Network

VPC (Virtual Private Network)

  • All new account have their default VPC. Default VPC has the interconnectivity and all EC2 instances inside it have public IP address

  • The max CIDR per VPC is 5, min size is /28 (16 IP addresses), max size is /16 (65536 IP addresses)

  • For each subnet, AWS reserves 5 IP address. e.g: for 10.0.0.0/24, 10.0.0.0, 10.0.0.1, 10.0.0.2, 10.0.0.3 and 10.0.0.255 are reserved

Internet Gateway

  • Allow resources to connect to internet

  • Needed to edit route table to define which ip should be passed through the gateway

  • Created separately from VPC

Security Group

  • Act as a firewall of application

  • Contain inbound and outbound rule to manage which kind of traffic can go in or go out (base on the ip ,port, protocol type)

Network Interface

  • It is an interface containing public ip address and private ip address, but also the corresponding subnet that attach to the device

Bastion Host

  • Using the host to connect to EC2 with private subnet

  • The host must be in public subnet

NAT Instance

  • Allow EC2 with private subnet to connect to internet

  • You need to manage EC2 instance and Security groups

NAT Gateways

  • Managed NAT with higher bandwidth and availability

  • Must create multiple NAT gateways in multiple AZs for fault tolerance

Network Access Control List (NACL)

  • NACL is like a firewall which control the traffic from and to the subnet

  • One NACL per subnet

  • Rules: higher number -> lower priority, the last rule is an * and deny the request if no rule is matched

VPC Peering

  • Privately connect 2 VPCs using AWS network

  • Route tables must be updated

  • Using private link instead of public subnet and internet gateway

  • 2 types of endpoint - interface endpoint and gateway endpoint

  • Interface endpoint - Support most of AWS service but not free

  • Gateway endpoint - Free but only support S3 and DynamoDB

Flow Log

  • Help to monitor the connection issue

  • The log data can go to S3, Cloud Watch log, Data Firehose

Site to Site VPN

  • Virtual Private Gateway is needed to be created

  • Public IP is needed

  • VPN CloudHub can be used if needed to provide secure communication between multiple sites

Direct Connect

  • Provide private connection from remote network to VPC

  • Need to set up Virtual Private Gateway on VPC

  • Access public (S3) and private resources on the same connection

  • If needed to setup direct connect to multiple VPC, Direct Connect Gateway is needed

Transit Gateway

  • Having transitive peering between VPCs, on-premise and hub-and-spoke connection

  • Regional resource, can work cross-region

Traffic Mirroring

  • Capture and inspect network traffic in VPC

  • Route the traffic to appliances that you manage

Egress-Only Internet Gateway

  • Support IPv6 only

  • For outbound connection of instance with private subnet

Network Firewall

  • Protect the entire VPC

  • From layer 3 to layer 7 protection

  • Internally, the firewall uses gateway load balancer

Database Migration Service

  • Create EC2 Instance to perform replication tasks

  • Can use schema conversion tool to convert database schema from one engine to another before migration

AWS Backup

  • automate backup across service

  • Supported Service: EC2/EBS, S3, RDS/Aurora/Dynamo DB, Document DB/ Neptune

  • Support cross-region backup

  • Need to create backup plan including backup frequency, window, transition to cold storage

Application Migration Service

  • Simplify the migration from on-premise to aws

Last updated

Was this helpful?