1. AWS Network Overview

AWS operates one of the largest private fiber-optic backbones in the world. This backbone connects Data Centers, groups them into Availability Zones (AZs), and links multiple AZs to form a Region. From there, AWS extends outwards through Points of Presence (PoPs), which connect to the public internet or provide private connectivity via Direct Connect.

  1. Data Centers, AZs, and Regions
    • Data Centers are the physical foundation.
    • A group of data centers = an Availability Zone (AZ).
    • Several AZs = a Region, interconnected by the AWS backbone for low-latency, fault-tolerant networking.
  2. Points of Presence (PoPs)
    • AWS racks hosted inside third-party colocation sites (e.g., Equinix, Digital Realty).
    • Link the AWS backbone to local ISPs and IXPs.
    • Run edge services such as CloudFront (CDN caching) and Global Accelerator (traffic optimization).
  3. Public Internet Connectivity
    • PoPs handle AWS traffic in and out of the public internet.
    • Customers reach AWS services through public endpoints (e.g., S3, EC2 APIs).
  4. Direct Connect (DX)
    • A dedicated private link that bypasses the internet.
    • Provisioned at a PoP, giving you a physical port on AWS gear.
    • Delivers lower latency, higher reliability, and consistent bandwidth for hybrid cloud workloads.
AWS Network Overview
🌐 AWS Network Overview

2. Service Categories

2.1 Internet Connectivity (Ingress & Egress)

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
Internet Gateway (IGW) Enables VPC to access the internet. L3 – Network Public Subnet Internet • One IGW per VPC
• No filtering (not a firewall)
Free
NAT Gateway Allows private subnets to reach the internet. L3 – Network Private Subnet IGW / Internet • Outbound-only (no inbound)
• Not HA by default (deploy per AZ)
Hourly charge + per GB data processing
Virtual Private Gateway (VGW) AWS VPN tunnel endpoint for Site-to-Site VPN. L3 – Network On-prem VPN device (CGW) VPC Route Tables • One VGW per VPC
• Max ~1.25 Gbps per tunnel
• Cannot connect multiple VPCs directly
Hourly VPN + data transfer
Customer Gateway (CGW) Customer-managed device establishing VPN tunnels to AWS. L3 – Network On-prem Router/Firewall VGW / TGW • Managed by customer
• HA depends on design
N/A (customer hardware cost)
Transit Gateway (TGW) Central router between VPCs, VPNs, and Direct Connect. L3 – Network VPCs / VPN / DX VPCs / VPN / DX • One RT per attachment
• Propagation optional
• Default full mesh
• TGW Peering static routes only
Per attachment + per GB data processed
Direct Connect (DX) Dedicated physical link to AWS, bypassing Internet. L1 – Physical On-prem Router/Switch VPC via TGW / VGW • Provisioning time weeks
• No encryption by default
• HA requires multiple DX
Per port-hour + data transfer (lower than internet egress)

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
VPC Peering Connects two VPCs privately. L2 (abstracted) VPC A VPC B • No transitive routing
• Cannot use overlapping CIDRs
Data transfer per GB (intra-Region cheaper, inter-Region higher)
Gateway Endpoints Route table entry to access S3/DynamoDB via AWS backbone. L3 – Network VPC Subnet S3 / DynamoDB Only supports S3 and DynamoDB
• One per route table
• Supports VPC endpoint policies
Free
Interface Endpoints (PrivateLink) ENI-based private access to other AWS services or partner services. L3 / L4 VPC Subnet / ENI AWS Service ENI Does NOT support S3/DynamoDB (use Gateway instead)
• One per AZ for HA
• Private DNS overrides service DNS
• Supports VPC endpoint policies
Hourly ENI cost + per GB data processed
Route 53 Resolver (.2) Built-in VPC DNS resolver (`.2` address in every subnet) for public zones and associated private zones. L3 – Network EC2 / Lambda / ENI Internal DNS targets (via `.2`) • VPC-only (not accessible from on-prem)
• No customization
• Hybrid DNS requires endpoints
Free (included with VPC)
Route 53 Resolver Endpoints Extend DNS resolution across hybrid networks:
Inbound – On-prem → VPC resolver
Outbound – VPC → on-prem DNS
L3 – Network On-prem DNS or VPC resources Route 53 Resolver / On-prem DNS • Requires ENIs in subnets
• One per AZ for HA
• Adds query latency vs. .2
• Query-based limits
Hourly ENI cost + query-based pricing

2.2 Load Balancing and Traffic Distribution

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
ALB (Application Load Balancer) Routes HTTP/HTTPS traffic. L7 / L4 Internet / CloudFront EC2 / Lambda / IPs • HTTP/HTTPS only
• No static IPs (unless behind GA)
Hourly + per LCU + data processed
NLB (Network Load Balancer) Balances TCP/UDP traffic. L4 – Transport Internet / Internal VPC EC2 / IPs • No advanced routing (L7)
• Health checks limited
Hourly + per LCU + data processed
Gateway Load Balancer (GWLB) Sends traffic to firewalls/appliances. L3 / L4 IGW / NLB Security Appliance • Appliances must support GENEVE
• Adds latency
Hourly + per LCU + data processed
Global Accelerator Routes global traffic via Anycast IPs. L4 – Transport End User NLB / ALB / IPs • Not a CDN
• No caching
Per accelerator-hour + data transfer

