Prepared By ~ Sai
HelloCloud.io
Core Principles
● Humility
● Grit
● Deep Work
● Focus
● Consistency
VPC
gritworks-master (123456789012)
ap-southeast-1
VPC (172.31.0.0/16)
ap-southeast-1a ap-southeast-1b ap-southeast-1c
Public subnet
ap-southeast-1a
172.31.16.0/20
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1c
172.31.0.0/20
rtb (main)
172.31.0.0/16 local
0.0.0.0/0 igw
IGW (Internet Gateway)
Inbound internet access (TO INTERNET)
NACLs - Virtual Firewall for your subnets
Security Groups - Virtual Firewall for your instances
VPC (172.31.0.0/16)
ap-southeast-1a ap-southeast-1b ap-southeast-1c
Public subnet
ap-southeast-1a
172.31.16.0/20
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1c
172.31.0.0/20
rtb (main)
172.31.0.0/16 local
0.0.0.0/0 igw
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
secu-group (sg-e9f787a4) secu-group (sg-e9f787a4)
public-instance-1
172.31.18.102/20
18.136.120.52/32
public-instance-2
172.31.40.11/20
13.250.31.41/32
gritworks-master (123456789012)
ap-southeast-1
VPC (192.168.0.0/16)
ap-southeast-1a ap-southeast-1b ap-southeast-1c
Public subnet
ap-southeast-1a
192.168.0.0/24
Public subnet
ap-southeast-1b
192.168.1.0/24
Public subnet
ap-southeast-1c
192.168.2.0/24
192.168.0.0/16 local
0.0.0.0/0 igw
Private subnet
ap-southeast-1a
192.168.3.0/24
Private subnet
ap-southeast-1b
192.168.4.0/24
Private subnet
ap-southeast-1c
192.168.5.0/24
192.168.0.0/16 local
NACLs - STATELESS
Security Groups - STATEFUL
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Source
All traffic All All 0.0.0.0/0
TEST CASES
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Source
All traffic All All 0.0.0.0/0
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Source
All traffic All All 0.0.0.0/0
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Source
All traffic All All 0.0.0.0/0
public-instance-2
172.31.44.202/20
13.212.86.174/32
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Destination
All traffic All All 0.0.0.0/0
public-instance-2
172.31.44.202/20
13.212.86.174/32
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Source
All traffic All All 0.0.0.0/0
public-instance-2
172.31.44.202/20
13.212.86.174/32
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1a
172.31.16.0/20
Network ACLs (acl-489dea2e)
Inbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Inbound rules
Type Protocol Port range Source
All traffic All All sg-e9f787a4
All traffic All All YOUR IP
public-instance-1
172.31.27.135/20
18.136.120.52/32
Network ACLs (acl-489dea2e)
Outbound rules 100 All traffic All All 0.0.0.0/0 Allow
* All traffic All All 0.0.0.0/0 Deny
security-group (sg-e9f787a4)
Outbound rules
Type Protocol Port range Source
All traffic All All 0.0.0.0/0
public-instance-2
172.31.44.202/20
13.212.86.174/32
public-instance-21
172.31.35.37/20
13.212.87.209/32
NAT Gateways
Onbound internet access
VPC (172.31.0.0/16)
Public subnet
ap-southeast-1a
172.31.16.0/20
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1c
172.31.0.0/20
172.31.0.0/16 local
0.0.0.0/0 igw
Private subnet
ap-southeast-1a
172.31.48.0/20
Private subnet
ap-southeast-1b
172.31.64.0/20
Private subnet
ap-southeast-1c
172.31.80.0/20
172.31.0.0/16 local
0.0.0.0/0 natgw1
secu-group (sg-e9f787a4)
public-instance-1
172.31.18.48/20
13.229.133.196/32
pub-ip
priv-ip
secu-group (sg-e9f787a4)
private-instance-1
172.31.57.83/20
secu-group (sg-e9f787a4)
private-instance-2
172.31.69.115/20
secu-group (sg-e9f787a4)
private-instance-3
172.31.84.232/20
NAT Gateways
AZ Resilient (Not Region Resilient)
Release Elastic IP after deleting NAT Gateways
SSH Agent Forwarding
mycomputer hellocloud-master-sg.pem (PRIVATE KEY)
public-instance-1 hellocloud-master-sg.pem (PRIVATE KEY) hellocloud-master-sg
(Public-key)
private-instance-1 hellocloud-master-sg
(Public-key)
SSH agent forwarding
For Linux,
ssh-add -c hellocloud-master-sg.pem
For macOS,
ssh-add -K hellocloud-master-sg.pem
Connect to public instance using the -A option to enable SSH agent forwarding,
ssh -A ubuntu@public-instance-1
Connect to private instance from public instance,
ssh ubuntu@private-instance-1
Private NAT gateway traffic can't reach the internet.
AWS VPC by hellocloud.io
LAB
The failure of one NAT Gateway and the fail over to an
available NAT Gateway by the manual changing of the
default route next hop in respective private subnets
route table.
VPC (172.31.0.0/16)
Public subnet
ap-southeast-1a
172.31.16.0/20
Public subnet
ap-southeast-1b
172.31.32.0/20
Public subnet
ap-southeast-1c
172.31.0.0/20
172.31.0.0/16 local
0.0.0.0/0 igw
Private subnet
ap-southeast-1a
172.31.48.0/20
Private subnet
ap-southeast-1b
172.31.64.0/20
Private subnet
ap-southeast-1c
172.31.80.0/20
secu-group (sg-e9f787a4)
public-instance-1
172.31.18.102/20
18.136.120.52/32
nat-gw-1
pub-ip
priv-ip
secu-group (sg-e9f787a4)
private-instance-1
172.31.60.214/20
secu-group (sg-e9f787a4)
private-instance-2
172.31.69.115/20
secu-group (sg-e9f787a4)
private-instance-3
172.31.84.232/20
nat-gw-2
pub-ip
priv-ip
nat-gw-3
pub-ip
priv-ip
172.31.0.0/16 local
0.0.0.0/0 nat-gw-1
172.31.0.0/16 local
0.0.0.0/0 nat-gw-2
172.31.0.0/16 local
0.0.0.0/0 nat-gw-3
Elastic IP
public-instance-1 18.141.173.52 172.31.23.196 stop
3.0.90.6 172.31.23.196 start
Create new EIP 54.179.154.227
public-instance-1 54.179.154.227 172.31.23.196 Associate EIP
54.179.154.227 172.31.23.196 Stop and start the instance1
3.0.90.91 172.31.23.196 Disassociate EIP
public-instance-1 54.179.154.227 172.31.23.196 Associate IP with reassociation
enabled
EIP Reassociate to instance2
public-instance-2 54.179.154.227 172.31.42.37
public-instance-1 52.221.241.51 172.31.23.196
Workloads in Private Subnets may need:
● Internet Access (or)
● Databases or Apps that are on-premises.
Q & A

