VPC Flashcards
VPC
Virtual Private Cloud
VPC - Define
A private sub-section of AWS that you control, in which you can place AWS resources (such
as EC2 instances and databases). You have FULL control over who has access to the AWS
resources that you place inside your VPC.
VPC - AWS Definition
“Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section
of the Amazon Web Services (AWS) cloud where you can launch AWS resources in a virtual
network that you define. You have complete control over your virtual networking
environment, including selection of your own IP address range, creation of subnets and
configuration of route tables and network gateways.”
List the Standard Components of a VPC
- Internet Gateway (IGW)
- A Route Table (with predefined routes to the default subnets).
- A Network Access Control List (with predefined rules for access).
- Subnets to provision AWS resources in (such as EC2 Instance).
Internet Gateway (Simplified Definition)
A combination of hardware and software that provides your private network with a route to
the world outside (meaning the Internet) of the VPC.
Internet Gateway (AWS Definition)
An Internet gateway is a horizontally scaled, redundant and highly available VPC
component that allows communication between instances in your VPC and the Internet.
It therefore imposes no availability risks or bandwidth constraints on your network traffic.
NOTE: Your “default” VPC already has an IGW attached.
Internet Gateway (rules and details) you need to Know:
(1) Only 1 IGW can be attached to a VPC at a time
(2) An IGW cannot be detached from a VPC while there are active AWS resources in the
VPC (such as an EC2 instance or RDS Database)
What is a Route Table?
A route table contains a set of rules, called routes, that are used to determine where
network traffic is directed
Route Table details you need to know:
(1) Unlike an IGW, you can have multiple “active” route tables in a VPC
(2) You cannot delete a route table if it has “dependancies” (associated subnets)
NACL
Network Access Control List
NACL Definition
A network access control list (NACL) is an optional layer of security for your VPC that acts
as a firewall for controlling traffic in and out of one or more subnets.
NACL Inbound / Outbound Rule Basics
(1) Rules are evaluated based on
“rule #” from lowest to highest
(2) The first rule evaluated that
applies to the traffic type gets immediately applied and executed regardless of the rules that come
after (have a higher “rule #”).
(3) Default: Everything is set to deny.
(4) Any new NACLs you create DENY all traffic by default.
(5) A subnet can only be associated with ONE NACL as a time.
(6) An NACL allows or denies traffic from entering a subnet. Once inside the subnet, other
AWS resources (i.e. EC2 instances) may have an additional layer of security (security
groups).
High Availability “Sounds” like
(1) “I can always access my data in the cloud”
(2) “My website never crashes and is always available to my customers”
Fault Tolerant “Sounds” like
(1) “One of my web servers failed, but my backup server immediately took over”
(2) “If something in my system fails, it can repair itself. ”
AZ (Acronym)
Availability Zone
What is an AZ?
Availability Zones are distinct locations that are engineered to be isolated from failures
in other Availability Zones. By launching instances in separate Availability Zones, you
can protect your applications from the failure of a single location. (Datacenters).
Describe AZ’s and VPCs
Any AWS resource that you launch (like EC2/RDS) must be placed in a VPC subnet. Any
given subnet must be located in an Availbility Zone. You can (and should) utilize multiple
Availabilty Zones to create redundacy in your architecture. This is what allows for High
Availabilty and Fault Toleratent systems.
ELB
Elastic Load Balancer