Amazon Web Services (VPC)
Amazon Web Services (VPC)
Amazon VPC
A virtual private cloud (VPC) is a virtual network dedicated to your AWS
account. It is logically isolated from other virtual networks in the AWS Cloud.
You can specify an IP address range for the VPC, add subnets, add gateways,
and associate security groups. A subnet is a range of IP addresses in your VPC.
Amazon VPC enables you to build a virtual network in the AWS cloud - no
VPNs, hardware, or physical datacenters required. You can define your own
network space, and control how your network and the Amazon EC2 resources
inside your network are exposed to the Internet.
VPC is a virtual network that you use to connect your virtual servers, and other
resources.
There are two launch models within EC2. They're known as EC2-Classic and
EC2-VPC. If you have account(s) opened before the end of 2013, you have
access to both EC2-Classic and EC2-VPC. Within Classic, you can launch
instances “naked”, with direct connection to the internet, without a VPC.
While there is no additional charge for creating and using an Amazon Virtual
Private Cloud (VPC) itself, you can pay for optional VPC capabilities with usage-
AWS UNIT IV Virtual Private Cloud
based charges. AWS provides features and services that give you the ability to
customize control, connectivity, monitoring, and security for your Amazon VPC.
Amazon Virtual Private Cloud (VPC) is the networking layer for Amazon
Elastic Compute Cloud (EC2). It's a virtual network that allows users to launch
AWS resources in a logically isolated environment.
A VPC must have at least one IPv4 CIDR block, but you can also add IPv6 CIDR
blocks. You can create subnets within a VPC by using a subset of the VPC's CIDR
block. The CIDR blocks of subnets cannot overlap.
To add or remove a CIDR block from a VPC, you can:
1. Select the VPC
2. Choose Actions, then Edit CIDRs
3. To add a CIDR, choose Add new IPv4 CIDR or Add new IPv6 CIDR
4. To remove a CIDR, choose Remove next to the CIDR
AWS UNIT IV Virtual Private Cloud
Components of VPC
Amazon Virtual Private Cloud (VPC) is a virtual network environment in
the AWS cloud that isolates your AWS account. The components of an
Amazon VPC include:
• Subnets: Segments of a VPC's IP address range where you can place
groups of isolated resources
• Internet Gateway: The Amazon VPC side of a connection to the public
internet
• NAT Gateway: A managed Network Address Translation (NAT) service
that allows instances in private subnets to access the internet
• Security Groups: Act as virtual firewalls for your EC2 instances
• Network Access Control List (NACL): A stateless firewall that's used on
the subnet level
• Route tables: Each subnet has a logical construct called an Implicit
Router, and each router has a route table associated with it
• IP addressing: A set of CIDR blocks in IPV4 or IPv6 format
• VPC peering: Connects two VPCs securely over the AWS network
• Egress-only Internet Gateway: Allows outbound communication to the
internet from instances in private subnets
• VPC endpoints: Enables private connectivity to services hosted in AWS,
from within your VPC
Amazon Virtual Private Cloud
• VPC CIDR blocks.
• Subnet CIDR blocks.
• Compare IPv4 and IPv6.
• Managed prefix lists. Customer-managed prefix lists. Work with
customer-managed prefix lists. ...
• AWS IP address ranges. Find address ranges. Syntax. ...
• IPv6 support for your VPC. Add IPv6 support for your VPC. ...
AWS UNIT IV Virtual Private Cloud
Amazon VPC lets you to use multiple layers of security, including security
groups and network access control lists, to help control access to Amazon
Elastic Compute Cloud (Amazon EC2) instances in each subnet.
In AWS, VPC is an acronym for Virtual Private Cloud. A VPC is a virtual space
that you can use to launch AWS resources into virtual networks.
The virtual network is similar to a traditional on-prem data center operated
network, but it comes with all the features & benefits we now closely associate
with AWS hosting.
