Network → 2 or more computers connected to communicate. Can be logically partitioned into subnets.
A networking device is needed → Router or Switch.
IPs → Unique directions in the internet:
OSI Model
Classless Inter-Domain Routing (CIDR) → X.X.X.X/Y (Y bits of network, 32-Y bits of host)
Allows to provision logically isolated sections of AWS Cloud, you can control:
VPCs → Virtual network, logically isolated section of the AWS cloud (isolated from other VPCs) (5 VPCs, per account, per region).
Reserved IP addresses (per subnet)
Reserved IP addresses (per subnet)
Subnets → Isolated segment of the VPC’s IP addressing.
Route Table:
Internet Gateway (IGW) → Amazon VPC side of a connection to the public internet. Allow resources in VPC to communicate with the internet.
Nat Gateway (NGW) → Allow private subnets to access the internet or other AWS services.
Virtual Private Gateway (VPGW) → Amazon VPC side of a VPN connection.
Peering Connection → Route traffic via private IPs between 2 peered VPCs.
VPC Endpoints → Private connectivity to services hosted in AWS from within the VPC, without using a IGW, VPN, NAT, or proxies.
Egress-Only Internet Gateway → Stateful GW for IPv6 traffic from the VPC to the internet.
Elastic Network Interface → Virtual network interface that can be attached to an instance.
Best design practices:
Use cases examples:
Ideas for use cases → Data location, latency, price per service, and service availability.
How to connect VPC to the internet:
https://lh3.googleusercontent.com/eX2MQI6hsJ8siyvHHJkZ5GNcUxeXlEB-TAIv5RnFoJLsHq7AakFKQzD8iIvlKsk4kPIhKrFolXpoMJBaKIcr4syPa_ZCW35zq7NSXZaypf6J4BlzYV_gTTfIw5PzrxmpBpUpLg0U
Bastion Hosts → Server that provides access from an external network to a private network.
The traffic of a VPC can be monitored using Traffic Mirroring and VPC Flow Logs.
Virtual firewall to control inbound and outbound traffic to and from the instance. Acts at instance level. Stateful, request information is stored after processed.
Responses to allowed inbound communications are allowed out, regardless of outbound rules. Equivalent of firewalls to EC2 instances, closed to incoming traffic by default.
Default configuration (block all inbound, allow all outbound):
https://lh4.googleusercontent.com/R9q33IUpkP9DZIP1sssxiXuTKF6y61q2sDK-_TIonNH6Wc1Ln_k9MAveFqOiHm4bvLWtJRc8n8uupWFpURASUr36lRBaDdq82zxQTbcaZgCWSROw4L9Gjk_paLpBAYqv3cR3_BJL
Controls traffic in and out the subnet. Works at the subnet level. Stateless, no information about requests is maintained.
One subnet can only have one Network ACL. Lower number is given a bigger priority.
Default configuration (allow all inbound/outbound):
https://lh4.googleusercontent.com/NZVF2m8sQWy_uAABK7QIKhizpRWoMrmvCB5RuwXcmoxPJabDLn1-_JCmCUbRrF_lVKQ07yTZqoFB9ABN9NZIHOGcA2ugvWD5IdcwCl17D83j8oRs-dy8NWRxImex1gMci--wDHIb
https://lh5.googleusercontent.com/ipLsTFI7_r-hOHDNkFBQ7U3HWy7uNvWLgfdNL4HmWgRemJO31eLBAO-tLW4lREpyzB6f2PzfugQbPUjg8ZBBgjf_78mpgqsghVXys5GATV90EkQtMQepWxTYxkAFKKEyacVIKCHe
Managed service to deploy essential protections to VPCs. Scales automatically with traffic.
Features:
Highly available solution to connect on-premises network with VPC in a secure way. Uses IPSec to create VPN encrypted tunnels, charged by connection-hour. 2 tunnels per AZ maximum. The connection has 2 sides:
Can use AWS VPN CloudHub to establish multiple VPN connections from multiple CGW to one VPGW → More redundancy and failover.
Routing Types → Depends on model of VPN devices.
One to one networking connections between 2 VPCs, private connections. You can connect with VPC in other region/account via the AWS backbone and with no bottlenecks. Traffic remains in the private IP address space, but the CIDR blocks cannot overlap and transitive peering is not supported (DirectConnect or Site-to-Site VPN count as peering, so is not transitive).
Steps to enable: