Networking in AWS
Carl Simpson – Technical Architect, Zen Internet Limited carl.simpson@zeninternet.co.uk
Networking in AWS Carl Simpson Technical Architect, Zen Internet - - PowerPoint PPT Presentation
Networking in AWS Carl Simpson Technical Architect, Zen Internet Limited carl.simpson@zeninternet.co.uk About Me: About Me: Technical Architect Cloud & Hosting @ Zen Internet Limited About Me: Technical Architect Cloud
Networking in AWS
Carl Simpson – Technical Architect, Zen Internet Limited carl.simpson@zeninternet.co.uk
About Me:
About Me:
About Me:
About Me:
About Me:
What we’re going to cover:
What we’re going to cover:
What we’re going to cover:
What we’re going to cover:
What we’re going to cover:
What is a VPC?
What is a VPC?
What is a VPC?
VPC – A Container for:
VPC – A Container for:
IP Subnet IP Subnet
VPC – A Container for:
IP Subnet Route Table Route Table IP Subnet
VPC – A Container for:
IP Subnet Route Table
Security Group Security Group
Route Table IP Subnet
VPC – A Container for:
IP Subnet Route Table
EC2 instanceSecurity Group Security Group
Route Table
EC2 instanceIP Subnet
VPC – A Container for:
IP Subnet Route Table
EC2 instance Amazon RDSSecurity Group Security Group
Route Table
EC2 instanceIP Subnet
VPC – A Container for:
IP Subnet Route Table
EC2 instance Amazon RDS RedisSecurity Group Security Group
Route Table
EC2 instanceIP Subnet
Setting up your VPC
Pick a region
AWS RegionAWS Region
Choose VPC address space
AWS Region VPC 10.0.0.0/16VPC IPv4 CIDR block: 10.0.0.0/16
Pick some Availability Zones
*Use three AZ where available
AWS Region AZ B AZ A VPC 10.0.0.0/16AZ - A AZ - B
Create some subnets
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16Public Subnet A Public Subnet B
Create some subnets
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16Public Subnet A Private Subnet 1A Private Subnet 2A Public Subnet B Private Subnet 1B Private Subnet 2B
Suitable for ‘most’ cases
/22 /22 /22 /20 /20 /20
What makes a subnet public?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16Public Subnet A Public Subnet B
What makes a subnet public?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16Public Route Table Public Subnet A Public Subnet B
What makes a subnet private?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16Private Subnet 1A Private Subnet 2A Private Subnet 1B Private Subnet 2B
What makes a subnet private?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VPC NAT gatewayPrivate Route Table 1 Private Route Table 2 NAT Gateway Private Subnet 1A Private Subnet 2A Private Subnet 1B Private Subnet 2B
What might a private subnet have?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VPC NAT gatewayPrivate Subnet 1A Private Subnet 2A Private Subnet 1B Private Subnet 2B
What might a private subnet have?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VPC NAT gateway VGWVirtual Private Gateway
Private Subnet 1A Private Subnet 2A Private Subnet 1B Private Subnet 2BAdding some servers/services
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web ServerAdding some servers/services
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web ServerLoad Balancer (ELB)
Adding some servers/services
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web ServerLoad Balancer (ELB) Web Server
Adding some servers/services
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web ServerLoad Balancer (ELB) Web Server Database Server
What’s outside the VPC?
AWS Region AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web ServerWhat’s outside the VPC?
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB VPC 10.0.0.0/16AWS Public Services
What’s outside the VPC?
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB VPC 10.0.0.0/16AWS Public Services
But I want my stuff to be totally private!
AWS Region AWS Public Services AZ B AZ A Private Subnet 1A Private Subnet 2A Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDBBut I want my stuff to be totally private!
AWS Region AWS Public Services AZ B AZ A Private Subnet 1A Private Subnet 2A Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDBInternet
Use VPC Endpoints
AWS Region Amazon S3 Lambda function AWS Public Services VPG VPC NAT gateway Amazon DynamoDBUse VPC Endpoints
AWS Region Amazon S3 Lambda function AWS Public Services VGW VPC NAT gateway Amazon DynamoDB VPC Endpoint VPC Endpoint VPC Endpoint Saves money on NAT Gateway data transfer!*
Why use VPC Endpoints?
Why use VPC Endpoints?
Why use VPC Endpoints?
Why use VPC Endpoints?
{ "Sid": "Access-to-specific-VPCE-only", "Action": "s3:*", "Effect": "Deny", "Resource": ["arn:aws:s3:::examplebucket", "arn:aws:s3:::examplebucket/*"], "Condition": { "StringNotEquals": { "aws:sourceVpce": "vpce-1a2b3c4d" } }
Why use VPC Endpoints?
Why use VPC Endpoints?
VPC Endpoints
AWS Region AWS Public Services AZ B AZ A Private Subnet 1A Private Subnet 2A Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB VPC Endpoint VPC Endpoint VPC EndpointVPC Endpoints
AWS Region AWS Public Services AZ B AZ A Private Subnet 1A Private Subnet 2A Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB VPC Endpoint VPC Endpoint VPC EndpointVPC Endpoints
AWS Region AWS Public Services AZ B AZ A Private Subnet 1A Private Subnet 2A Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB VPC Endpoint VPC Endpoint VPC EndpointPutting it all together
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 Elastic Load Balancer VPC NAT gateway VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB VPC Endpoint VPC Endpoint VPC EndpointWhat VPC things haven’t I mentioned?
What VPC things haven’t I mentioned?
IPv6
What VPC things haven’t I mentioned?
IPv6 VPC Flow s
IPv4 reminder
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 VPC NAT gateway VGW Amazon S3 Lambda function Amazon DynamoDBDual Stack (IPv4 & IPv6)
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 2001:DB8::/56 Amazon S3 Lambda function Amazon DynamoDB+
Dual Stack (IPv4 & IPv6)
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 2001:DB8::/56 Amazon S3 Lambda function Amazon DynamoDBAWS assigned /56 IPv6 address space
+
Focusing on IPv6 - /64s Everywhere
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 2001:DB8::/56 Amazon S3 Lambda function Amazon DynamoDBAWS assigned /56 IPv6 address space /64 /64 /64 /64 /64 /64
Focusing on IPv6 (Public Subnet Routing)
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 2001:DB8::/56 Amazon S3 Lambda function Amazon DynamoDBAWS assigned /56 IPv6 address space /64 /64 /64 /64 /64 /64
Focusing on IPv6 (Private Subnet Routing)
AWS assigned /56 IPv6 address space /64 /64 /64 /64 /64 /64
Egress Only Gateway
Focusing on IPv6 (External Private Routing)
AWS assigned /56 IPv6 address space /64 /64 /64 /64 /64 /64
Dual Stack – All together
AWS assigned /56 IPv6 address space
Egress Only Gateway
AWS Region AWS Public Services AZ B Public Subnet B AZ A Public Subnet A Private Subnet 1A Private Subnet 2A Public Route Table VPC NAT gateway Private Route Table 1 Private Route Table 2 Private Subnet 1A Private Subnet 2A VPC 10.0.0.0/16 2001:DB8::/56 VPC NAT gateway VGW DB Server Web Server DB Server Web Server Amazon S3 Lambda function Amazon DynamoDB Egress Only GW+
Some CloudFormation IPv6 nonsense
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
What you need to do:
Ipv6TestSubnetCidrBlock: Type: 'AWS::EC2::SubnetCidrBlock' Properties: Ipv6CidrBlock: 'Fn::Join':Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
What you need to do:
Ipv6TestSubnetCidrBlock: Type: 'AWS::EC2::SubnetCidrBlock' Properties: Ipv6CidrBlock: 'Fn::Join':Look up the /56 CIDR Block
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
What you need to do:
Ipv6TestSubnetCidrBlock: Type: 'AWS::EC2::SubnetCidrBlock' Properties: Ipv6CidrBlock: 'Fn::Join':Split on 00::/56 and grab the 1st part
Some CloudFormation IPv6 nonsense
What the docs say:
Ipv6TestSubnetCidrBlock: Type: "AWS::EC2::SubnetCidrBlock" Properties: Ipv6CidrBlock: !Ref Ipv6SubnetCidrBlock SubnetId: !Ref Ipv6TestSubnet
What you need to do:
Ipv6TestSubnetCidrBlock: Type: 'AWS::EC2::SubnetCidrBlock' Properties: Ipv6CidrBlock: 'Fn::Join':Join your chosen:
Auditing (VPC Flow Logs)
Auditing (VPC Flow Logs)
flow logs elastic network adapter elastic network adapterSo we’re done?
No! There’s more!
You can have lots of VPCs
Baby Baby Baby Baby Baby BabySo why have multiple VPCs?
Baby Baby Baby Baby Baby BabySo why have multiple VPCs?
Question: “Why have multiple AWS accounts?”
Baby Baby Baby Baby Baby BabyWhy have multiple accounts?
Why have multiple accounts?
Why have multiple accounts?
Why have multiple accounts?
Why have multiple accounts?
Why have multiple accounts?
“But I need my resources to communicate with those in other VPCs!”
Use VPC Peering
A B
VPC Peering
VPC peering got much better in the last year!
VPC peering got much better in the last year!
Reference Security Groups in peered VPCs
A B e.g. VPC A Security Group ID sg-000001a allows inbound port 80 from Security Group ID sg-000001b which is applied to resources in VPC B
VPC peering got much better in the last year!
Resolve DNS in peered VPCs
A B e.g. When VPC A resolves ‘ec2-35-176-15-190.eu-west- 2.compute.amazonaws.com’ which lives in VPC B, it resolves to 10.10.0.162 not 35.176.15.190
VPC peering got much better in the last year!
VPC peering got much better in the last year!
VPC peering limitations
VPC peering limitations
VPC peering limitations
No (native) VPC transit
VPC peering full mesh
Why would I want to transit a VPC anyway?
Why would I want to transit a VPC anyway?
Force all traffic through central firewall(s)
Force all traffic through central firewall(s)
‘local’ routes create real challenges!
Force all traffic through central firewall(s)
Local Routes create real challenges!
Subnet A Subnet B Subnet C Web DB FW/ IDSForce all traffic through central firewall(s)
Local Routes create real challenges!
Subnet A Subnet B Subnet C Web DB FW/ IDSForce all traffic through central firewall(s)
Local Routes create real challenges!
Subnet A Subnet B Subnet C Web DB FW/ IDSForce all traffic through central firewall(s)
Local Routes create real challenges!
Subnet A Subnet B Subnet C Web DB FW/ IDSForce all traffic through central firewall(s)
Local Routes create real challenges!
Subnet A Subnet B Subnet C Web DB FW/ IDSP
Force all (inter-subnet) traffic through a firewall (for IDS/IPS)
Customer-VPC - 10.0.0.0/16 AZ B Author Diagram Status Carl Simpson – Zen Internet Ltd Draft – Version 3 TransitSub1B 10.0.103.0/24 PubSub2B 10.0.102.0/24 Co-lo 10.0.107.0/24 - DBSub1B DB-i2 DB-SG1 CiscoASA-B A B AWS Pri RT-B TransitSub2B 10.0.104.0/24 A 10.0.105.0/24 – WebFarmSub2B B 10.0.106.0/24 – WebFarmSub2B C B CiscoFP-B A B Web2-i4 Web2-i5 Web2-i6 Web-i41 Web-i5 Web-i6 D Routing Table: 10.0.0.0/16 via local 192.168.0.1 via CiscoFP-B-int-B 192.168.0.2 via CiscoFP-A-int-B 0.0.0.0/0 via CiscoASA-int-B Routing Table: 10.0.102.0/24 via connected 10.0.103.0/24 via connected 0.0.0.0/0 via AWS Pub2 RT 192.168.0.2/32 via F5-int-B 10.0.5.0/24 via CiscoFP-B-int-A 10.0.6.0/24 via CiscoFP-B-int-A 10.0.105.0/24 via CiscoFP-B-int-A 10.0.106.0/24 via CiscoFP-B-int-A Routing Table: 10.0.101.0/24 via connected 10.0.102.0/24 via connected 0.0.0.0/0 via AWS Pub1 RT 10.0.5.0/24 via CiscoASA-B-int-A 10.0.6.0/24 via CiscoASA-B-int-A 10.0.105.0/24 via CiscoASA-B-int-A 10.0.106.0/24 via CiscoASA-B-int-A Routing Table: 10.0.0.0/16 via local 0.0.0.0/0 via IGW SNAT to 192.168.0.2 WebSG1 WebSG2 Routing Table: 10.0.103.0/24 via connected 10.0.104.0/24 via connected 0.0.0.0/0 via CiscoASA-int-B 192.168.0.2/32 via CiscoASA-int-B 10.0.105.0/24 via AWS Pri RT-B-int-A 10.0.106.0/24 via AWS Pri RT-B-int-A 10.0.5.0/24 via AWS Pri RT-A-int-A 10.0.6.0/24 via AWS Pri RT-A-int-A AWS RT (unused) AWS Pub2 RT EIP4 PubSub1B 10.0.101.0/24 AWS Pub1 RT F5-B A EIP2 LbSG1 AZ A TransitSub1A 10.0.3.0/24 PubSub2A 10.0.2.0/24 10.0.7.0/24 - DBSub1A DB-i1 DB-SG1 CiscoASA-A A B AWS Pri RT-A TransitSub2A 10.0.4.0/24 A 10.0.5.0/24 - WebFarmSub1A B 10.0.6.0/24 – WebFarmSub2A C IGW B CiscoFP-A A B Web2-i3 Web2-i2 Web2-i1 Web-i3 Web-i2 Web-i1 D Routing Table: 10.0.0.0/16 via local 192.168.0.1 via CiscoFP-A-int-B 192.168.0.2 via CiscoFP-B-int-B 0.0.0.0/0 via CiscoASA-A-int-B Routing Table: 10.0.2.0/24 via connected 10.0.3.0/24 via connected 0.0.0.0/0 via AWS Pub2 RT 192.168.0.1/32 via F5-int-B 10.0.5.0/24 via CiscoFP-A-int-A 10.0.6.0/24 via CiscoFP-A-int-A 10.0.105.0/24 via CiscoFP-A-int-A 10.0.106.0/24 via CiscoFP-A-int-A Routing Table: 10.0.1.0/24 via connected 10.0.2.0/24 via connected 0.0.0.0/0 via AWS Pub1 RT 10.0.5.0/24 via CiscoASA-A-int-A 10.0.6.0/24 via CiscoASA-A-int-A 10.0.105.0/24 via CiscoASA-A-int-A 10.0.106.0/24 via CiscoASA-A-int-A Routing Table: 10.0.0.0/16 via local 0.0.0.0/0 via IGW SNAT to 192.168.0.1 WebSG1 WebSG2 Routing Table: 10.0.3.0/24 via connected 10.0.4.0/24 via connected 0.0.0.0/0 via CiscoASA-int-B 192.168.0.1/32 via CiscoASA-int-B 10.0.5.0/24 via AWS Pri RT-A-int-A 10.0.6.0/24 via AWS Pri RT-A-int-A 10.0.105.0/24 via AWS Pri RT-A-int-A 10.0.106.0/24 via AWS Pri RT-A-int-A AWS RT (unused) AWS Pub2 RT EIP3 PubSub1A 10.0.1.0/24 AWS Pub1 RT F5-A A EIP1 LbSG1 Date 27/08/2015 VGW CiscoASA CiscoASA Route53 (health checked & RR/weighted DNS) Clients query AZ C: 192.168.0.3 – SNAT F5 load balancer 10.0.201.0/24 – PubSub1C 10.0.202.0/24 – PubSub2C 10.0.203.0/24 – TransitSub1C 10.0.204.0/24 – TransitSub2C 10.0.205.0/24 – WebFarmSub1C 10.0.206.0/24 – WebFarmSub2C 10.0.207.0/24 – DbSub1CWhy would I want to transit a VPC anyway?