Because an AWS VPC is essentially moving IP traffic into and around your AWS
Regions, it's also your first line of defence. When configured correctly, a VPC
acts as an extra layer of protection - the result is a scalable, secure, logically
isolated non-public area inside your public cloud.
Amazon doesn't charge to use a VPC, but there are charges for using some elements,
e.g. NAT gateways and traffic mirroring.
Here are the key ways to create, access and manage your VPCs:
AWS Management Console: AWS' own web interface.
AWS CLI (Command Line Interface): A command-based option that supports a wide
range of AWS services on Windows, Mac, and Linux.
AWS UNIT IV Virtual Private Cloud
AWS SDKs: Language-specific APIs that take care of connection details, including
calculating signatures and error handling.
AWS Query API: Low-level API actions that you call using HTTPS requests. This is the most
direct way to access Amazon VPC, but you'll need to handle low-level details
such as signature hash generation, and error handling.
Cloud Management Tools: Powerful tools, like Hyperglance, utilize AWS' APIs to
deliver you insightful views, security monitoring, cost optimization, and best-in-
class automation options.
Types of VPC
A virtual private cloud (VPC) is a secure, isolated private cloud hosted within a
public cloud. VPC customers can run code, store data, host websites, and do
anything else they could do in an ordinary private cloud, but the private cloud
is hosted remotely by a public cloud provider.
VPC endpoints also provide you with much finer control over how users and
applications access AWS services. There are three types of VPC
endpoints: gateway load balancer endpoints, gateway endpoints, and interface
endpoints. Let's take a look at each type of endpoint and how it is used.
Here are some types of VPC components:
• Subnets
A segment of a VPC that's contained within a single availability zone. Subnets
allow users to divide their VPC into smaller network segments and control
traffic flow between them.
• VPC endpoints
Virtual devices that allow communication between instances in your VPC and
services. You can create the type of VPC endpoint that is required by the
supported service.
• NAT Gateway
A component that provides egress-only internet connectivity for the resources
associated or routed to the NAT Gateway.
AWS UNIT IV Virtual Private Cloud
Subnet in VPC
A subnet is a range of IP addresses within a virtual private cloud (VPC):
• Definition
A subnet is a logical network that divides a VPC into multiple logical networks.
• Purpose
Subnets can be used to isolate resources, control access to resources, and
segment a VPC into different environments.
• Types
Subnets can be public or private, with public subnets having access to the
internet and private subnets not having access to the internet.
AWS UNIT IV Virtual Private Cloud
• Creation
In Google Cloud, you can create VPC networks in auto mode or custom
mode. In auto mode, one subnet from each region is automatically created. In
custom mode, you have complete control over the subnets and IP ranges.
Here are some other things you can do with subnets:
• Launch AWS resources, such as Amazon EC2 instances, into your subnets.
• Connect a subnet to the internet, other VPCs, and your own data
centers.
• Route traffic to and from your subnets using route tables.
between your own VPCs, or with a VPC in another AWS account. The VPCs can
be in different Regions (also known as an inter-Region VPC peering connection).
VPC endpoints
A VPC endpoint enables customers to privately connect to supported AWS
services and VPC endpoint services powered by AWS PrivateLink. Amazon VPC
instances do not require public IP addresses to communicate with resources of
the service. Traffic between an Amazon VPC and a service does not leave the
Amazon network.
An endpoint is the URL of the entry point for an AWS web service. The AWS
SDKs and the AWS Command Line Interface (AWS CLI) automatically use the
default endpoint for each service in an AWS Region. But you can specify an
alternate endpoint for your API requests.
For example, let's say you have an Amazon S3 bucket that stores sensitive data.
Without a VPC endpoint, you would have to access the S3 bucket over the
internet, which can be a security risk. With a VPC endpoint, you can access the
S3 bucket directly from your VPC without ever leaving the private network.
AWS UNIT IV Virtual Private Cloud