Networking Flashcards
Classful vs classless
A /8, B /16, C /24
CIDR
Classless inter domain routing
second VPC range cannot be bigger than the original range
Block size has to be between /16 and /28
CIDR cannot overlap
with VPC, VPC peers, or on direct connect
dual stacking
using both IPV4 and V6 on a host.
Two types of end points
Interface end point and gateway end point
Interface end points
Are a virtual ethernet interface to connect AWS private link
Gateway endpoints
are a target for a specific route in your route table. S3 and dynamoDB
elastic network interface is different from elastic network adapters.
ENA is a custom interface used to optimize network performance on some interface types.
3 types of placemnet groups
cluster(low latency, high netk throughput)same AZ, Partition PG(workload not placed on different hw) spread PG( small number of critical instances that needs to be kept away from each other high availability )
spread PG can have upto how many instances
7
Types of VPN connectivity
Site-to-Site
AWS Client VPN
AWS VPN CloudHub
Site to site
IPSec VPN connection between a VPC and customer network. The AWS side of the network uses a virtual private gateway(VGW).. The VGW provides two different end points running of two different AZ for auotmatic failover.
AWS client VPN
Client managed. client based VPN service used to securely access AWS resources from your on premise network. Sessions are connected using a secure TLS VPN session and an open VPN based client
AWS VPN CloudHub
If you have multiple remote customer offices the VGW can act as a hub for site-to-site communication between the networks
VPN can be used in two ways
connect VPC to on-premise data center
Connect two different VPC’s in same or different regioun
Site to site
IPSec VPN connection between a VPC and customer network. The AWS side of the network uses a virtual private gateway(VGW).. The VGW provides two different end points running of two different AZ for automatic failover. Note customer GW is a SPOF
AWS client VPN
Client managed. client based VPN service used to securely access AWS resources from your on premise network. Sessions are connected using a secure TLS VPN session and an open VPN based client.
AWS Managed VPN or AWS client managed VPN. Connects over Internet gateway
VPN can be used in two ways
connect VPC to on-premise data center
Connect two different VPC’s in same or different regioun
IKE
Internet Key exchange is a protocol used to manage keys used by IPSec hosts
IKE vs IPSec
IKE UDP port 500
IPSec IP protocol 50
AWS client to site VPN
Client managed. client based VPN service used to securely access AWS resources from your on premise network. Sessions are connected using a secure TLS VPN session and an open VPN based client.
AWS Managed VPN or AWS client managed VPN. Connects over Internet gateway
Client-to-Site VPN connectivity gives clients the ability to connect to a variety of resources including the VPC
On-Premises site-to-site VPN, and Peer VPCs.
Client to site VPN
user needs to install OpenVPN based client on their PC.
Establish a client VPN endpoint in AWS one in each AZ in a target within a VPC. The target is essentially a subnet within a VPC. In this case 2 subnets one in each AZ.
User gets access to VPC and peered VPC and onpremise networks across VGW, user gets access to the internet through IGW and public aws services like S3
site-to-site VPN routing options
static vs dynamic(BGP)
VGW supports BGP configuration options
Autonomous systems prepends AND multi exit discriminator
VGW uses BGP over TCP port
179( the standard BGP port)
The configuration of CGW
is provided by AWS and a list of pretested devices are available. The config requires 4 components
1) IKE security association
2) IPSec security association
3) Tunnel interface ( a /30 CIDR block)
4) BGP peering is optional
AWS VPN CloudHub
provides a means of peer-to-peer communication between Customer Gateways.
AWS VPN CloudHub
provides a means of peer-to-peer communication between Customer Gateways. You don’t need a VPC for CloudHub to function. It is a hub and spoke model. VGW functions as a passthrough. IP ranges however cannot overlap. to configure VPN HUB
Transitive routing is not supported in AWS between VPC Peers. Additionally, edge-to-edge routing is not supported. So how do we give on-premises users access to VPC Peer resources, without creating a VPN connection to each VPC
That’s where Tansit VPC are useful
Transit VPC’s
run EC2 instances which enable software based VPN. This allows CGW can do edge to edge routing.
The VPN connection is not active until the traffic is generated from the customer side of the VPN connection
To keep the tunnel active initiate regular traffic, ICMP pinging. The tunnel will close if it idle for more than 10 seconds.
health checks defaults
Response timeout 2-60 default 5
health check interval 5-300 default 30
unhealthy threshold 2-10 default 2
healthy threshold 2-10 default 10
Benefits of ALB vs classic LB
1) Path based routing
2) Hos tbased routing
3) custom http response
4) Supports targets outside your VPC
5) Redirecting requests from one URL to another
6) Users may optinally be authenticated before rourting
7) Health checks are at target level. which allows auto scaling based on cloud wathc metrics
8) ALB supports AWS WAF
9) sticky sessions
Network load balancer is able to handle
millions of requests per second
NLB by default work with a single AZ.
DNS failover with Route53 is possible. The NLB will redirect to another AZ if all instances are unhealthy in a particular AZ
NLB flows logs are sent to cloudwatch
access logs can be enabled to capture information about TLS connections that listener recieves. This provides visibility into successful and failed handshakes so that they may be reviewed.
with Classic Load Balancer you can specify your own application cookie
https://cloudacademy.com/blog/application-load-balancer-vs-classic-load-balancer/
From edge location to S3 https is not supported
If your Amazon S3 bucket is configured as a website endpoint, you can’t configure CloudFront to use HTTPS to communicate with your origin because Amazon S3 doesn’t support HTTPS connections in that configuration
Cloud front access logs
logs requests and RTMP. An s3 bucket is required to store the logs