More Related Content

PDF
HelloCloud.io - Introduction to IaC & Terraform
PPTX
Amazon Virtual Private Cloud (VPC)
PPTX
AWS VPC & Networking basic concepts
PPTX
Introduction to AWS VPC, Guidelines, and Best Practices
PPTX
PDF
AWS Connectivity, VPC Design and Security Pro Tips
PDF
Pass PSE-Strata Exam With The Help Of Updated Questions.pdf
PPTX
AWS Advanced Networking: Transit Gateway
HelloCloud.io - Introduction to IaC & Terraform
Amazon Virtual Private Cloud (VPC)
AWS VPC & Networking basic concepts
Introduction to AWS VPC, Guidelines, and Best Practices
AWS Connectivity, VPC Design and Security Pro Tips
Pass PSE-Strata Exam With The Help Of Updated Questions.pdf
AWS Advanced Networking: Transit Gateway

What's hot (20)

PDF
Ansible
PDF
Veeam ONE v11a入門編の紹介
PDF
What is Docker Architecture | Edureka
PDF
Introduction to Segment Routing
PDF
AWS Summit Seoul 2023 | 천만 사용자를 위한 카카오의 AWS Native 글로벌 채팅 서비스
PDF
Red Hat Enterprise Linux 8
PDF
Palo alto outline course | Mostafa El Lathy
PDF
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
PDF
Palo Alto Networks CASB
PDF
Openstack Usecase(2018)
PDF
Introduction To Amazon Web Services | AWS Tutorial for Beginners | AWS Traini...
PPTX
OpenStack High Availability
PPTX
Introduction to OpenStack Cinder
PPTX
OpenStack Cinder
PDF
AWS CLIでAssumeRole
PDF
はじめての vSRX on AWS
PDF
Docker compose
PDF
Cloud Security: A New Perspective
PDF
AWS Black Belt Online Seminar Amazon EC2
PDF
20200826 AWS Black Belt Online Seminar AWS CloudFormation
Ansible
Veeam ONE v11a入門編の紹介
What is Docker Architecture | Edureka
Introduction to Segment Routing
AWS Summit Seoul 2023 | 천만 사용자를 위한 카카오의 AWS Native 글로벌 채팅 서비스
Red Hat Enterprise Linux 8
Palo alto outline course | Mostafa El Lathy
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
Palo Alto Networks CASB
Openstack Usecase(2018)
Introduction To Amazon Web Services | AWS Tutorial for Beginners | AWS Traini...
OpenStack High Availability
Introduction to OpenStack Cinder
OpenStack Cinder
AWS CLIでAssumeRole
はじめての vSRX on AWS
Docker compose
Cloud Security: A New Perspective
AWS Black Belt Online Seminar Amazon EC2
20200826 AWS Black Belt Online Seminar AWS CloudFormation
Ad

Similar to AWS VPC by hellocloud.io (20)

PPTX
ecs-networking-best-practices-diagrams.pptx
PDF
Module 2 - Networking on AWS -Animated.pdf
PPTX
AWS VPC Fundamentals- Webinar
PDF
Architecting Advanced Network Security Across VPCs with AWS Transit Gateway
PDF
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
PDF
Criando o seu datacenter virtual vpc e conectividade
DOCX
AWS | NAT Gateway Configuration
PDF
5 Not-to-Ignore Best Practices for AWS NACLs (Network Access Control Lists)
PPTX
Networking in the cloud
PDF
보안을 위한 AWS Network 구성 - 우수연 (AUSG) :: AWS Community Day Online 2021
PDF
20191016 AWS Black Belt Online Seminar Amazon Route 53 Resolver
DOCX
AWS virtual private clould
PDF
AWS BaseCamp: AWS Architecture Fundamentals
PPTX
AWS Virtual Private Cloud (VPC) in nutshell
PDF
Cloud Monitors Cloud
PDF
Aws Architecture Fundamentals | Dallas
PDF
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
PPTX
CON410 - Deep Dive into Container Networking (re:Invent 2018)
PDF
VPC Hands-on
ecs-networking-best-practices-diagrams.pptx
Module 2 - Networking on AWS -Animated.pdf
AWS VPC Fundamentals- Webinar
Architecting Advanced Network Security Across VPCs with AWS Transit Gateway
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWS
Criando o seu datacenter virtual vpc e conectividade
AWS | NAT Gateway Configuration
5 Not-to-Ignore Best Practices for AWS NACLs (Network Access Control Lists)
Networking in the cloud
보안을 위한 AWS Network 구성 - 우수연 (AUSG) :: AWS Community Day Online 2021
20191016 AWS Black Belt Online Seminar Amazon Route 53 Resolver
AWS virtual private clould
AWS BaseCamp: AWS Architecture Fundamentals
AWS Virtual Private Cloud (VPC) in nutshell
Cloud Monitors Cloud
Aws Architecture Fundamentals | Dallas
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
CON410 - Deep Dive into Container Networking (re:Invent 2018)
VPC Hands-on
Ad

Recently uploaded (20)

