Hybrid Envir. and Migration Flashcards
Border Gateway Protocol
BGP is a path-vector protocol it exchanges the best path to a destination between peers.. the path is called AS path
ASN
They Way BGP identifies different entities with in the network
Autonomous system Numbers are the way that BGP identifies different entities with in the network
Allocated by IANA
ASN are unique and allocated by IANA(0-65535), 64512 -65534 are private
Autonomous systems(AS)
Multiple routers controlled by one entity a network in BGP
Routers controlled by one entity considered a network in BGP
Are connections between two different Autonomous Systems in the BGP network Automatic ?
Not automatic - peering is manually configured
How does BGP Operates ? what Protocol?
it operated over TCP/179 - it’s reliable
How can you manipulate the AS path ? And why would you want to ?
AS Path Prepending can be used to artificially make the satellite path look longer making the fiber path preferred
Shorter paths get priority even if the longer that would offer better performance ex. a long fiber path vs a short satellite path
Why is BGP important in AWS ?
used by some AWS services such as:
- Direct Connect
- Dynamic Site to Site VPNs
AWS Site-to-Site VPN
VPN connection between VGW and CGW
a logical connection which creates a highly available IPSEC VPN between an AWS VPN and external network such as on-premises traditional networks
Virtual Private Gateway(VGW)
Logical gateway object which can be the target on route tables
something you create and associate with one VPC and can be the target on one or more route tables
Customer Gateway(CGW)
Logical piece of configuration within AWS and also the physical configuration
used to refer to both the logical piece of configuration within AWS
and the thing that configuration represents
How would you design an Highly Available Site-to-Site VPN connection ?
By default when a virtual gateway it’s is created, it creates two ENI in the AWS public zone in two different AZ but there is only one Customer Gateway by default to create a HA connection you would need to add a second CGW connection preferably in another building which would then add two more ENI in 2 different AZ for that connection so you would have two connections 4 VGW and 2 CGW
Drawback for Site-to-Site VPN?
speed limitations 1.25Gbps
Latency consideration -inconsistent , runs over public internet
cost-AWS hourly cost, GB out cost , data cop(on premises)
Benefits of using Site-to-Site VPNs ?
speed of setup- hours.. all software configuration
can be used as a backup for direct connect(DX) and also can be used with DX for quick provisioning in the the beginning of a DX to establish connectivity
AWS Direct Connect
physical private link connecting your business premises to its public and private services.
VIFS
DX connection can have multiple virtual interfaces(VIFs)
there are both private VIF(VPC) & Public VIF (public Zone Service)
Draw backs to Direct connect
Takes much longer to provision cs. VPN
DX port provisioning is quick the cross connect takes longer
extension to premise can take weeks/months
No encryption
Benefits of using DX
faster 40GB with aggregation
low consistent latency, doesn’t use business bandwidth (no public internet)
How can you enable encryption on DX?
the public VIF allows connections to AWS public services
inside the VPC we already have a virtual private gateway because that is what is used for any private VIFs running on DX (Private VIFs don’t have encryption)
what we can do is create a VPN using the ENI endpoint created by VPG and instead of using the public internet as the transit network you can use the public VIF running over Direct connect
IPSEC VPN over public VIF you get the benefits of DX the encryption of IPSEC
How can you design Resilience when using Direct Connect ?
AWS region(assumed to already be resilient ) is connected to a direct connection location , the location has AWS DX router and a Customer or provider DX router a single cross connection
the Direct connect location is the connected to customer on premises router which is one connection
to design resiliency you need 2 cross connections and another customer customer premises connection so ideally a separate DX location connected to another customer location (ideally geographic separate)
Transit Gateway(TGW)
Network Transit Hub to connect VPCs to on premise network
Benefits of using TGW
supports transitive routing
share between accounts using AWS TAM
Peer Attachments with different regions .. same or cross account
What other network resources can TGW be used with ?
VPC, site-to-site VPN, and Direct connect Gateway
Storage Gateway
Hybrid storage Virtual Appliance (on-premises*)
Extension of file & Volume storage into AWS
Storage Gateway Use cases
volume storage locally and backup into AWS
Tape Backups into AWS using AWS storage instead of physically Tapes
can provide an emulation layer using AWS storage but presenting this to backup software as a physical tape architecture
Migration of existing infrastructure to ASW
you can use it AS TRICKLE MIGRATION
Storage Gateway Mode
you pick when creating SGW
Tape Gateway (VTL) mode:
virtual tapes => s3 and Glacier
File mode - SMB and NFS:
file storage backed by s3 objects
Volume mode (Gateway cache/ stored) - ISCSI:
Block storage backed by s3 and EBS snapshots
Explain the two options Volume gateway mode ?
cached - the the primary data is stored in AWS and frequently accessed data is cached locally ideal for extending storage into AWS
Stored = the primary data is stored on-premises and asynchronously replicated into ASW an EBS snapshot is created from the backup data ideal for migrations into AWS