1. Home
  2. Training Library
  3. AWS Networking and Virtual Private Cloud (VPC) (ANS-C01)

Regional Communication


VPC Fundamentals
What is a VPC?
VPC Security and Control
VPC Connectivity
VPC Sharing using the AWS Resource Access Manager
Feature Spotlight:

Instructor: Mike Brown

Regional Communication

In this lecture, we will outline some of the options for inter and intra-regional communication. 

  • Intra-regional communication refers to traffic that stays within a region

  • Inter-regional communication refers to traffic that is sent between regions 

Almost all services in AWS are regional services, this includes VPCs and the resources you deploy to them. 

Because of this, we have some questions to consider. 

  1. If we deploy resources to a VPC do these resources need to access:
    1. The Internet
    2. Your offices
    3. Resources in other regions

  2. Do we need to connect to resources in different VPCs, if so are those resources in the same or different regions

  3. Do we need to access AWS services from the resources we have deployed to our VPCs 

Answering these questions will help us to determine the resources we need to deploy and configure to facilitate the correct communication.

Resources deployed to the same VPC

When you create a VPC in a region such as eu-west-2 and create subnets in each of the availability zones for that region, resources deployed to them can communicate automatically. For example two EC2 instances deployed to different subnets in different AZs would have no trouble routing traffic to each other through the default router created when the VPC was created.

The traffic between these instances is encrypted and stays on the AWS backbone even when the traffic travels between data centers in the same region. 

  • If the resources you have deployed to your VPC need internet access we will need to deploy Internet Gateways and perhaps NAT Gateways.

  • If the resources you have deployed to your VPC need to access your offices we might use a Site-to-Site VPN or Direct Connect.

Resources deployed to different VPCs

Deploying all of our resources to a single VPC simplifies communication, but there are plenty of reasons why you might need to deploy resources to multiple VPCs. Reasons like:

Isolation - resources might need to be isolated from each other, using multiple VPCs for this, either VPCs in the same or different regions is ideal because by default, communication isn’t enabled between VPCs

Multi-Region Deployments - VPCs are regional so if you need to deploy resources such as EC2 instances to multiple regions then you will need multiple VPCs

If you need the resources in each VPC to be able to communicate with each other, regardless of whether the VPCs are in the same region or not you will need to implement either:

  • VPC Peering

  • Transit Gateway

  • Customer Managed Site-to-Site VPNs

Of these options Customer Managed site-to-site VPNs are the least desirable as they route traffic between the VPCs through the internet, whereas VPC Peering and Transit Gateways keep all traffic on the AWS backbone.

One advantage of Customer Managed Site-to-Site VPNs, is that you can control the protocols that your connection uses for authentication, integrity checks and encryption. When using VPC Peering you have no control of security protocols used to secure traffic. When using Transit Gateways you must use IPSec.

It is desirable to keep as much traffic as possible on AWS’s networks. When connecting multiple VPCs, VPC Peering and Transit Gateway keep traffic on the AWS Backbone.

When traffic is traveling between your VPCs and AWS services such as S3 and DynamoDB you can use the public endpoints of these services, but to keep your traffic on the AWS backbone and away from public networks we can use VPC Endpoints.

Most organizations will use a mixture of these technologies for Inter and Intra regional communications, but to understand which technologies are correct for you, you will need to understand each technology in a bit more detail.


2h 44m

In this section of the AWS Certified Advanced Networking - Specialty learning path, we introduce you to the various networking and VPC services currently available in AWS that are relevant to the ANS-C01 exam.

Learning Objectives

  • Identify and describe the various networking services available in AWS
  • Describe how to configure an Amazon Virtual Private Cloud (VPC)
  • Understand how to control network traffic via Security Groups and Network Access Control Lists (NACLs)
  • Describe options for VPC connectivity, subnets, and routing
  • Understand how to share VPC resources using the AWS Resource Access Manager (RAM)
  • Identify how to evaluate the configuration of VPC resources using the VPC Reachability Analyzer


The AWS Certified Advanced Networking - Specialty certification has been designed for anyone with experience designing, implementing, and operating complex AWS and hybrid networking architectures. Ideally, you’ll also have some exposure to the nuances of AWS networking, particularly regarding the integration of AWS services and AWS security best practices. Many exam questions will require advanced level knowledge of many AWS services, including AWS networking services. The AWS Cloud concepts introduced in this course will be explained and reinforced from the ground up.

About the Author
Learning Paths

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.