0% found this document useful (0 votes)
83 views65 pages

NET201 AWS Networking Fundamentals

The document provides an overview of AWS networking fundamentals, focusing on key components such as Amazon VPC, subnets, gateways, and security measures. It covers the setup of VPCs, internet access, and the use of IP addressing, along with various connectivity options including VPC peering and AWS Direct Connect. Additionally, it discusses network security practices and the implementation of AWS PrivateLink for service integration.

Uploaded by

ITI NARELA DELHI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views65 pages

NET201 AWS Networking Fundamentals

The document provides an overview of AWS networking fundamentals, focusing on key components such as Amazon VPC, subnets, gateways, and security measures. It covers the setup of VPCs, internet access, and the use of IP addressing, along with various connectivity options including VPC peering and AWS Direct Connect. Additionally, it discusses network security practices and the implementation of AWS PrivateLink for service integration.

Uploaded by

ITI NARELA DELHI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

AMERICAS

NET201

AWS networking fundamentals

Aarthi Raju
Principal Solutions Architect
AWS

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B
VPC

Instance Instance

Instance Instance
Amazon Virtual Private Cloud (Amazon VPC)
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Subnets
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Public subnet Public subnet

Private subnet Private subnet


Amazon Elastic Compute Cloud (Amazon EC2)
instances Availability Zone
US-EAST-1A
Availability Zone
US-EAST-1B

VPC
Public subnet Public subnet

Instance Instance

Private subnet Private subnet

Instance Instance
Gateways, endpoints, and peering
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Public subnet Public subnet

Instance Instance

Private subnet Private subnet

Instance Instance
Example web application
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Public subnet Public subnet

ELB
Web server
security
Web server group Web server

Private subnet Private subnet


Application
server
Application server security Application server
group
IP addressing
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Public subnet Public subnet

Private subnet Private subnet


Where to use IPv4 addresses?
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Subnet Subnet

172.31. 172.31.

Subnet Subnet

172.31. 172.31.
Where to use IPv6 addresses?
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Subnet Subnet

172.31. 172.31.
2600:1f16:14d:6300::/64 2600:1f16:14d:6301::/64

Subnet Subnet

172.31. 172.31.
2600:1f16:14d:6328::/64 2600:1f16:14d:6329::/64

2600:1f16:14d:6300::/56
The 5 things required for internet traffic
1. Public IP address
2. Internet gateway attached to a VPC
3. Route to an internet gateway
4. Network access control list (ACL) allow rule
5. Security group allow rule
Public IP addresses for your instances
• Auto-assign public IP addresses
• Elastic IP addresses
• Amazon Elastic IP address pool
• Bring Your Own IP (BYOIP) pool
Public IP addresses
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC
Subnet Subnet

Subnet Subnet
Gateways, endpoints, and peering

Customer VPN NAT Internet AWS Transit Endpoints Peering


gateway gateway gateway gateway Gateway connection
Internet access
Public and private subnets
Private subnet Public subnet
Network address translation (NAT) gateway
Private subnet Public subnet
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network security
• Network ACLs
• Security groups
• VPC Flow Logs
• Amazon VPC Traffic Mirroring
Network ACLs
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B
VPC
Public subnet Public subnet

Web server Web server

Private subnet Private subnet

Application Application
server server
Security groups – Inbound
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B
VPC
Public subnet Public subnet

Web server
security group
sg-0f004ca5495132527
Web server Web server

Private subnet Private subnet


Application
server security
group
Application sg-090a960aee374b3cd Application
server server
VPC Flow Logs
• Amazon CloudWatch Logs or Amazon S3
• Does not impact throughput or latency
• Apply to VPC, subnet, or elastic
network interface
• Accepted, rejected, or all traffic
Amazon VPC Traffic Mirroring
• Mirror to another elastic network interface or Network Load Balancer
with UDP listener
• Packet copy – shares interface bandwidth
• Traffic mirror filters to define interesting traffic
• Traffic mirror session is the combination of source, target, and filter

Filter 1
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Connecting between VPCs
AWS Cloud

