VPC

VPC
VPC
What is a Route Table?
Route tables determine where network traffic is directed.
Common routes:

What is a Route Table?
Route tables determine where network traffic is directed.
Common routes:
VPC Peering

VPC Peering
VPC Diagram - Step 1

VPC Diagram - Step 1
VPC Diagram - Step 2

VPC Diagram - Step 2
VPC Diagram - Step 3 - NAT Instance

VPC Diagram - Step 3 - NAT Instance
VPC Diagram - Step 3 - NAT Gateway

VPC Diagram - Step 3 - NAT Gateway
VPC - NAT instances
VPC - NAT instances
VPC - NAT Gateways

VPC - NAT Gateways
VPC - NAT Gateways
If you have resources in multiple Availability Zones and they share one NAT gateway, in the event that the NAT gateway’s Availability Zone is down, resources in the other Availability Zones lose internet access. To create an Availability Zone-independent architecture, create a NAT gateway in each Availability Zone and configure your routing to ensure that resources use the NAT gateway in the same Availability Zone.
VPC - Network ACL’s
VPC - Network ACL’s
VPC - Security Groups vs Network ACL

VPC - Security Groups vs Network ACL
Security Group Network ACL Operates at the instance level (first layer of defense) Operates at the subnet level (second layer of defense) Supports allow rules only Supports allow rules and deny rules Is stateful: Return traffic is automatically allowed, regardless of any rules Is stateless: Return traffic must be explicitly allowed by rules We evaluate all rules before deciding whether to allow traffic We process rules in number order when deciding whether to allow traffic Applies to an instance only if someone specifies the security group when launching the instance, or associates the security group with the instance later on Automatically applies to all instances in the subnets it’s associated with (backup layer of defense, so you don’t have to rely on someone specifying the security group)
Elastic IP
Elastic IP
VPC Flow Logs
VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC. Flow log data is stored using Amazon CloudWatch Logs. After you’ve created a flow log, you can retrieve and view its data in Amazon CloudWatch Logs.
VPC Flow Logs
VPC Flow Logs
Not all IP Traffic monitored;
VPC - NAT vs Bastions

VPC - NAT vs Bastions
Direct Connect vs VPN

Direct Connect vs VPN
A VPC VPN Connection establish encrypted network connectivity between your intranet and Amazon VPC over the Internet. VPN Connections can be configured in minutes and are a good solution if you have an immediate need, have low to modest bandwidth requirements, and can tolerate the inherent variability in Internet-based connectivity. AWS Direct Connect does not involve the Internet; instead, it uses dedicated, private network connections between your intranet and Amazon VPC.
Setting up Direct Connect [SAA-C02]
Global Accelerator [SAA-C02]
VPC Endpoints
A VPC endpoint enables you to privately connect your VPC to supported AWS services and VPC endpoint services powered by AWS PrivateLink without requiring an internet gateway, NAT device, VPN connection, or AWS Direct Connect connection. Instances in your VPC do not require public IP addresses to communicate with resources in the service. Traffic between your VPC and the other service does not leave the Amazon network.
Endpoints are virtual devices. They are horizontally scaled, redundant, and highly available VPC components. They allow communication between instances in your VPC and services without imposing availability risks or bandwidth constraints on your network traffic.
VPC Endpoints Types
There are two types of VPC endpoints:
Currently Gateway Endpoints support:
Amazon Redshift also now supports Enhanced VPC Routing
AWS PrivateLink and Network Load Balancers