AWS Global VPC Transit Solution
https://aws.amazon.com/answers/networking/transit-vpc/Direct Connect
Why use Direct Connect?
Why use Direct Connect?
EU-WEST-1 (Dublin) You Are Here! EU-WEST-2 (London)
EU-WEST-1 (Dublin) Manchester EU-WEST-2 (London)
EU-WEST-1 (Dublin) Manchester EU-WEST-2 (London)
EU-WEST-1 (Dublin) Manchester EU-WEST-2 (London)
Best Direct Connect PathWhy use Direct Connect?
X
Why use Direct Connect?
X
Lets check the AWS Direct Connect FAQs:
“Q. Does AWS Direct Connect offer a Service Level Agreement (SLA)?”
Lets check the AWS Direct Connect FAQs:
“Q. Does AWS Direct Connect offer a Service Level Agreement (SLA)?” Answer: “Not at this time.”
Why use Direct Connect?
X X
Why use Direct Connect?
X X
AWS Direct Connect Bandwidth
AWS Direct Connect Bandwidth
AWS Direct Connect Bandwidth
Why use Direct Connect?
X X
Why use Direct Connect?
X X
Consistent Network Performance?
Consistent Network Performance?
Consistent Network Performance?
Consistent Network Performance?
Consistent Network Performance?
Why use Direct Connect?
X X
Why use Direct Connect?
X X
Why use Direct Connect?
X X
Connectivity Options - Single Site Solution
Customer Office VGWConnectivity Options - Single Site Solution
Use Zen, we can provide this! :-)
Customer Office VGWConnectivity Options - Multi-site solution
Customer Office(s) Customer IPVPN/ MPLS Customer Data Centre(s) VGWConnectivity Options - Multi-site solution
Use Zen, we can provide this too! :-)
Customer Office(s) Customer IPVPN/ MPLS Customer Data Centre(s) VGWConnectivity Options – Multi-site solution (private and public)
Use Zen, we can provide this too! :-) Customer Requires Public IP space for access to public services!
Customer Office(s) Customer IPVPN/ MPLS Customer Data Centre(s) Amazon S3 Lambda function Amazon SQS Public Services VGWWhy use Direct Connect?
X X
Why use Direct Connect?
X X
Why use Direct Connect?
X X
So how do I get Direct Connect?
So how do I get Direct Connect?
So how do I get Direct Connect?
Direct Connect - A little more detail
Direct Connect Routing
AWS Router Customer /Partner Router VLAN 1 Customer/Partner ASN Amazon ASN VGWDirect Connect Routing
AWS Router Customer /Partner Router VLAN 1 eBGP Customer/Partner ASN Amazon ASN VGWDirect Connect Routing
AWS Router Customer /Partner Router VLAN 1 eBGP Customer/Partner ASN Amazon ASN VGWAnnounce Routes Announce Routes
Direct Connect Routing
AWS Router Customer /Partner Router VLAN 1 eBGP Customer/Partner ASN Amazon ASN VGWAnnounce Routes Announce Routes MED and AS PATH prepending supported
Direct Connect Routing
AWS Router Customer /Partner Router VLAN 1 eBGP Customer/Partner ASN Amazon ASN VGWAnnounce Routes Announce Routes MED and AS PATH prepending supported Direct Connect preferred over VPN connection
What we’ve covered:
Final thing…
Public Cloud Connect
Another Cloud Provider AWS (EU-West) RegionsPublic Cloud Connect: for multi-cloud access
Customer Site 1 Customer Site 2 Customer Site nThanks!
Questions?