH group numbers that are permitted for the VPN tunnel for phase 1 of
the IKE negotiations. You can specify one or more of the default
values.
Defaults :2, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24
The DH group numbers that are permitted for the VPN tunnel for phase 2 of
the IKE negotiations. You can specify one or more of the default
values.
Defaults :2, 5, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24
The encryption algorithms that are permitted for the VPN tunnel for phase
1 of the IKE negotiations. You can specify one or more of the default
values.
Defaults :AES128, AES256, AES128-GCM-16, AES256-GCM-16
encryption algorithms permitted VPN tunnel phase
2 IKE negotiations . You is specify specify default
values .
Defaults :AES128, AES256, AES128-GCM-16, AES256-GCM-16
The integrity algorithms that are permitted for the VPN tunnel for phase
1 of the IKE negotiations. You can specify one or more of the default
values.
Defaults :SHA1, SHA2-256, SHA2-384, SHA2-512
integrity algorithms permitted VPN tunnel phase
2 IKE negotiations . You is specify specify default
values .
Defaults :SHA1, SHA2-256, SHA2-384, SHA2-512
AWS initiate re-keys with the timing values set in the Phase 1 lifetime and
Phase 2 lifetime fields. If such lifetimes are different than the negotiated
handshake values, this may interrupt tunnel connectivity.
lifetime seconds phase 1 IKE negotiations . You is specify
specify number 900 28,800 .
Default : 28,800 ( 8 hours )
AWS initiate re-keys with the timing values set in the Phase 1 lifetime
and Phase 2 lifetime fields. If such lifetimes are different than the
negotiated handshake values, this may interrupt tunnel connectivity.
The lifetime in seconds for phase 2 of the IKE negotiations. You can
specify a number between 900 and 3,600. The number that you specify must be
less than the number of seconds for the phase 1 lifetime.
Default: 3,600 (1 hour)
The pre-shared key (PSK) to establish the initial internet key
exchange (IKE) security association between the target gateway
and customer gateway.
PSK is be 8 64 characters length start
zero ( 0 ) . Allowed characters alphanumeric characters , periods
( . ) , underscores ( _ ) .
Default: A 32-character alphanumeric string.
The percentage of the rekey window (determined by the rekey margin
time) within which the rekey time is randomly selected.
You can specify a percentage value between 0 and 100.
Default: 100
The margin time in seconds before the phase 1 and phase 2 lifetime expires,
during which the AWS side of the VPN connection performs an IKE rekey.
You can specify a number between 60 and half of the value of the phase 2
lifetime.
The exact time of the rekey is randomly selected based on the value
for rekey fuzz.
Default: 270 (4.5 minutes)
The number of packets in an IKE replay window.
You can specify a value between 64 and 2048.
Default: 1024
The action to take when establishing the tunnel for a VPN connection.
You can specify the following:
Start
: AWS initiates the IKE negotiation to bring
the tunnel up. Only supported if your customer gateway is
configured with an IP address.
Add
: customer gateway device is initiate initiate
IKE negotiation bring tunnel .
information , AWS Site – – Site VPN tunnel initiation options .
Default: Add
Tunnel endpoint lifecycle control provides control over the schedule of endpoint
replacements.
For more information, see AWS Site-to-Site VPN tunnel endpoint lifecycle control.
Default: Off