简体   繁体   English

如何让 AWS Client VPN 使用 VPC 对等私有托管区域来解析 DNS

[英]How do I get AWS Client VPN to resolve DNS using VPC-peered Private Hosted Zone

I have a VPC in my AWS account peered to a VPC of a partners account.我的 AWS 账户中有一个 VPC,与合作伙伴账户的 VPC 对等。 The partner account has Route 53 resolvers to resolve DNS within domain.com to IPs in their peered VPC.合作伙伴账户具有 Route 53 解析器,可将 domain.com 内的 DNS 解析为其对等 VPC 中的 IP。

I've associated my VPC with their private hosted zone.我已将我的 VPC 与他们的私有托管区域相关联。

Within my VPC (for example SSH into an EC2 instance), the DNS resolution for foo.bar.domain.com works great - I'm resolving & connecting to the resources in their VPC as expected.在我的 VPC 中(例如 SSH 到 EC2 实例中),foo.bar.domain.com 的 DNS 解析效果很好 - 我正在解析并连接到他们的 VPC 中的资源。

However, when I'm running and AWS client VPN on my personal machine, I'm unable to resolve the foo.bar.domain.com to the same private IP address through the VPN.但是,当我在我的个人计算机上运行 AWS 客户端 VPN 时,我无法通过 VPN 将 foo.bar.domain.com 解析为相同的私有 IP 地址。 So, for example, running a development server on my machine connected to the partner VPC URLs is failing.因此,例如,在连接到合作伙伴 VPC URL 的计算机上运行开发服务器失败。

I've tried hosting a DNS server in the VPC with a zone forwarding rule pointing to the Route 53 IPs.我尝试在 VPC 中托管 DNS 服务器,并使用指向 Route 53 IP 的区域转发规则。

I've tried setting the VPN DNS server IP to the Route 53 IPs.我尝试将 VPN DNS 服务器 IP 设置为 Route 53 IP。

But none of that has worked.但这些都没有奏效。 Help would be appreciated?帮助将不胜感激?

The answer was simpler than I thought: I just had to set the DNS server in the AWS Client VPN Endpoint settings to be the private IP address of my VPC's DNS (which is always the VPC's CIDR +2).答案比我想象的要简单:我只需在 AWS 客户端 VPN 终端节点设置中将 DNS 服务器设置为我的 VPC 的 DNS 的私有 IP 地址(它始终是 VPC')。

Client VPN Endpoints > Modify Client VPN Endpoint > Other optional parameters -> Enable DNS Servers -> IP Address客户端 VPN 端点 > 修改客户端 VPN 端点 > 其他可选参数 -> 启用 DNS 服务器 -> IP 地址

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 通过对等 VPC 访问 AWS 客户端 VPN 终端节点的奇怪行为 - Weird behavior on AWS Client VPN endpoint access through Peered VPC 无法解析VPC中的专用托管区域 - Unable to resolve Private Hosted Zone in VPC 如何使用Boto在AWS Route53的托管区域中添加/删除VPC? - How can i add/delete vpc in hosted zone in aws route53 using boto? 到 Route 53 私有托管区域的客户端 VPN 连接 - Client VPN Connection to Route 53 Private Hosted Zone 如何在CloudFormation模板中为私有托管区域指定默认VPC? - How to specify a default VPC for private hosted zone in a CloudFormation template? 如何使用 Boto 3 获取域的托管区域? - How do I get the Hosted Zone for a domain using Boto 3? 如何为 VPN 上的 Private Route 53 托管区域获取有效的 SSL 证书 - How to get a valid SSL Cert for Private Route 53 hosted zone on a VPN 如何在 AWS 的 VPC 中刷新 DNS 条目? - How do I flush DNS entries in my VPC in AWS? 使用来自AWS API网关的Route 53专用托管区域来解析查询 - resolve queries using using a route 53 private hosted zone from aws api gateway 如何在通过 AWS 的客户端 VPN 访问的 VPC 中运行的应用程序中获取客户端的身份 - How to get client's identity in an app running in VPC accessed via AWS's Client VPN
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM