Network
VPC (Virtual Private Network)
All new account have their default VPC. Default VPC has the interconnectivity and all EC2 instances inside it have public IP address
The max CIDR per VPC is 5, min size is /28 (16 IP addresses), max size is /16 (65536 IP addresses)
For each subnet, AWS reserves 5 IP address. e.g: for 10.0.0.0/24, 10.0.0.0, 10.0.0.1, 10.0.0.2, 10.0.0.3 and 10.0.0.255 are reserved
Internet Gateway

Allow resources to connect to internet
Needed to edit route table to define which ip should be passed through the gateway
Created separately from VPC
Security Group

Act as a firewall of application
Contain inbound and outbound rule to manage which kind of traffic can go in or go out (base on the ip ,port, protocol type)
Network Interface

It is an interface containing public ip address and private ip address, but also the corresponding subnet that attach to the device
Bastion Host

Using the host to connect to EC2 with private subnet
The host must be in public subnet
NAT Instance

Allow EC2 with private subnet to connect to internet
You need to manage EC2 instance and Security groups
NAT Gateways

Managed NAT with higher bandwidth and availability
Must create multiple NAT gateways in multiple AZs for fault tolerance
Network Access Control List (NACL)


NACL is like a firewall which control the traffic from and to the subnet
One NACL per subnet
Rules: higher number -> lower priority, the last rule is an * and deny the request if no rule is matched
VPC Peering

Privately connect 2 VPCs using AWS network
Route tables must be updated
VPC Endpoint (Private Link)

Using private link instead of public subnet and internet gateway
2 types of endpoint - interface endpoint and gateway endpoint
Interface endpoint - Support most of AWS service but not free
Gateway endpoint - Free but only support S3 and DynamoDB
Flow Log

Help to monitor the connection issue
The log data can go to S3, Cloud Watch log, Data Firehose
Site to Site VPN

Virtual Private Gateway is needed to be created
Public IP is needed
VPN CloudHub can be used if needed to provide secure communication between multiple sites
Direct Connect

Provide private connection from remote network to VPC
Need to set up Virtual Private Gateway on VPC
Access public (S3) and private resources on the same connection
If needed to setup direct connect to multiple VPC, Direct Connect Gateway is needed
Transit Gateway

Having transitive peering between VPCs, on-premise and hub-and-spoke connection
Regional resource, can work cross-region
Traffic Mirroring

Capture and inspect network traffic in VPC
Route the traffic to appliances that you manage
Egress-Only Internet Gateway

Support IPv6 only
For outbound connection of instance with private subnet
Network Firewall

Protect the entire VPC
From layer 3 to layer 7 protection
Internally, the firewall uses gateway load balancer
Database Migration Service

Create EC2 Instance to perform replication tasks
Can use schema conversion tool to convert database schema from one engine to another before migration
AWS Backup
automate backup across service
Supported Service: EC2/EBS, S3, RDS/Aurora/Dynamo DB, Document DB/ Neptune
Support cross-region backup
Need to create backup plan including backup frequency, window, transition to cold storage
Application Migration Service
Simplify the migration from on-premise to aws
Last updated
Was this helpful?