Networking Basics

Network → 2 or more computers connected to communicate. Can be logically partitioned into subnets.

A networking device is needed → Router or Switch.

IPs → Unique directions in the internet:

OSI Model

OSI Model

Classless Inter-Domain Routing (CIDR) → X.X.X.X/Y (Y bits of network, 32-Y bits of host)

Amazon Virtual Private Cloud (VPC)

Allows to provision logically isolated sections of AWS Cloud, you can control:

VPCs → Virtual network, logically isolated section of the AWS cloud (isolated from other VPCs) (5 VPCs, per account, per region).

Reserved IP addresses (per subnet)

Reserved IP addresses (per subnet)

Components

SubnetsIsolated segment of the VPC’s IP addressing.

Route Table:

Internet Gateway (IGW)Amazon VPC side of a connection to the public internet. Allow resources in VPC to communicate with the internet.

Nat Gateway (NGW) → Allow private subnets to access the internet or other AWS services.

Virtual Private Gateway (VPGW)Amazon VPC side of a VPN connection.

Peering Connection → Route traffic via private IPs between 2 peered VPCs.

VPC EndpointsPrivate connectivity to services hosted in AWS from within the VPC, without using a IGW, VPN, NAT, or proxies.

Egress-Only Internet Gateway → Stateful GW for IPv6 traffic from the VPC to the internet.

Elastic Network Interface → Virtual network interface that can be attached to an instance.

Best design practices:

Use cases examples:

Ideas for use cases → Data location, latency, price per service, and service availability.

Connectivity

How to connect VPC to the internet:

  1. Create the Internet Gateway and attach it to VPC.
  2. Update the Route Table for the subnet to be connected → Set 0.0.0.0/0 to the Internet Gateway.

https://lh3.googleusercontent.com/eX2MQI6hsJ8siyvHHJkZ5GNcUxeXlEB-TAIv5RnFoJLsHq7AakFKQzD8iIvlKsk4kPIhKrFolXpoMJBaKIcr4syPa_ZCW35zq7NSXZaypf6J4BlzYV_gTTfIw5PzrxmpBpUpLg0U

Bastion Hosts → Server that provides access from an external network to a private network.

Monitoring

The traffic of a VPC can be monitored using Traffic Mirroring and VPC Flow Logs.

Security

Security Groups

Virtual firewall to control inbound and outbound traffic to and from the instance. Acts at instance level. Stateful, request information is stored after processed.

Responses to allowed inbound communications are allowed out, regardless of outbound rules. Equivalent of firewalls to EC2 instances, closed to incoming traffic by default.

Default configuration (block all inbound, allow all outbound):

https://lh4.googleusercontent.com/R9q33IUpkP9DZIP1sssxiXuTKF6y61q2sDK-_TIonNH6Wc1Ln_k9MAveFqOiHm4bvLWtJRc8n8uupWFpURASUr36lRBaDdq82zxQTbcaZgCWSROw4L9Gjk_paLpBAYqv3cR3_BJL

Network Access Control Lists (NACLs)

Controls traffic in and out the subnet. Works at the subnet level. Stateless, no information about requests is maintained.

One subnet can only have one Network ACL. Lower number is given a bigger priority.

Default configuration (allow all inbound/outbound):

https://lh4.googleusercontent.com/NZVF2m8sQWy_uAABK7QIKhizpRWoMrmvCB5RuwXcmoxPJabDLn1-_JCmCUbRrF_lVKQ07yTZqoFB9ABN9NZIHOGcA2ugvWD5IdcwCl17D83j8oRs-dy8NWRxImex1gMci--wDHIb

https://lh5.googleusercontent.com/ipLsTFI7_r-hOHDNkFBQ7U3HWy7uNvWLgfdNL4HmWgRemJO31eLBAO-tLW4lREpyzB6f2PzfugQbPUjg8ZBBgjf_78mpgqsghVXys5GATV90EkQtMQepWxTYxkAFKKEyacVIKCHe

AWS Network Firewall

Managed service to deploy essential protections to VPCs. Scales automatically with traffic.

Features:

AWS Site-to-Site VPN

Highly available solution to connect on-premises network with VPC in a secure way. Uses IPSec to create VPN encrypted tunnels, charged by connection-hour. 2 tunnels per AZ maximum. The connection has 2 sides:

Can use AWS VPN CloudHub to establish multiple VPN connections from multiple CGW to one VPGW → More redundancy and failover.

Routing Types → Depends on model of VPN devices.

VPC Peering

One to one networking connections between 2 VPCs, private connections. You can connect with VPC in other region/account via the AWS backbone and with no bottlenecks. Traffic remains in the private IP address space, but the CIDR blocks cannot overlap and transitive peering is not supported (DirectConnect or Site-to-Site VPN count as peering, so is not transitive).

Steps to enable: