VPC Flashcards
By default, how many VPCs are allowed in each region?
5
What is the largest VPC CIDR allowed in AWS?
/16
What are the private IP classes/ranges?
10/8
- 32/12
- 168/16
Reference: CIDR.xyz
How traffic can enter the VPC?
Internet Gateway and Virtual Private Gateway
How the default VPC is designed?
Each instance has both public and private IPs
All subnets have a route out to the internet
VPC Peering
Connect one VPC with any other VPC using private IP addresses;
Peering is a start configuration: i.e. 1 central VPC peers with 4 others (no transitive/intercept peering)
You can peer between regions
What resources are automatically created when a new VPC is provisioned?
The MAIN Router Table (designed to be the private subnet), NACL, Security Group
When launching a 10.0.0.0/24 subnet, only 251 IPs are available. Why?
The first four IPs and the last one are reserved:
- 0.0.0-Network address
- 0.0.1-VPC router
- 0.0.2-DNS Server
- 0.0.3-Reserved for future use
- 0.0.255-Reserved for Broadcast, but no supported
Explain NAT Gateway VS NAT Instance
NAT Gateway is a highly available managed service inside THE Availability Zone, so it is recommended to create one NAT Gateway per AZ. While NAT instance is an EC2 (with NAT community AMI) what you configure according to your needs. Also, the route table needs to be complemented to forward 0.0.0.0/0 traffic to the NAT Instance ENI
What is need to disable on a newly created NAT instance?
Source/Destination Check
What are the default rules for a created NACL?
Both inbound and outbound traffic are denied from/to everywhere
What is an ephemeral port?
It is a short-lived port dynamically assigned. A NAT Gateway uses the ports 1024-65535
Why the NACL rules matter?
The lower the number, the higher the priority. If something needs to be denied, it needs to come first.
What is VPC Flow log and what it can monitor?
VPC Flow log monitors the accepted or failed traffic of the VPC/Subnet/NIC and sends the logs to either S3 or CloudWatch Logs
What is a bastion host?
It is a hardened host either on the outside of the firewall or in a DMZ