1. AWS Network Overview

AWS operates one of the largest private fiber-optic backbones in the world. This backbone connects Data Centers, groups them into Availability Zones (AZs), and links multiple AZs to form a Region. From there, AWS extends outwards through Points of Presence (PoPs), which connect to the public internet or provide private connectivity via Direct Connect.

  1. Data Centers, AZs, and Regions
    • Data Centers are the physical foundation.
    • A group of data centers = an Availability Zone (AZ).
    • Several AZs = a Region, interconnected by the AWS backbone for low-latency, fault-tolerant networking.
  2. Points of Presence (PoPs)
    • AWS racks hosted inside third-party colocation sites (e.g., Equinix, Digital Realty).
    • Link the AWS backbone to local ISPs and IXPs.
    • Run edge services such as CloudFront (CDN caching) and Global Accelerator (traffic optimization).
  3. Public Internet Connectivity
    • PoPs handle AWS traffic in and out of the public internet.
    • Customers reach AWS services through public endpoints (e.g., S3, EC2 APIs).
  4. Direct Connect (DX)
    • A dedicated private link that bypasses the internet.
    • Provisioned at a PoP, giving you a physical port on AWS gear.
    • Delivers lower latency, higher reliability, and consistent bandwidth for hybrid cloud workloads.
AWS Network Overview
🌐 AWS Network Overview

2. Service Categories

2.1 Internet Connectivity (Ingress & Egress)

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
Internet Gateway (IGW) Enables VPC to access the internet. L3 – Network Public Subnet Internet • One IGW per VPC
• No filtering (not a firewall)
Free
NAT Gateway Allows private subnets to reach the internet. L3 – Network Private Subnet IGW / Internet • Outbound-only (no inbound)
• Not HA by default (deploy per AZ)
Hourly charge + per GB data processing
Virtual Private Gateway (VGW) AWS VPN tunnel endpoint for Site-to-Site VPN. L3 – Network On-prem VPN device (CGW) VPC Route Tables • One VGW per VPC
• Max ~1.25 Gbps per tunnel
• Cannot connect multiple VPCs directly
Hourly VPN + data transfer
Customer Gateway (CGW) Customer-managed device establishing VPN tunnels to AWS. L3 – Network On-prem Router/Firewall VGW / TGW • Managed by customer
• HA depends on design
N/A (customer hardware cost)
Transit Gateway (TGW) Central router between VPCs, VPNs, and Direct Connect. L3 – Network VPCs / VPN / DX VPCs / VPN / DX • One RT per attachment
• Propagation optional
• Default full mesh
• TGW Peering static routes only
Per attachment + per GB data processed
Direct Connect (DX) Dedicated physical link to AWS, bypassing Internet. L1 – Physical On-prem Router/Switch VPC via TGW / VGW • Provisioning time weeks
• No encryption by default
• HA requires multiple DX
Per port-hour + data transfer (lower than internet egress)

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
VPC Peering Connects two VPCs privately. L2 (abstracted) VPC A VPC B • No transitive routing
• Cannot use overlapping CIDRs
Data transfer per GB (intra-Region cheaper, inter-Region higher)
Gateway Endpoints Route table entry to access S3/DynamoDB via AWS backbone. L3 – Network VPC Subnet S3 / DynamoDB Only supports S3 and DynamoDB
• One per route table
• Supports VPC endpoint policies
Free
Interface Endpoints (PrivateLink) ENI-based private access to other AWS services or partner services. L3 / L4 VPC Subnet / ENI AWS Service ENI Does NOT support S3/DynamoDB (use Gateway instead)
• One per AZ for HA
• Private DNS overrides service DNS
• Supports VPC endpoint policies
Hourly ENI cost + per GB data processed
Route 53 Resolver (.2) Built-in VPC DNS resolver (`.2` address in every subnet) for public zones and associated private zones. L3 – Network EC2 / Lambda / ENI Internal DNS targets (via `.2`) • VPC-only (not accessible from on-prem)
• No customization
• Hybrid DNS requires endpoints
Free (included with VPC)
Route 53 Resolver Endpoints Extend DNS resolution across hybrid networks:
Inbound – On-prem → VPC resolver
Outbound – VPC → on-prem DNS
L3 – Network On-prem DNS or VPC resources Route 53 Resolver / On-prem DNS • Requires ENIs in subnets
• One per AZ for HA
• Adds query latency vs. .2
• Query-based limits
Hourly ENI cost + query-based pricing

