Learn Amazon VPC (AWS Certified Solutions Architect) with Interactive Flashcards
Master key concepts in Amazon VPC through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.
Amazon VPC
Amazon Virtual Private Cloud (VPC) is a service that allows you to create a logically isolated and privately customizable portion of the AWS Cloud. VPC provides you the ability to define a virtual network and configure its components like IP address range, subnets, route tables, and network gateways, to control both inbound and outbound access to instances and other AWS resources. VPC also allows you to leverage multiple layers of security, including security groups and network access control lists (ACLs).
Subnets
Subnets are smaller, individual sections of a VPC IP address range partitioned into different availability zones for redundancy and fault tolerance. They segregate network traffic, allowing for better application performance and security. Subnets can be either private or public, depending on whether they have direct access to the internet via an Internet Gateway (IGW). While private subnets only allow internal access, public subnets can be accessed from the internet.
Internet Gateway
An Internet Gateway (IGW) is a horizontally scalable, redundant, and highly available VPC component that allows communication between instances in your VPC and the internet. It serves two purposes: to provide a target in your VPC route tables for internet-routable traffic and to perform network address translation (NAT) for instances that have been assigned public IPv4 addresses.
VPC Peering
VPC Peering enables you to create a network connection between two Amazon Virtual Private Clouds (VPCs) that belong to either the same AWS account or two different accounts. This connection allows instances in both VPCs to communicate with each other as if they were part of the same network. VPC Peering supports both IPv4 and IPv6 communication and is established based on request-acceptance model. Data transferred across VPC peering connection is private and secure, as it does not traverse the public internet. Use cases of VPC Peering include sharing resources across multiple VPCs, reduce the use of VPC host and data transfer costs, and enhance security between VPCs in a multi-account environment.
Network Address Translation (NAT) Gateway
A Network Address Translation (NAT) Gateway is a highly available, managed service that operates within a single Amazon VPC. It allows EC2 instances within a private subnet to access the internet, while preventing direct inbound access from the internet. NAT Gateway supports IPv4 traffic only and uses a separate Elastic IP address for each NAT Gateway created. It is designed to handle traffic bursts and scale automatically based on the current demand. When you create a NAT gateway, you must specify the VPC and the public subnet it should reside in to be able to route the traffic between the private subnet and the internet. Common use cases for a NAT Gateway include software updates, internet connectivity for private instances, and hybrid cloud architectures.
Network Access Control Lists (NACLs)
Network Access Control Lists (NACLs) are stateless, virtual firewalls that control both inbound and outbound traffic at the subnet level within an Amazon VPC. NACLs have separate inbound and outbound rules, and all traffic must be explicitly allowed through the rules. Each rule in a NACL includes a rule number, an action (allow or deny), a protocol, a port range, and a source or destination IP address or CIDR block. Rules are evaluated in the order based on the rule number, and the first matched rule is applied, while the rest are ignored. By default, each VPC comes with a default NACL allowing all inbound and outbound traffic. NACLs serve as an additional layer of security and can be used in conjunction with security groups to enforce strict network security in your VPC environment.
Virtual Private Gateways (VGWs)
Virtual Private Gateway (VGW) is the VPN concentrator on the Amazon side of a VPN connection; it is a highly available, managed service that facilitates secure connectivity between an Amazon VPC and your on-premises network via a site-to-site VPN. You can attach a VGW to your VPC and your customer gateway, creating a secure communication path. Each VGW can support multiple VPN connections to a single VPC; as a result, you can achieve redundancy on both the AWS side and the customer gateway side. Use cases for a Virtual Private Gateway include establishing secure communication between your VPC and on-premises networks, extending your internal network to AWS, and building a hybrid cloud architecture by connecting on-premises resources to AWS resources within an Amazon VPC.
Route Tables
Route Tables are used to define routes for the traffic within a VPC, allowing communication between subnets and determining how network traffic is directed between resources. Each subnet within a VPC must be associated with a route table, and the table can have multiple entries with varying rules controlling which traffic is allowed or denied to reach the specific destinations. Route Tables provide the ability to configure public and private routing, which dictates if instances within the subnet have access to the internet. When creating a VPC, a default route table is created, which can be modified or replaced with custom route tables based on specific needs.
VPC Endpoints
VPC Endpoints allow you to connect your VPC directly to AWS services, such as Amazon S3, without traversing the public internet, ensuring secure and private connectivity between your VPC and the AWS services. There are two types of VPC Endpoints: Interface Endpoints and Gateway Endpoints. Interface Endpoints are powered by AWS PrivateLink and create an elastic network interface (ENI) with a private IP address in your subnet. Gateway Endpoints provide a target for route table entries to direct traffic to a supported AWS service, such as Amazon S3 or Amazon DynamoDB. Using VPC Endpoints can enhance security as well as reduce latency and data transfer costs.
VPC Flow Logs
VPC Flow Logs is a feature that captures information about the IP traffic going to and from network interfaces in your VPC, providing visibility and insights into your network traffic across your VPC, subnets, and network interfaces. Flow log data can be used to monitor network traffic for security, compliance, and network troubleshooting purposes. Flow logs can be viewed and analyzed directly in the Amazon CloudWatch Logs service or exported to an Amazon S3 bucket for further analysis or long-term storage. VPC Flow Logs consist of various fields such as version, account ID, interface ID, source and destination IP addresses, source and destination ports, traffic action, and more.
Go Premium
AWS Certified Solutions Architect - Associate Preparation Package (2024)
- 3215 Superior-grade AWS Certified Solutions Architect - Associate practice questions.
- Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
- Unlock Effortless AWS Certified Solutions Architect preparation: 5 full exams.
- 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
- Bonus: If you upgrade now you get upgraded access to all courses
- Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!