3. VPC
Amazon Virtual Private Cloud (Amazon VPC) enables you to
launch AWS resources into a virtual network that you've
defined.
This virtual network closely resembles a traditional
network that you'd operate in your own data center, with
the benefits of using the scalable infrastructure of AWS.
Amazon VPC is the networking layer for Amazon EC2.
A virtual private cloud (VPC) is a virtual network dedicated
to your AWS account
You can configure your VPC by modifying its IP address
range, create subnets, and configure route tables, network
gateways, and security settings
4. Subnet
A subnet is a range of IP addresses in your VPC.
You can launch AWS resources into a specified subnet
Use a public subnet for resources that must be connected to the internet, and a
private subnet for resources that won't be connected to the internet
To protect the AWS resources in each subnet, you can use multiple layers of
security, including security groups and network access control lists (ACL)
5. Default VPC and subnets
Your account comes with a default VPC that has a default subnet in each Availability Zone
A default VPC has the benefits of the advanced features provided by EC2-VPC, and is ready for you to use
If you have a default VPC and don't specify a subnet when you launch an instance, the instance is launched into your
default VPC
You can launch instances into your default VPC without needing to know anything about Amazon VPC.
You can create your own VPC, and configure it as you need. This is known as a nondefault VPC
By default, a default subnet is a public subnet, receive both a public IPv4 address and a private IPv4 address
6. Default VPC Components
When we create a default VPC, AWS do the following to set it up for you:
o Create a VPC with a size /16 IPv4 CIDR block (172.31.0.0/16). This provides up to 65,536
private IPv4 addresses.
o Create a size /20 default subnet in each Availability Zone. This provides up to 4,096 addresses
per subnet
o Create an internet gateway and connect it to your default VPC
o Create a main route table for your default VPC with a rule that sends all IPv4 traffic destined
for the internet to the internet gateway
o Create a default security group and associate it with your default VPC
o Create a default network access control list (ACL) and associate it with your default VPC
o Associate the default DHCP options set for your AWS account with your default VPC.
8. Security Group vs Network ACL
•=> Operates at the instance level (first layer
of defense)
•=> Supports allow rules only
•=> Is stateful: Return traffic is automatically
allowed, regardless of any rules
•=> AWS evaluate all rules before deciding
whether to allow traffic
•=> Applies to an instance only if someone
specifies the security group when launching
the instance
•=> Operates at the subnet level (second
layer of defense)
=> Supports allow rules and deny rules
=> Is stateless: Return traffic must be
explicitly allowed by rules
=> AWS process rules in number order
when deciding whether to allow traffic
=> Automatically applies to all instances in
the subnets it's associated with
SecurityGroup
NetworkACL
9. Elastic
Network
instances
Each instance in your VPC has a default network interface (the primary
network interface) that is assigned a private IPv4 address
You cannot detach a primary network interface from an instance. You
can create and attach an additional network interface to any instance
in your VPC
You can create a network interface, attach it to an instance, detach it
from an instance, and attach it to another instance
A network interface's attributes follow it as it is attached or detached
from an instance and reattached to another instance
Attaching multiple network interfaces to an instance is useful when
you want to:
• Create a management network.
• Use network and security appliances in your VPC.
• Create dual-homed instances with workloads/roles on distinct subnets
• Create a low-budget, high-availability solution.
10. Routing Table • A route table contains a set of rules, called routes, that are used to
determine where network traffic is directed
• Your VPC has an implicit router.
• Your VPC automatically comes with a main route table that you can
modify.
• You can create additional custom route tables for your VPC
• Each subnet in your VPC must be associated with a route table; the
table controls the routing for the subnet
• A subnet can only be associated with one route table at a time, but
you can associate multiple subnets with the same route table
• If you don't explicitly associate a subnet with a particular route
table, the subnet is implicitly associated with the main route table.
• You cannot delete the main route table, but you can replace the
main route table with a custom table that you've created
• Every route table contains a local route for communication within
the VPC over IPv4.
11. Internet
Gateway
• An Internet gateway is a horizontally scaled, redundant, and highly
available VPC component that allows communication between
instances in your VPC and the Internet
• It therefore imposes no availability risks or bandwidth constraints
on your network traffic
• An Internet gateway supports IPv4 and IPv6 traffic.
• To enable access to or from the Internet for instances in a VPC
subnet, you must do the following:
• Attach an Internet gateway to your VPC.
• Ensure that your subnet's route table points to the Internet
gateway.
• Ensure that instances in your subnet have a globally unique IP
address (public IPv4 address, Elastic IP address, or IPv6
address)
• Ensure that your network access control and security group
rules allow the relevant traffic to flow to and from your
instance.
12. NAT
• You can use a NAT device to enable instances in a private subnet to
connect to the Internet or other AWS services, but prevent the
Internet from initiating connections with the instances.
• A NAT device forwards traffic from the instances in the private
subnet to the Internet or other AWS services, and then sends the
response back to the instances
• When traffic goes to the Internet, the source IPv4 address is
replaced with the NAT device’s address and similarly, when the
response traffic goes to those instances, the NAT device translates
he address back to those instances’ private IPv4 addresses.
