Aws Series Networking
Post Date : 2023-12-28T10:22:54+07:00
Modified Date : 2023-12-28T10:22:54+07:00
Category: systemdesign aws
Tags: aws
6. Networking
6.1. VPC
- Virtual Private Cloud
- Fully customized your network
- Create a hardward Virtual Private Network(VPN) connection between your data center and your AWS VPC.
- Logical data center in AWS
- Consists of: internet gateway, route tables, network access control lists, subnets, security groups
- 1 subnet is always in 1 Availability Zone (subnet can’t span into multiple AZs)
- Amazon IPV4 CIDR block size must be between /16 - /24
What can we do with VPC
- Launch instances into a subnet of your choosing
- Custom IP Addresses: Assign IP Addresses Range for each subnet
- Route tables: config route tables between subnets
- Internet Gateway: create internet gateway and attach it to our VPC
- Access Control Lists: subnet network access control lists(NACLs)
Tips: you can use Network Access Control Lists(NACLs) to block specific IP Addresses
There 2 kinds of VPC
- Default VPC: user friendly, all subnets in default VPC have a route to the internet, each ec2 instance has both a public and private IP address.
- Custom VPC: fully customizable, takes time to set up.
Network Diagram
In a subnet with CIDR Block 10.0.0.0/24, the first 4 IP addresses and the last IP address in each subnet block are not available for you to use. Because they are reserved:
- 10.0.0.0: Network address
- 10.0.0.1: Reserved by AWS for the VPC router
- 10.0.0.2: Reserved by AWS for DNS Purpose
- 10.0.0.3: Reserved by AWS for future use.
- 10.0.0.255: Network broadcast address
NAT Gateway
- Redundant inside the AZ
- Starts at 5Gbps and scales currently to 45Gbps
- No need to patch
- Not associated with Security Groups
- Automatically assigned a public IP address
Protect your resources with Security Group
- Last line of defend
- Virtual Firewall on AWS
- By default everything is block
- Stateful
If you send a request from your instance, the response traffic for that request is allowed to flow in regardless of inbound security group rules
Responses to allowed inbound traffic are allowed to flow out, regardless of outbound group.
For instance:
- If you have an allow inbound rule for port 80, and you set a deny for outbound rule for port 80(the deny rule won’t work)
Network ACL
- The first line of defense
- ACL: access control list
- Act as a firewall for controlling traffic in and out of one or more subnets
- Default Network ACLs: VPC automatically comes with a default network ACL, by default it allows all outbound and inbound traffic
- You can create custom Network ACL. By default custom network ACL denies all inbound and outbound traffic
- Subnet Associations: each subnet must be associated with a network ACL. If you don’t explicitly associate a subnet with a network ACL, it will be automatically associated with a default network ACL.
- Block IP Addresses: Block IP addresses using network ACLs, not security groups
- Network ACL is stateless, you have to define your inbound and outbound rules
- Network ACL evaluate the rules in order, starting with the lowest numbered rule, when deciding whether allow or deny traffic. If the traffic matches a rule, the rule is applied and we do not evaluate any additional rules.
VPC Endpoints
- Are virtual devices
- Not impose availability risk or bandwith constraints when your VPC communicate with AWS Services.
- Enable you privately connect your VPC to supported AWS Services powered by private link without requiring an Internet Gateway/NAT/VPC Connection/AWS Direct Connect
- Traffic between your VPC and other service does not leave the Amazon Network
There are 2 types of endpoints
- Interface Endpoint: elastic network interface with a private IP Address
- Gateway Endpoint: similar to NAT, is virtual device you provision. It supports connection to S3 and DynamoDB
Multiple VPCs
- Use VPC Peering
- Connect 1 VPC to another via direct network route using private IP addresses
- Not support transitive peering. Eg: A<–>B, A<–>C, and it does not allow you to B<–>C via A. You must create peering connection between B<–>C
- You can peer between regions
- No overlapping CIDR address range
Network privacy with AWS PrivateLink
- If you have to make peering VPCs to tens,hundreds,or thoudsands of customer VPCs, think of AWS PrivateLink.
AWS VPN CloudHub
- If you have multiple sites, each with its own VPN connection, you can use AWS VPN CloudHub to connect those sites together.
- Establish private connectivity between AWS and your data center or office(on-premises)
There are 2 types of Direct Connection
- Dedicated Connection: physical ethernet connection associated with a customer
- Hosted Connection: physical ethernet connection that AWS Direct Connect Partner provision on behalf of customer
AWS Transit Gateway
If you’re facing with this problems:
You can just simplify your network topology with AWS Transit Gateway(act as a router)
- Allow transitive peering between thousands of VPCs and on-premises data centers
- Works on a hub-and-spoke model
- Works on a regional basis
- Can use it across multiple AWS accounts using RAM(Resource Access Management)
Summary:
- You can use route tables to limit how VPCs talk to each other
- Works with Direct Connect as well as VPN connections.
- Supports IP Multicast
5GB Networks
-
5GB provides mobile devices wither higher speed, lower latency, and greater capacity than 4GB LTE networks. It is one the fastest, most robust technologies the world has ever seen.
-
AWS Wavelength embeds AWS Compute and Storage within 5GB networks : smart car <–> 5GB <–> AWS Compute/Services -> Mobile Edge Computing