Elastic IP – Use Elastic IP on EC2 Without 1:1 NAT

amazon ec2amazon-elastic-ipamazon-web-servicesipsecvyatta

I have a basic Amazon VPC set up with a public and private subnet. I have deployed a Vyatta router in the public subnet that does NAT for the private subnet. I have an elastic IP address assigned to the Vyatta instance which does a 1:1 NAT to the private IP of the Vyatta's eth0 interface.

The question: I am building a ipsec VPN from the Vyatta instance and that requires the Vyatta instance to be aware of the public IP address which it currently is not. Is there a way to assign the public elastic IP address directly to the eth0 interface?

If not, does anyone know a work around to using Vyatta in a VPC configured with an ipsec VPN?

Thanks!

Best Answer

Is there a way to assign the public elastic IP address directly to the eth0 interface?

No, there is not. Internet traffic to/from EC2 instances always traverse the Elastic IP 1:1 NAT infrastructure.

If not, does anyone know a work around to using Vyatta in a VPC configured with an ipsec VPN?

I have all manner of IPsec operating in VPC (including IPSec tunnels that cross NAT boundaries) without issue. Why do you think you need to have the public address directly assigned to the host? That is not a requirement from IPsec's perspective.