Introduction to Cloud Computing - IV
Introduction to Cloud Computing - IV
Subnet Subnet
1 2
Rout
er
Contd.
192 . 0 . 2 . 0
Tells you
how
many
11000000 00000000 00000010 00000000 bits are
to 11111111 fixed
VPC
Subnet 1 Subnet 2
(10.0.0.0/24) (10.0.2.0/24)
251 IP 251 IP
addresses addresses
Subnet 4 Subnet 3
(10.0.1.0/24) (10.0.3.0/24)
251 IP 251 IP
addresses addresses
IP Addresses for
CIDR block Reserved for
10.0.0.0/24
Network broadcast
10.0.0.255
address
Public IP address types
Public IPv4 address Elastic IP address
• This addresses are • Associated with an
manually assigned
AWS account
through an Elastic IP
address • Can be allocated
• Automatically and remapped
assigned through the anytime
auto-assign public IP • Additional costs
address settings at
the subnet level might apply
Elastic network interface
• An elastic network interface is a virtual network interface that
you can:
• Attach to an instance.
• Detach from the instance, and attach to another instance to redirect
network traffic.
• Its attributes follow when it is reattached to a new instance.
• Each instance in your VPC has a default network interface that
is assigned a private IPv4 address from the IPv4 address range
of your VPC.
Subnet: 10.0.1.0/24
Outbound
Destination Protocol Port Range Description
0.0.0.0/0 All All Allow all outbound IPv4 traffic.
• You can specify the source, port range, and protocol for
each inbound rule. You can specify the destination, port
range, and protocol for each outbound rule.
Security Groups
• Here a VPC with a subnet, an internet gateway, and a
security group.
• The subnet contains an EC2 instance. The security group
is assigned to the instance. The security group acts as a
virtual firewall. The only traffic that reaches the instance is
the traffic allowed by the security group rules.
Outbound
Destination Proto Port Description
col Range
The ID of the security group TCP 1433 Allow outbound Microsoft SQL Server
for your Microsoft SQL Server access to instances in the specified
database servers security group
Custom network ACLs examples
• Custom network ACLs deny all inbound and outbound traffic
until you add rules.
• You can specify both allow and deny rules.
• Rules are evaluated in number order, starting with the lowest
number.
Inbound
Rule Type Protocol Port Range Source Allow/Deny
100 HTTPS TCP 443 0.0.0.0/0 ALLOW
120 SSH TCP 22 192.0.2.0/24 ALLOW
* All IPv4 traffic All All 0.0.0.0/0 DENY
Outbound
Rule Type Protocol Port Range Destination Allow/Deny
100 HTTPS TCP 443 0.0.0.0/0 ALLOW
120 SSH TCP 22 192.0.2.0/24 ALLOW
* All IPv4 All All 0.0.0.0/0 DENY
traffic
Security groups do not filter traffic destined to
and from the following:
Supported
Allow rules only Allow and deny rules
Rules
Stateful (return traffic is
Stateless (return traffic must
State automatically allowed,
be explicitly allowed by rules)
regardless of rules)
All rules are evaluated Rules are evaluated in
Order of
before decision to allow number order before decision
Rules
traffic to allow traffic
VPC peering
You can connect VPCs
in your own AWS
account, between AWS
accounts, or between
AWS Regions.
Restrictions:
• IP spaces cannot
overlap.
• Transitive peering is
not supported.
• You can only have
one peering
resource between
the same two VPCs.
VPC peering
• Instances in either VPC can communicate with each
other as if they are within the same network.
• You can create a VPC peering connection between your
own VPCs, or with a VPC in another AWS account.
• The VPCs can be in different Regions (also known as an
inter-Region VPC peering connection).
• A VPC peering connection helps you to facilitate the
transfer of data.
• For example, if you have more than one AWS account,
you can peer the VPCs across those accounts to create a
file sharing network.
• You can also use a VPC peering connection to allow
other VPCs to access resources you have in one of your
VPCs.
VPC peering
• When you establish peering relationships between VPCs
across different AWS Regions, resources in the VPCs in
different AWS Regions can communicate with each other
using private IP addresses, without using a gateway,
VPN connection, or network appliance.
Region
Availability Zone Intern
et
VPC: 10.0.0.0/16
Public
subnet:10.1.0.0/24
802.1
q AWS
VLA Direct
Connect
Private subnet: Rout Virtual N
10.0.2.0/24 e Customer
gatew
tabl gateway
ay
e
Corporate data
center:
192.168.10.0/24
AWS Direct Connect
The VLANs are configured using virtual interfaces (VIFs), and you
can configure three different types of VIFs:
Client access
Step 2
Now, the DNS routes the client request to the nearest edge
location through CloudFront to serve the user request.
Share File
Step 6:
As soon CloudFront receives the file, it shares it with the client and
adds the file to the edge location.