• AWS offers two kinds of NAT devices—a NAT gateway or a NAT
instance.
• AWS recommend NAT gateways, as they provide better availability
and bandwidth over NAT instances
• The NAT Gateway service is also a managed service that does not
require your administration efforts
• A NAT instance is launched from a NAT AMI.
13. DHCP Option
sets
• The DHCP options provides a standard for passing configuration
information to hosts on a TCP/IP network such as domain name,
domain name server, NTP servers.
• DHCP options sets are associated with your AWS account so
that you can use them across all of your virtual private clouds
(VPC)
• After you create a set of DHCP options, you can't modify them
• If you want your VPC to use a different set of DHCP options, you
must create a new set and associate them with your VPC
• You can also set up your VPC to use no DHCP options at all.
• You can have multiple sets of DHCP options, but you can
associate only one set of DHCP options with a VPC at a time
• After you associate a new set of DHCP options with a VPC, any
existing instances and all new instances use these options
within few hours.
14. VPC Peering
• A VPC peering connection is a networking
connection between two VPCs that enables
you to route traffic between them privately
• Instances in either VPC can communicate with
each other as if they are within the same
network.
• You can create a VPC peering connection
between your own VPCs, with a VPC in
another AWS account, or with a VPC in a
different AWS Region
• There should not be any overlapping of IP
addresses as a pre-requisite for setting up the
VPC peering
15. VPC Endpoints
• A VPC endpoint enables you to privately connect your VPC to supported AWS
services and VPC endpoint services powered by PrivateLink without requiring an
internet gateway
• Instances in your VPC do not require public IP addresses to communicate with
resources in the service.
• Traffic between your VPC and the other service does not leave the Amazon
network
• Endpoints are horizontally scaled, redundant, and highly available VPC
components without imposing availability risks or bandwidth constraints on your
network traffic
There are two types of VPC endpoints based on the supported target services:
1. Interface endpoint interfaces : An elastic network interface with a private IP
address that serves as an entry point for traffic destined to a supported service
2. Gateway endpoint interfaces : A gateway that is a target for a specified route
in your route table, used for traffic destined to a supported AWS service.
17. Overview
CDN/CloudFront can be used in every use
case where the web services or media
files are provided to end users and the
end users are spread across geographies
Amazon CloudFront is a web service that
speeds up distribution of your static and
dynamic web content, such as .html, .css,
.js, and image files, to your users
CloudFront delivers your content through
a worldwide network of data centers
called edge locations
18. Benefits of
CDN
Better customer experience with
faster page load
Reduced load on origin (source)
servers
Reliable and highly available even
when the origin server is down
Protection from DDOS attacks
19. Configuring CloudFront
You specify origin servers, like an
Amazon S3 bucket or your own
HTTP server, from which
CloudFront gets your files.
You upload your files to your origin
servers. Your files, also known as
objects, typically include web
pages, images, and media files.
You create a CloudFront
distribution, which tells CloudFront
which origin servers to get your
files from
CloudFront assigns a domain name
to your new distribution that you
can see in the CloudFront console
CloudFront sends your
distribution's configuration (but
not your content) to all of its edge
locations—collections of servers in
geographically dispersed data
centers where CloudFront caches
copies of your objects.
20. CloudFront Content Delivery
A user accesses your website and
requests one or more objects.
DNS routes the request to the
CloudFront edge location that can
best serve the request—typically
the nearest CloudFront edge
location in terms of latency.
If the files are in the cache,
CloudFront returns them to the
user. If the files are not in the
cache, it does the following:
•CloudFront compares the request with
the specifications in your distribution
and forwards the request for the files
to the applicable origin server
•The origin servers send the files back
to the CloudFront edge location.
•As soon as the first byte arrives from
the origin, CloudFront begins to
forward the files to the user.
CloudFront also adds the files to the
cache in the edge location
22. Overview
Route 53 performs three main functions:
• Register domain names
• Route internet traffic to the resources for your domain
• Check the health of your resources
23. Hosted Zone
There are two types of hosted zones supported by Route53:
Public hosted zones contain records that specify
how you want to route traffic on the internet
Private hosted zones contain records that specify
how you want to route traffic in an Amazon VPC.
A hosted zone is a container for records, and records contain
information about how you want to route traffic for a specific domain
24. Routing Policies
When you create a record, you choose a routing policy,
which determines how Amazon Route 53 responds to
queries:
• Simple Routing Policy
• Failover routing policy
• Geolocation routing policy
• Geoproximity routing policy
• Latency routing policy
• Multivalue answer routing policy
• Weighted routing policy
26. Overview
AWS Direct Connect makes it easy to establish a
dedicated network connection from your premises
to AWS
AWS Direct Connect links your internal network to
an AWS Direct Connect location over a standard 1-
gigabit or 10-gigabit Ethernet fiber-optic cable
Using industry standard 802.1q VLANs, this
dedicated connection can be partitioned into
multiple virtual interfaces
A public virtual interface enables access to public-
facing services, such as Amazon S3. A private virtual
interface enables access to your VPC