2.3 Security and Access Control

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
WAF Filters HTTP/HTTPS requests. L7 – Application CloudFront / ALB ALB / API Gateway • L7 only
• Rule limits apply
Per WCU (rule capacity unit) + requests
AWS Shield / Advanced DDoS protection for infra/apps. L3–L7 Internet / Edge VPC Entry Points • Shield Standard auto, Advanced = $$ Shield Std free, Advanced fixed monthly fee
ACM Manages SSL/TLS certificates. L6 – Presentation N/A (integrated) CloudFront / ALB / API GW • Only ACM-issued certs auto-renew Free for ACM-managed certs
Security Groups / NACLs Allow/deny traffic at instance/subnet. L3 / L4 Client / Peer Service EC2 / ENI / Subnet • SG stateful, NACL stateless
• NACL rules limit
Free

2.4 Edge Services and DNS

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
CloudFront Distributes and caches content globally at PoP. L7 – Application End Users ALB / S3 / API GW • Cache invalidation costs
• Regional edge cache not everywhere
Per request + data transfer out
Route 53 DNS resolution with routing policies. L7 – Application End Users IP / ALB / CloudFront • Query costs
• Geo/latency policies add cost
Per hosted zone + per query

2.5 API and Microservice Communication

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
API Gateway Expose/manage REST/HTTP/WebSocket APIs. L7 – Application Client / CloudFront Lambda / Service Backend • Payload size limits
• Latency higher than ALB
Per million requests + data processed
App Mesh Controls service-to-service traffic in a mesh. L7 – Application Microservice A Microservice B • Envoy sidecar overhead
• Complexity
Per Envoy proxy-hour

2.6 Core Networking Components

Component Purpose OSI Layer Upstream Downstream Limitations Pricing
VPC Isolated virtual network with subnets and routing. L3 – Network Internet / VPN Subnets • Max 5,000 subnets
• CIDR block limits
Free
Elastic Network Interface (ENI) Virtual NIC attached to resources. L2 – Data Link Subnet / VPC EC2 / Lambda • Limited ENIs per instance type Free (included in instance cost)

3. VPN

Note VPN builds on top of IPSec, for details on how IPSec works, see 3.4 Layer 3 & 5–6 - IPsec

3.1 Site-to-Site VPN

S2S VPN Example
🔐 Site-to-Site VPN – Communication Sequence

3.1.1 Connectivity Types

Keep in mind, VPN connections traverse the public Internet before reaching AWS’s network. Because of this, the routing path and how routes are exchanged are critical.

3.1.2 Deployment Workflow

3.1.3 Operational Considerations


3.2 Client VPN

AWS Client VPN is a fully managed OpenVPN-based service that allows individual users (laptops, developers, admins, remote workers) to securely connect to AWS resources and on-premises networks.

3.2.1 Connection Sequence

Client VPN Example
🔐 Client VPN – Authentication & Connection Flow

4. Route Tables


5. Direct Connect

AWS Direct Connect (DX) provides a dedicated, private network connection between your on-premises environment and AWS. Unlike VPN (which traverses the Internet), DX offers consistent latency, predictable bandwidth, and enterprise-grade reliability.

5.1 Direct Connect Physical Architecture

5.2 MACsec Security Layer

DX traffic is not encrypted by default. MACsec secures the physical hop between your router and AWS’s DX router at the PoP.

5.3 Direct Connect Provisioning Workflow

  1. LOA-CFA (Letter of Authorization – Connecting Facility Assignment)
    • AWS allocates a port inside their cage at the DX location (PoP).
    • You receive LOA-CFA to hand to your provider or colo staff.
  2. Physical Cross-Connect
    • Fiber is patched between your cage/router and the AWS DX router at the PoP.
    • Ports are set with matching speed/duplex.

5.4 Direct Connect Virtual Interfaces

DX is a Layer 2 link. To run multiple logical networks, DX uses 802.1Q VLANs, each mapping to a Virtual Interface (VIF) on the AWS side.

Types of VIFs:

  1. Private VIF
    • Connects to VGW (1 VPC) or TGW (multiple VPCs).
    • Used for private VPC IP ranges.
    • Region-specific (per DX location).
    • 1 VIF = 1 VGW = 1 VPC (unless TGW is used).
    • No built-in encryption.
  2. Public VIF
    • Connects to AWS public endpoints (e.g., S3, DynamoDB, STS).
    • AWS advertises all public IP prefixes; you advertise your public IPs.
    • Global scope (all AWS regions).
    • Not transitive: your prefixes are not re-shared by AWS.
    • Can combine with VPN for DX + VPN (low latency + encryption).
  3. Transit VIF
    • Connects via DX Gateway (DXGW) → TGW.
    • Scales to multiple VPCs across accounts/regions.
    • Requires BGP.
    • Enterprise-scale hub-and-spoke hybrid connectivity.