VPC VPC

VPC
VPC peering
AWS Cloud

VPC VPC

Peering

VPC
VPC peering
AWS Cloud

VPC

Peering

VPC
VPC peering
AWS Cloud

Peering
VPC VPC

Peering Peering

VPC
VPC peering
AWS Cloud

Peering
VPC VPC

Peering Peering

VPC
VPC peering
AWS Cloud

Peering
VPC VPC

Peering Peering

VPC
VPC peering – Things to know
• Can reference security groups from the peer VPC in the same region

• Can enable DNS hostname resolution to return private IP addresses

• Can peer for both IPv4 and IPv6 addresses

• Cannot have overlapping IP addresses

• Cannot have multiple peers between the same pair of VPCs

• Cannot use jumbo frames across inter-region VPC peering


© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Site-to-Site VPN setup – VGW

VPC 10.0.0.0/16
Corporate data center
172.16.0.0/16

Virtual private
gateway
AWS Site-to-Site VPN – CGW

VPC 10.0.0.0/16
Corporate data center
172.16.0.0/16

Virtual private Customer


gateway gateway

IP address not needed when


certificate is used
AWS Site-to-Site VPN

I don’t…
VPC 10.0.0.0/16 I know how to get to
172.16.0.0/16 Corporate data center
172.16.0.0/16

Instance Virtual private Customer


gateway gateway

1x VPN connection = 2x VPN tunnels


AWS Site-to-Site VPN

VPC 10.0.0.0/16
Corporate data center
172.16.0.0/16

Instance Virtual private Customer


gateway gateway
172.16.0.0/16
via VGW

1x VPN connection = 2x VPN tunnels


AWS Site-to-Site VPN

VPC 10.0.0.0/16
Corporate data center
1 tunnel always preferred 172.16.0.0/16

Instance Virtual private Customer


gateway gateway
172.16.0.0/16
via VGW

1x VPN connection = 2x VPN tunnels


1x VPN tunnel = 1.25 Gbps
AWS Direct Connect – Physical connection
AWS global network

Corporate data center


172.16.0.0/16

AWS Customer Customer


router router router

Direct Connect
location
AWS Direct Connect – Interface types
• Private VIF – used to connect to Amazon VPCs using private IP
addresses; directly or via Direct Connect gateway
• Transit VIF – used to connect to AWS transit gateways via Direct
Connect gateway
• Public VIF – used to access all AWS public services using public
IP addresses

All virtual interfaces are 802.1Q VLANs with BGP peering


AWS Direct Connect gateway – Private VIF
AWS global network

Region

VPC Corporate data center


10.0.0.0/16 Private virtual 172.16.0.0/16
interface

VPC
10.1.0.0/16 AWS Customer Customer
router router router
Region
Direct Connect
VPC
10.2.0.0/16
location

Direct
Connect
gateway
AWS Direct Connect – Public VIF
AWS global network

Corporate data center


Amazon Simple Amazon Public virtual
DynamoDB
172.16.0.0/16
Storage Service interface
(Amazon S3) Amazon
CloudWatch
AWS Customer Customer
router router router

Direct Connect
VPC
10.2.0.0/16
location
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Interconnecting VPCs at scale – VPC peering
AWS Cloud

Peering
VPC VPC

Peering Peering

VPC
Interconnecting VPCs at scale – VPC peering
AWS Cloud

VPC Peering VPC Peering VPC

Peering Peering Peering Peering

VPC VPC VPC

Peering Peering
Multiple VPCs access models – AWS Transit Gateway
AWS Cloud

VPC VPC VPC

AWS Transit Gateway

VPC VPC VPC


AWS Transit Gateway with AWS Site-to-Site VPN
VPC

VPC
Corporate data center
VPN attachment 172.16.0.0/16

VPC

AWS Transit Gateway

VPC TGW route table


172.16.0.0/16 via VPN
VPC route table
172.16.0.0/16 via TGW
AWS Transit Gateway with Direct Connect gateway
AWS global network

Region

VPC Corporate data center


10.0.0.0/16 Transit virtual 172.16.0.0/16
interface
VPC AWS
10.1.0.0/16 Transit AWS Customer Customer
Gateway router router router
Region
Direct Connect
VPC
10.2.0.0/16
location

AWS
Transit Direct
Gateway Connect
gateway
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Gateway VPC endpoints
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