PPTX
Micro1New.ppt.pptx the mai themes of micfrobiology
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
DOCX
An investigation of the use of recycled crumb rubber as a partial replacement...
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PPTX
Micro1New.ppt.pptx the main themes if micro
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPTX
Chapter-8 Introduction to Quality Standards.pptx
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PDF
electrical machines course file-anna university
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPT
Programmable Logic Controller PLC and Industrial Automation
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Micro 4 New.ppt.pdf a servay of cells and microorganism
Micro1New.ppt.pptx the mai themes of micfrobiology
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
An investigation of the use of recycled crumb rubber as a partial replacement...
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
Micro1New.ppt.pptx the main themes if micro
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
Chapter-8 Introduction to Quality Standards.pptx
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
Software-Development-Life-Cycle-SDLC.pptx
electrical machines course file-anna university
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Programmable Logic Controller PLC and Industrial Automation
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
Environmental studies, Moudle 3-Environmental Pollution.pptx
Micro 4 New.ppt.pdf a servay of cells and microorganism

AWS VPC by hellocloud.io

  • 1. Prepared By ~ Sai HelloCloud.io
  • 2. Core Principles ● Humility ● Grit ● Deep Work ● Focus ● Consistency
  • 3. VPC
  • 4. gritworks-master (123456789012) ap-southeast-1 VPC (172.31.0.0/16) ap-southeast-1a ap-southeast-1b ap-southeast-1c Public subnet ap-southeast-1a 172.31.16.0/20 Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1c 172.31.0.0/20 rtb (main) 172.31.0.0/16 local 0.0.0.0/0 igw
  • 5. IGW (Internet Gateway) Inbound internet access (TO INTERNET)
  • 6. NACLs - Virtual Firewall for your subnets Security Groups - Virtual Firewall for your instances
  • 7. VPC (172.31.0.0/16) ap-southeast-1a ap-southeast-1b ap-southeast-1c Public subnet ap-southeast-1a 172.31.16.0/20 Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1c 172.31.0.0/20 rtb (main) 172.31.0.0/16 local 0.0.0.0/0 igw Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny secu-group (sg-e9f787a4) secu-group (sg-e9f787a4) public-instance-1 172.31.18.102/20 18.136.120.52/32 public-instance-2 172.31.40.11/20 13.250.31.41/32
  • 8. gritworks-master (123456789012) ap-southeast-1 VPC (192.168.0.0/16) ap-southeast-1a ap-southeast-1b ap-southeast-1c Public subnet ap-southeast-1a 192.168.0.0/24 Public subnet ap-southeast-1b 192.168.1.0/24 Public subnet ap-southeast-1c 192.168.2.0/24 192.168.0.0/16 local 0.0.0.0/0 igw Private subnet ap-southeast-1a 192.168.3.0/24 Private subnet ap-southeast-1b 192.168.4.0/24 Private subnet ap-southeast-1c 192.168.5.0/24 192.168.0.0/16 local
  • 9. NACLs - STATELESS Security Groups - STATEFUL
  • 10. Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Source All traffic All All 0.0.0.0/0
  • 12. Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Source All traffic All All 0.0.0.0/0
  • 13. Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Source All traffic All All 0.0.0.0/0
  • 14. Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Source All traffic All All 0.0.0.0/0 public-instance-2 172.31.44.202/20 13.212.86.174/32 Public subnet ap-southeast-1b 172.31.32.0/20
  • 15. Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Destination All traffic All All 0.0.0.0/0 public-instance-2 172.31.44.202/20 13.212.86.174/32
