AWS Networking Flashcards
VPC Peering
- AWS provided connection between two VPCs
- No transitive peering
vpc flow logs
- information about the IP traffic
- stored using cloudwatchlogs or s3
- vpc, subnet, network interfaces
Cloudfront Lambda@edge
- used to customize content cloudfront delivers
- viewer request
- origin request
- origin response
- viewer response
AWS Cloudfront
- Content deliver network (CDN)
- Moves content closer to the User
- Geo Location filtering
- Uses AWS backbone
Signed Cookies
- provides control over access to content
- doesn’t require a url change
- Used for multiple files
Signed URL
- Provides control over access to content
- URL updates
- for Individual files
- expires date and time
- IP Ranges
CloudFront Origins
- Where the content originates
AWS Managed VPN
- IPsec vpn over your existing network
- quick and simple tunnel to a vpc
- used as redundant for DirectConnect
- Dependent on your INET
AWS Direct Connect
- Dedicated Network connection to AWS backbone
- when a large link to AWS is required
- Lead time > 1 month
- Not encrypted by default
Direct Connected + VPN
- Adds IPSec to Direct Connect
- Encrypted tunnels over Direct Connect
Cloudfront Edge Locations
- 100s located in different parts of the world
- Content is pushed and cached at the edge
Software VPN
- Customers provide their own VPN
- when you must manage both ends for compliance reasons
- when you must use a vpn option not provided by AWS
Transit VPC
- For Connecting geographically dispersed VPCs and Locations
- When locations and vpcs across multiple regions need to talk
- Flexibility with AWS managed vpn
- Hub and spoke with vpcs
CloudHub
- connect locations in hub/spoke using AWS Private Gateway
- Used to link remote offices
- Uses existing INET
AWS Security Groups
- Instance level
- Can specify allow not deny
AWS Default Security groups
- Can’t be deleted
- Can Change the rules
AWS Subnets
- EC2 instance can have 5 subnets
- Will be assigned to default NACL if not assigned to custom NACL
VPC Interface endpoint
- EC2 in VPC to EC2 in VPC
- Uses ENI with private IP to connected to PrivateLink
- Typical ELB as the connection point in PrivateLink
- Service provider model
- Secured by security groups
VPC Gateway endpoint
- Used for connection from VPC to S3 or Dynamo DB
- Uses endpoint policies
- Prefix list in route table
- Bucket policies can be added to restrict S3 access
NAT Gateway
- Used to allow Private IPs access to INET
- Download software
- Goes in Publish Subnet
Can VPC Peering with Overlapping IPS
- will fail… IPs cannot overlap.
Public Subnets
- Have a route via the Internet gateway to the Internet
What type of IP is not considered unique
- IPv6
- Elastic IPs
- IPv4 - Public IPs
- IPv4 - Private IPs
IPv4 Private ips… think 10.x.x.x
AWS Private Link
- Service provider … a single service to 1ks of VPCs
- Doesn’t require VPC peering
- Requires NLB on Service side and ENI on Client side