VPC

Public subnet Public subnet

Amazon S3

Instance Instance
Route table
Private subnet (main) Private subnet

Instance Instance DynamoDB


Gateway VPC endpoints
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

VPC

Private subnet Private subnet

Amazon S3

Instance
Route table
Private subnet (main) Private subnet
Gateway
VPC
endpoint DynamoDB
Instance
Gateway VPC endpoints
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

VPC

Private subnet Private subnet

Amazon S3

Instance
Route table
Private subnet (main) Private subnet

Instance DynamoDB
Gateway VPC endpoints
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

VPC

Private subnet Private subnet

Amazon S3

Instance
Route table
Private subnet (main) Private subnet

Instance DynamoDB
Gateway VPC endpoints
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

VPC

Private subnet Private subnet

Amazon S3

Instance
Route table
Private subnet (main) Private subnet

Instance DynamoDB
Interface VPC endpoints (AWS PrivateLink)
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

AWS Transfer
VPC
for SFTP Amazon API
Private subnet Private subnet Gateway

Amazon
CloudWatch
Instance Instance
AWS
CodeCommit
Amazon Kinesis
Private subnet Private subnet Data Streams

AWS Systems
Manager
Amazon Simple
Queue Service
(Amazon SQS)
Interface VPC endpoints (AWS PrivateLink)
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

AWS Transfer
VPC
for SFTP Amazon API
Private subnet Private subnet Gateway

Amazon
CloudWatch
Instance Instance
AWS
CodeCommit
Amazon Kinesis
Private subnet Private subnet Data Streams

AWS Systems
Manager
Amazon SQS
Interface VPC endpoints (AWS PrivateLink)
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

AWS Transfer
VPC
for SFTP Amazon API
Private subnet Private subnet Gateway

sqs.us-east-1.amazonaws.com? Amazon
CloudWatch
172.31.1.5 / 172.31.2.7
Instance Instance
AWS
CodeCommit
Amazon Kinesis
Private subnet Private subnet Data Streams

AWS Systems
Manager
Amazon SQS
AWS PrivateLink – Your own services
US-EAST-1

Availability Zone Availability Zone


US-EAST-1A US-EAST-1B

VPC (172.31.0.0/16) VPC (10.50.0.0/16)

Private subnet Private subnet

Instance Instance

Private subnet Private subnet


Network
Load
Balancer
AWS PrivateLink – Your own services, on premises

Availability Zone
US-EAST-1B Corporate data center
172.16.0.0/16
VPC (10.50.0.0/16)

Private subnet

Instance

Private subnet DX
Network or VPN
Load
Balancer
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Your VPC Availability Zone
US-EAST-1A
IGW
Availability Zone
US-EAST-1B

VPC VPC
NAT-GW NAT-GW
VPCE Amazon S3
Public subnet Public subnet
ELB

Private subnet Private subnet


Amazon SQS

VPC
peering Web server Web server

Private subnet Private subnet Corporate


data center

VPN
CGW

ENIs

P S D
X VIF
G
VGW AWS Transit Gateway W
VPN
AWS Amazon
WorkSpaces CGW
Lambda
Security IGW VPC Flow Logs
Availability Zone Availability Zone
US-EAST-1A US-EAST-1B

VPC VPC
NAT-GW NAT-GW
VPCE Amazon S3
Public subnet Public subnet
ELB

Private subnet Private subnet


Amazon SQS

Web server
VPC security group
peering Web server Web server
PrivateLink VPC
Private subnet Private subnet

Application server
security group
Application Application
server server

Traffic P EIGW S
mirroring

AWS Transit
Gateway
What’s new since re:Invent 2019?
• Amazon VPC Ingress Routing – AWS CloudFormation support
• AWS Transit Gateway
• Inter-region peering
• Multicast support
• Additional regions

• Amazon VPC Flow Logs now supports 1-minute aggregation intervals


Learn networking with AWS Training and Certification
Resources created by the experts at AWS to help you build and validate cloud networking skills

Free digital courses cover topics related to networking and


content delivery, including Introduction to Amazon CloudFront
and AWS Transit Gateway Networking and Scaling

Validate expertise with the AWS Certified Advanced


Networking – Specialty exam

Visit the advanced networking learning path at aws.amazon.com/training/path-advanced-networking


Thank you!

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.

You might also like