VPC - Manage Private Network on AWS

VPC is our own isolated network in the cloud.

circle-check

β–ͺ We have a VPC for each Region

β–ͺ VPC spans all the AZ (Subnet) in that Region

β–ͺ Multiple VPCs in different Regions

β–ͺ VPC is like a virtual representation of network infrastructure: Server setup, network configuration (router, firewall, DHCP etc.) moved to cloud

SUBNET

Subnet is a range of IP addresses in your VPC

It's like a private network inside a network:

We have a subnet for each Availability Zone:

Private and Public Subnets

β–ͺ Based on firewall configuration we can have a private and/or public subnet:

β–ͺ A subnet has a default range of internal(private) IP addresses

BUt : other services inside the vpc still have access

β–ͺ When you create a new resource like EC2 instance then an IP address is assigned within this subnet's IP range

β–ͺ For communication inside the VPC

  • not for outside web traffic

  • internal IP range on VPC level

Internet Gateway

β–ͺ Using an internet gateway you can connect the VPC or its subnets to the outside internet

Security - Controlling Access

Of course, we need to secure our resources:

β–ͺ Control access to your VPC

β–ͺ Control access to your individual server instances

  • secure your components

NETWORK ACCESS CONTROL LIST (NACL)

  • Configure access on instance level = Security group

  • Configure access on subnet level = NACL

Last updated