5.5 Direct Connect Gateway

5.6 Operational Considerations

5.7 Connection Sequence

Direct Connect Flow
🔌 Direct Connect – Physical + VIF Sequence

6. Domain Name System (DNS)

DNS (Domain Name System) resolves human-readable domain names (e.g., example.com) into IP addresses or service endpoints. In AWS, Route 53 provides DNS hosting, routing policies, and integration with AWS resources (via Alias records).

👉 Important distinction:

6.1 Common DNS Record Types

Record Type Purpose Example
A Maps domain → IPv4 address example.com. IN A 192.0.2.1
AAAA Maps domain → IPv6 address example.com. IN AAAA 2001:db8::1
CNAME Alias to another domain (not IP) www.example.com. IN CNAME example.globalcdn.com.
Alias AWS-only alias to ELB, CloudFront, S3, etc. Works at root domain. example.com. IN A Alias abc123.cloudfront.net
MX Mail routing example.com. IN MX 10 mail1.google.com.
TXT Metadata (SPF, DKIM, domain verification) example.com. IN TXT "v=spf1 include:_spf.google.com ~all"
NS Authoritative nameservers for zone example.com. IN NS ns1.dnsprovider.com.
SOA Zone info (serial, refresh, retry) example.com. IN SOA ns1 hostmaster 2025010101 3600 1800 1209600 86400
PTR Reverse DNS (IP → domain) 1.2.0.192.in-addr.arpa. IN PTR example.com.
CAA Restricts which CAs can issue certificates example.com. IN CAA 0 issue "letsencrypt.org"
SRV Service-specific record (e.g., SIP, LDAP) _sip._tcp.example.com. IN SRV 10 60 5060 sipserver.example.com.

6.2 Apex (Naked) Domains

6.3 Route 53 Routing Policies

Routing Policy Purpose Example
Simple Single record → single resource example.com → 192.0.2.1
Weighted Split traffic by % between resources 80% → server1, 20% → server2
Latency Route to lowest-latency region US users → us-east-1, EU users → eu-west-1
Failover Primary resource + backup on failure Main site → backup site
Geolocation Route by user’s country/region US → 192.0.2.1, UK → 192.0.2.2
Geoproximity Route by distance + optional bias East Coast users → NJ DC, West Coast → CA DC
Multi-Value Return multiple IPs for LB/HA example.com → 192.0.2 .1, 192.0.2.2
IP-based Route by client IP blocks Corp IP range → private endpoint

6.4 DNS Resolution Flow

  1. You create a Hosted Zone in Route 53 for your domain (example.com).
  2. Route 53 assigns 4 authoritative name servers (NS records) for the domain.
  3. You add DNS records (A, CNAME, MX, TXT, etc.) inside the hosted zone.
  4. When a client queries example.com, the DNS resolver follows the chain:
    • Root → TLD → Route 53 authoritative NS (Amazon-managed).
  5. Route 53 authoritative servers return the DNS record (e.g., A record with an IP).
  6. Resolver caches and returns result to user → user connects to the target resource.
DNS Resolution Flow
🌐 DNS Resolution – Query to Answer

6.5 DNSSEC Overview

DNSSEC (Domain Name System Security Extensions) adds a security layer to DNS. Normal DNS just maps names → IPs, but DNSSEC ensures responses are authentic and untampered by digitally signing DNS records.

🔑 Why we need DNSSEC: Without it, DNS is vulnerable to cache poisoning, spoofing, and MITM attacks.
DNSSEC prevents this by providing a cryptographic chain of trust from the RootTLDAuthoritative server.
⚠️ Note: DNSSEC does not encrypt traffic (unlike HTTPS). It only guarantees authenticity + integrity, not confidentiality.

6.5.1 Key Concepts

6.5.2 Roles and Responsibilities

6.5.3 DNSSEC Resolution Flow

DNSSEC Resolution Flow
🔐 DNSSEC Resolution – Validating DNS records with chain of trust

6.6 Route 53 Resolver and Endpoints

By default, every VPC has an Amazon-managed DNS resolver at the reserved IP VPC-CIDR+.2 (e.g., 10.0.0.2).

👉 Limitation: The default .2 resolver only works inside the VPC. It cannot be queried from on-premises networks or other VPCs directly.

To integrate DNS across hybrid or multi-VPC environments, AWS provides Route 53 Resolver Endpoints:

These endpoints solve the DNS boundary problem where VPC and on-prem DNS could not previously resolve each other.

Route 53 Resolver Endpoints Flow
🔄 Route 53 Resolver – Inbound & Outbound Endpoint Flow

7. IPv6 in AWS

AWS VPCs support dual-stack networking (IPv4 + IPv6). Unlike IPv4, IPv6 is globally unique and publicly routable, which removes the need for NAT but requires careful access control.

7.1 Key Points

7.2 Considerations

Takeaway:
IPv6 in AWS = globally routable addresses, no NAT, /56 per VPC, /64 per subnet, explicit routing, and egress-only IGW for outbound-only control.

Contents