  • 16. Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Source All traffic All All 0.0.0.0/0 public-instance-2 172.31.44.202/20 13.212.86.174/32
  • 17. Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1a 172.31.16.0/20 Network ACLs (acl-489dea2e) Inbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Inbound rules Type Protocol Port range Source All traffic All All sg-e9f787a4 All traffic All All YOUR IP public-instance-1 172.31.27.135/20 18.136.120.52/32 Network ACLs (acl-489dea2e) Outbound rules 100 All traffic All All 0.0.0.0/0 Allow * All traffic All All 0.0.0.0/0 Deny security-group (sg-e9f787a4) Outbound rules Type Protocol Port range Source All traffic All All 0.0.0.0/0 public-instance-2 172.31.44.202/20 13.212.86.174/32 public-instance-21 172.31.35.37/20 13.212.87.209/32
  • 19. VPC (172.31.0.0/16) Public subnet ap-southeast-1a 172.31.16.0/20 Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1c 172.31.0.0/20 172.31.0.0/16 local 0.0.0.0/0 igw Private subnet ap-southeast-1a 172.31.48.0/20 Private subnet ap-southeast-1b 172.31.64.0/20 Private subnet ap-southeast-1c 172.31.80.0/20 172.31.0.0/16 local 0.0.0.0/0 natgw1 secu-group (sg-e9f787a4) public-instance-1 172.31.18.48/20 13.229.133.196/32 pub-ip priv-ip secu-group (sg-e9f787a4) private-instance-1 172.31.57.83/20 secu-group (sg-e9f787a4) private-instance-2 172.31.69.115/20 secu-group (sg-e9f787a4) private-instance-3 172.31.84.232/20
  • 20. NAT Gateways AZ Resilient (Not Region Resilient)
  • 21. Release Elastic IP after deleting NAT Gateways
  • 23. mycomputer hellocloud-master-sg.pem (PRIVATE KEY) public-instance-1 hellocloud-master-sg.pem (PRIVATE KEY) hellocloud-master-sg (Public-key) private-instance-1 hellocloud-master-sg (Public-key)
  • 24. SSH agent forwarding For Linux, ssh-add -c hellocloud-master-sg.pem For macOS, ssh-add -K hellocloud-master-sg.pem Connect to public instance using the -A option to enable SSH agent forwarding, ssh -A ubuntu@public-instance-1 Connect to private instance from public instance, ssh ubuntu@private-instance-1
  • 25. Private NAT gateway traffic can't reach the internet.
  • 27. LAB
  • 28. The failure of one NAT Gateway and the fail over to an available NAT Gateway by the manual changing of the default route next hop in respective private subnets route table.
  • 29. VPC (172.31.0.0/16) Public subnet ap-southeast-1a 172.31.16.0/20 Public subnet ap-southeast-1b 172.31.32.0/20 Public subnet ap-southeast-1c 172.31.0.0/20 172.31.0.0/16 local 0.0.0.0/0 igw Private subnet ap-southeast-1a 172.31.48.0/20 Private subnet ap-southeast-1b 172.31.64.0/20 Private subnet ap-southeast-1c 172.31.80.0/20 secu-group (sg-e9f787a4) public-instance-1 172.31.18.102/20 18.136.120.52/32 nat-gw-1 pub-ip priv-ip secu-group (sg-e9f787a4) private-instance-1 172.31.60.214/20 secu-group (sg-e9f787a4) private-instance-2 172.31.69.115/20 secu-group (sg-e9f787a4) private-instance-3 172.31.84.232/20 nat-gw-2 pub-ip priv-ip nat-gw-3 pub-ip priv-ip 172.31.0.0/16 local 0.0.0.0/0 nat-gw-1 172.31.0.0/16 local 0.0.0.0/0 nat-gw-2 172.31.0.0/16 local 0.0.0.0/0 nat-gw-3
  • 31. public-instance-1 18.141.173.52 172.31.23.196 stop 3.0.90.6 172.31.23.196 start Create new EIP 54.179.154.227 public-instance-1 54.179.154.227 172.31.23.196 Associate EIP 54.179.154.227 172.31.23.196 Stop and start the instance1 3.0.90.91 172.31.23.196 Disassociate EIP public-instance-1 54.179.154.227 172.31.23.196 Associate IP with reassociation enabled EIP Reassociate to instance2 public-instance-2 54.179.154.227 172.31.42.37 public-instance-1 52.221.241.51 172.31.23.196
  • 32. Workloads in Private Subnets may need: ● Internet Access (or) ● Databases or Apps that are on-premises.
  • 33. Q & A