I have one issue, i can ping my compuny local network premises from AWS EC2 instance but can't ping EC2 instance from my local network premises..I am using fortigate 60D firewall for VPN and both side tunnel is showing up. and i have also setup security group to allow all traffic.. so please help..
Use the Amazon EC2 console or command line to ensure that there are no network access control lists (NACLs) in your Amazon VPC that affect the ability of the attached VPN to establish network connectivity.
Verify that there are no firewalls blocking traffic to the Amazon EC2 instances inside the VPC.
You have to do two things in AWS as well to make it work. Add a route the outside IP of your ASA under VPN connection (xx.xx.xx.xx/32) and add an inbound rule in the appropriate security group to allow ICMP from the same source IP of your outside ASA IP.
Once you do that the ip sla will start working. This will solve your AWS VPN PING ISSUE.
Auto Scaling provides you with an option to enable Auto Scaling for one or more EC2 instances by attaching them to your existing Auto Scaling group. After the instances are attached, they become a part of the Auto Scaling group.
If you are aiming to use Auto Scaling, then certain important points must be acknowledged. This particular section helps you to gain the basic information regarding it. All these can be clearly explained in AWS Training.
Auto Scaling helps you maintain application availability. Auto Scaling launches and terminates Amazon EC2 instances automatically according to user-defined policies, schedules, and alarms. You can use Auto Scaling to maintain a fleet of Amazon EC2 instances that can adjust to any presented load. You can also use Auto Scaling to bring up multiple instances in a group at one time.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.