Table of contents
No headings in the article.
VPC (Virtual Private Cloud):
A VPC is a secure, isolated network segment hosted within AWS.
It isolates computing resources within the cloud and acts as a network boundary.
Provides full control over networking, including subnetting, routing, firewalls, and gateways.
Specific to a single region.
Utilizes a CIDR block, which is a range of IP addresses that resources in the VPC can use.
Subnets:
Subnets are groups of IP addresses within your VPC.
They reside within a single availability zone.
The IP address range must be within the parent VPC's CIDR block.
Subnets can be public or private, determining external access to resources.
Gateways:
An Internet gateway allows subnets in a VPC to communicate with the internet.
NAT gateways provide internet access for resources, with connections initiated from within the VPC.
Virtual private gateways enable secure access to private resources over the internet.
Direct Connect (DX) offers a direct connection to an AWS region, providing low latency and high speeds.
Default Networking:
Each region has a Default VPC with default subnets, security groups, and Network ACLs (NACLs).
The CIDR block for the Default VPC is 172.31.0.0/16.
One default subnet exists in each Availability Zone (AZ).
Default VPCs and subnets have outbound internet access by default.
Security groups allow outbound traffic, and NACLs are open in both directions.
Default subnets have access to an Internet Gateway for connectivity.
Firewalls:
Stateless firewalls require explicit permission for inbound and outbound traffic.
Stateful firewalls track requests and automatically allow responses.
Network ACLs (NACLs) filter traffic entering and leaving a subnet and are stateless.
Security groups act as firewalls for individual resources like EC2 instances and are stateful.
Thankyou for reading !!!!!!