In this section, you attach a workload VPC to your transit gateway and associate it with the workload oriented transit gateway route table.
Repeat the following steps for each workload VPC that you need to associate with your transit gateway.
First, access the AWS account in which the workload VPC of interest resides and create an attachment:
Management console
associated with the AWSAdministratorAccess
role.VPC
Transit Gateway Attachments
in the left navigation panelCreate Transit Gateway Attachment
Field | Recommendation |
---|---|
Transit Gateway ID |
Select your transit gateway |
Attachment type |
VPC |
Attachment tag name |
Use the name of the VPC |
DNS support |
checked |
IP v6 support |
only check if you are using IP v6 - otherwise, leave unchecked |
VPC ID |
Choose the VPC that you want to attach |
Subnet IDs |
Select all of the subnets with which you want to associate with the transit gateway |
Create attachement
Next, access the network-prod
AWS account to accept the attachment request:
network-prod
AWS accountManagement console
associated with the AWSAdministratorAccess
role.VPC
Transit Gateway Attachments
in the left navigation panelWithin the table, you will see the list of your new pending acceptance
transit gateway attachments.
pending acceptance
Actions
and select Accept
Accept
to confirm acceptance of the attachmentinfra-workloads-vpcs
route tableavailable
, select the Associations
tab. You might have to refresh the page to see the state change.Create association
Field | Recommendation |
---|---|
Choose attachment to associate |
Choose the transit gateway attachment id for the VPC attachment of interest |
Create association
In order to allow traffic from your site-to-site VPN connection to be routed to the workload VPC, you will need to add a propagation for the VPC attachment to the network services route table.
infra-network-services
route tablePropagations
tabCreate propagation
Field | Recommendation |
---|---|
Choose attachment to propogate |
Select the transit gateway attachment id for the workload VPC attachment of interest |
Create propagation
Routes
tab.In this step, you’ll update the route table for each of the subnets in the workload VPC to add an entry to route traffic destined to your on-premises network to the transit gateway.
Route Tables
Routes
tabEdit routes
Field | Recommendation |
---|---|
Destination |
Specify the CIDR range of your on-premises network |
Target |
Select your transit gateway. For example, infra-main |
Routing internet bound traffic to on-premises: If you choose to route all internet bound traffic back through your on-premises network, you can add another route for 0.0.0.0/0
in your route tables. You can use this approach as a temporary measure to direct all internet bound traffic through your existing on-premises network security services. Once you establish those services in your AWS environment, you can update the routing configuration as appropriate.