π AWS VPC VPN Connection does not have both Tunnels up π’
- Contextual name: π VPN Connection does not have both Tunnels up π’
- ID:
/ce/ca/aws/vpc/vpn-connection-tunnels-not-up
- Located in: π AWS VPC
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
RELIABILITY
Similar Policiesβ
- AWS Security Hub
- [[EC2.20] Both VPN tunnels for an AWS Site-to-Site VPN connection should be up]([EC2.20] Both VPN tunnels for an AWS Site-to-Site VPN connection should be up (https://docs.aws.amazon.com/securityhub/latest/userguide/ec2-controls.html#ec2-20)]
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
Ensure that both tunnels of an AWS Site-to-Site VPN Connection are active and in the UP state.
Rationaleβ
AWS Site-to-Site VPN provides two redundant tunnels to connect your on-premises network with your VPC, ensuring high availability and resilience. If one tunnel becomes unavailable due to maintenance or failure, traffic is automatically redirected to the second tunnel.
However, if only one tunnel is active and it fails (e.g., due to internet connectivity issues, customer gateway device failure, or AWS maintenance), all network connectivity between your on-premises environment and the VPC will be lost. Such outages can cause significant disruptions to applications that depend on this connection.
Auditβ
This policy flags an AWS VPC VPN Connection as
INCOMPLIANT
if fewer than 2 related AWS VPC VPN Gateway Telemetries have aStatus
of UP.A VPN Connection is marked as
INAPPLICABLE
if itsState
is not available.
Remediationβ
Remediationβ
From Command Lineβ
To remediate a VPN connection with a down tunnel, you typically need to investigate and correct the configuration on your on-premises customer gateway device.
Enabling AWS Site-to-Site VPN tunnel logs can be very helpful for troubleshooting and resolving VPN connectivity issues. Logs are published to Amazon CloudWatch Logs, where you can analyze tunnel negotiations, dropped packets, and configuration mismatches.
- Create a CloudWatch Log Group (if one does not already exist)
aws logs create-log-group \
--log-group-name {{log-group-name}}
- Enable VPN Tunnel Logging
aws ec2 modify-vpn-tunnel-options \
--vpn-connection-id <vpn-connection-id> \
--vpn-tunnel-outside-ip-address <tunnel-outside-ip> \
--tunnel-options '{
"LogOptions": {
"CloudWatchLogOptions": {
"LogEnabled": true,
"LogGroupArn": "arn:aws:logs:{{region}}:{{account-id}}:log-group:{{log-group-name}}",
"LogOutputFormat": "json"
}
}
}'Best Practices for Tunnel Stabilityβ
... see more