In this section of the AWS Certified Advanced Networking - Specialty learning path, we introduce you to the various networking and VPC services currently available in AWS that are relevant to the ANS-C01 exam.
- Identify and describe the various networking services available in AWS
- Describe how to configure an Amazon Virtual Private Cloud (VPC)
- Understand how to control network traffic via Security Groups and Network Access Control Lists (NACLs)
- Describe options for VPC connectivity, subnets, and routing
- Understand how to share VPC resources using the AWS Resource Access Manager (RAM)
- Identify how to evaluate the configuration of VPC resources using the VPC Reachability Analyzer
The AWS Certified Advanced Networking - Specialty certification has been designed for anyone with experience designing, implementing, and operating complex AWS and hybrid networking architectures. Ideally, you’ll also have some exposure to the nuances of AWS networking, particularly regarding the integration of AWS services and AWS security best practices. Many exam questions will require advanced level knowledge of many AWS services, including AWS networking services. The AWS Cloud concepts introduced in this course will be explained and reinforced from the ground up.
In this section, we will discuss some of the capabilities of VPC sharing. When working with VPC sharing, we have to be aware of the following limitations. The VPC owner can only share VPCs with other AWS accounts in their own organization. The default VPC in each region cannot be shared. VPC sharing participants cannot launch resources using the default VPC security group or security groups created by other participants. They must use their own security groups.
VPC sharing participants can create application load balancers and network load balancers, and can register targets they deployed to their shared subnets. Only the VPC owner can deploy gateway load balancers to shared subnets. When working with VPC sharing, each participant pays for the resources that they deploy. For example, if they deploy EC2 Instances, RDS databases, or Redshift clusters, then they would expect to see these resources on their bill at the end of the month. VPC sharing participants are also charged for their Inter-Availability Zone data transfer, VPC peering data transfer, and data transfer over AWS direct connect gateways. This is not a complete list.
You must consult the AWS documentation for a complete list of charges that you might incur when a VPC is shared with your AWS account and you deploy resources to it. The owner of VPC might incur charges for NAT Gateway data processing and data transfer, data transfer costs for Virtual private gateways and Transit gateways, and data transfer costs associated with VPC Endpoints and Endpoint services. The VPC owner can unshare a subnet at any time. If this happens, VPC participants will not be able to create new resources in the subnet, existing deployed resources will continue to run. VPC participants can still modify, view, and delete their deployed resources, and the VPC owner will not be able to delete the unshared subnet or the shared subnets VPC until the VPC participant deletes all their deployed resources.
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.