ANS-C01 Introduction
VPC Fundamentals
VPC Security and Control
VPC Connectivity
VPC Subnets
VPC Routing
VPC Sharing using the AWS Resource Access Manager
Feature Spotlight:
AWS Networking Basics
Introduction to AWS PrivateLink
Using AWS Network Firewalls to Secure Your VPCs
Inter-Regional and Intra-Regional Communication Patterns
The course is part of this learning path
In this section of the AWS Certified Advanced Networking - Specialty learning path, we introduce you to the various networking and VPC services currently available in AWS that are relevant to the ANS-C01 exam.
Learning Objectives
- Identify and describe the various networking services available in AWS
- Describe how to configure an Amazon Virtual Private Cloud (VPC)
- Understand how to control network traffic via Security Groups and Network Access Control Lists (NACLs)
- Describe options for VPC connectivity, subnets, and routing
- Understand how to share VPC resources using the AWS Resource Access Manager (RAM)
- Identify how to evaluate the configuration of VPC resources using the VPC Reachability Analyzer
Prerequisites
The AWS Certified Advanced Networking - Specialty certification has been designed for anyone with experience designing, implementing, and operating complex AWS and hybrid networking architectures. Ideally, you’ll also have some exposure to the nuances of AWS networking, particularly regarding the integration of AWS services and AWS security best practices. Many exam questions will require advanced level knowledge of many AWS services, including AWS networking services. The AWS Cloud concepts introduced in this course will be explained and reinforced from the ground up.
As shown in this diagram, AWS PrivateLink services can be accessed privately and securely from on-premises users or applications via AWS Direct Connect or VPN connections. Additionally, if a service consumer wants to access a PrivateLink service from multiple VPCs in multiple regions, they could decide to deploy a PrivateLink endpoint in each VPC, and this would work just fine. Or the service consumer could decide to deploy the PrivateLink endpoint into a centralized AWS account, which functions as a network hub.
VPC peering connections could then be used to allow VPCs in different regions access to the PrivateLink resources through the centralized PrivateLink endpoint. As it relates to AWS PrivateLink, there are a few AWS service quotas to be mindful of. 1, Interface and Gateway Load Balancer Endpoints per VPC. By default, the combined number of Interface and Gateway Load Balancer endpoints allowed per VPC is 50. However, this number is adjustable.
So, if an organization needed to create 52 PrivateLink endpoints to support their SaaS and partner connections, they must expand this quota to do so. 2, Gateway VPC Endpoints per Region. A Gateway Load Balancer is typically used to distribute traffic to network appliances for the purposes of traffic, security, compliance, and policy inspection. A service provider can make these types of services available over PrivateLink via a Gateway endpoint.
AWS allows 20 Gateway VPC endpoints to be created per region, but this quota is also adjustable. 3, VPC Endpoint Policy Size. A VPC endpoint policy is an IAM resource policy that can be attached to a PrivateLink endpoint to control which AWS principles can use the endpoint to access endpoint services. The default PrivateLink endpoint policy allows all actions by all principles. The default policy can be modified or replaced, but the maximum number of characters supported within the policy, including white spaces, is 20,480 characters, and this quota is not adjustable.
Metrics are published to CloudWatch for any PrivateLink endpoint that is created. PrivateLink sends metrics to CloudWatch in one-minute intervals at no additional cost. These metrics can be used to monitor the performance of the PrivateLink connection to ensure that the system is performing as expected. The relevant metrics are shown on this table. ActiveConnection represents the number of concurrent active connections.
BytesProcessed shows the number of bytes exchanged between endpoints, and this metrics will be helpful in determining the cost of a PrivateLink connection. NewConnections represents the number of new connections established through the endpoint. PacketsDropped displays the number of packets dropped by the endpoint. If this value increases, it could indicate a problem with either the consumer or the provider side of the connection. RstPacketsReceived displays the number of RST packets received by the endpoint. If this value increases, it could indicate a problem with the endpoint service provider.
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.