In this section, you attach a workload VPC to your transit gateway and associate it with the workload oriented transit gateway route table.
Repeat the following steps for each workload VPC that you need to associate with your transit gateway.
First, access the AWS account in which the workload VPC of interest resides and create an attachment:
Management console associated with the AWSAdministratorAccess role.VPCTransit Gateway Attachments in the left navigation panelCreate Transit Gateway Attachment| Field | Recommendation |
|---|---|
Transit Gateway ID |
Select your transit gateway |
Attachment type |
VPC |
Attachment tag name |
Use the name of the VPC |
DNS support |
checked |
IP v6 support |
only check if you are using IP v6 - otherwise, leave unchecked |
VPC ID |
Choose the VPC that you want to attach |
Subnet IDs |
Select all of the subnets with which you want to associate with the transit gateway |
Create attachementNext, access the network-prod AWS account to accept the attachment request:
network-prod AWS accountManagement console associated with the AWSAdministratorAccess role.VPCTransit Gateway Attachments in the left navigation panelWithin the table, you will see the list of your new pending acceptance transit gateway attachments.
pending acceptanceActions and select AcceptAccept to confirm acceptance of the attachmentinfra-workloads-vpcs route tableavailable, select the Associations tab. You might have to refresh the page to see the state change.Create association| Field | Recommendation |
|---|---|
Choose attachment to associate |
Choose the transit gateway attachment id for the VPC attachment of interest |
Create associationIn order to allow traffic from your site-to-site VPN connection to be routed to the workload VPC, you will need to add a propagation for the VPC attachment to the network services route table.
infra-network-services route tablePropagations tabCreate propagation| Field | Recommendation |
|---|---|
Choose attachment to propogate |
Select the transit gateway attachment id for the workload VPC attachment of interest |
Create propagationRoutes tab.In this step, you’ll update the route table for each of the subnets in the workload VPC to add an entry to route traffic destined to your on-premises network to the transit gateway.
Route TablesRoutes tabEdit routes| Field | Recommendation |
|---|---|
Destination |
Specify the CIDR range of your on-premises network |
Target |
Select your transit gateway. For example, infra-main |
Routing internet bound traffic to on-premises: If you choose to route all internet bound traffic back through your on-premises network, you can add another route for 0.0.0.0/0 in your route tables. You can use this approach as a temporary measure to direct all internet bound traffic through your existing on-premises network security services. Once you establish those services in your AWS environment, you can update the routing configuration as appropriate.