2.2 Load Balancing and Traffic Distribution

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
ALB (Application Load Balancer) Routes HTTP/HTTPS traffic. L7 / L4 Internet / CloudFront EC2 / Lambda / IPs • HTTP/HTTPS only
• No static IPs (unless behind GA)
Hourly + per LCU + data processed
NLB (Network Load Balancer) Balances TCP/UDP traffic. L4 – Transport Internet / Internal VPC EC2 / IPs • No advanced routing (L7)
• Health checks limited
Hourly + per LCU + data processed
Gateway Load Balancer (GWLB) Sends traffic to firewalls/appliances. L3 / L4 IGW / NLB Security Appliance • Appliances must support GENEVE
• Adds latency
Hourly + per LCU + data processed
Global Accelerator Routes global traffic via Anycast IPs. L4 – Transport End User NLB / ALB / IPs • Not a CDN
• No caching
Per accelerator-hour + data transfer

2.3 Security and Access Control

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
WAF Filters HTTP/HTTPS requests. L7 – Application CloudFront / ALB ALB / API Gateway • L7 only
• Rule limits apply
Per WCU (rule capacity unit) + requests
AWS Shield / Advanced DDoS protection for infra/apps. L3–L7 Internet / Edge VPC Entry Points • Shield Standard auto, Advanced = $$ Shield Std free, Advanced fixed monthly fee
ACM Manages SSL/TLS certificates. L6 – Presentation N/A (integrated) CloudFront / ALB / API GW • Only ACM-issued certs auto-renew Free for ACM-managed certs
Security Groups / NACLs Allow/deny traffic at instance/subnet. L3 / L4 Client / Peer Service EC2 / ENI / Subnet • SG stateful, NACL stateless
• NACL rules limit
Free

2.4 Edge Services and DNS

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
CloudFront Distributes and caches content globally at PoP. L7 – Application End Users ALB / S3 / API GW • Cache invalidation costs
• Regional edge cache not everywhere
Per request + data transfer out
Route 53 DNS resolution with routing policies. L7 – Application End Users IP / ALB / CloudFront • Query costs
• Geo/latency policies add cost
Per hosted zone + per query

2.5 API and Microservice Communication

AWS Service Purpose OSI Layer Upstream Downstream Limitations Pricing
API Gateway Expose/manage REST/HTTP/WebSocket APIs. L7 – Application Client / CloudFront Lambda / Service Backend • Payload size limits
• Latency higher than ALB
Per million requests + data processed
App Mesh Controls service-to-service traffic in a mesh. L7 – Application Microservice A Microservice B • Envoy sidecar overhead
• Complexity
Per Envoy proxy-hour

2.6 Core Networking Components

Component Purpose OSI Layer Upstream Downstream Limitations Pricing
VPC Isolated virtual network with subnets and routing. L3 – Network Internet / VPN Subnets • Max 5,000 subnets
• CIDR block limits
Free
Elastic Network Interface (ENI) Virtual NIC attached to resources. L2 – Data Link Subnet / VPC EC2 / Lambda • Limited ENIs per instance type Free (included in instance cost)

3. VPN Connectivity

Hybrid AWS environments typically stretch private address space across on-premises, branch, and cloud networks. AWS supplies both network-level Site-to-Site VPN options and user-level Client VPN so you can choose between full network extensions or individual remote access.

3.1 Site-to-Site VPN with Transit Gateway

This reference design places an AWS Transit Gateway (TGW) at the center of multiple VPCs and an on-premises environment. By tailoring TGW route tables and VPC associations you can allow or deny east-west traffic while still giving every spoke access to the corporate network.

3.1.1 Deployment Workflow

3.1.2 Operational Considerations


3.2 Client VPN

AWS Client VPN is a fully managed OpenVPN-based service that allows individual users (laptops, developers, admins, remote workers) to securely connect to AWS resources and on-premises networks.

3.2.1 Connection Sequence

Client VPN Example
🔐 Client VPN – Authentication & Connection Flow

4. Route Tables


5. Direct Connect

AWS Direct Connect (DX) provides a dedicated, private network connection between your on-premises environment and AWS. Unlike VPN (which traverses the Internet), DX offers consistent latency, predictable bandwidth, and enterprise-grade reliability.

5.1 Direct Connect Physical Architecture


5.2 MACsec Security Layer

DX traffic is not encrypted by default. MACsec secures the physical hop between your router and AWS’s DX router at the PoP.


5.3 Direct Connect Provisioning Workflow

  1. LOA-CFA (Letter of Authorization – Connecting Facility Assignment)
    • AWS allocates a port inside their cage at the DX location (PoP).
    • You receive LOA-CFA to hand to your provider or colo staff.
  2. Physical Cross-Connect
    • Fiber is patched between your cage/router and the AWS DX router at the PoP.
    • Ports are set with matching speed/duplex.

5.4 Direct Connect Virtual Interfaces

DX is a Layer 2 link. To run multiple logical networks, DX uses 802.1Q VLANs, each mapping to a Virtual Interface (VIF) on the AWS side.

Types of VIFs:

  1. Private VIF
    • Connects to VGW (1 VPC) or TGW (multiple VPCs).
    • Used for private VPC IP ranges.
    • Region-specific (per DX location).
    • 1 VIF = 1 VGW = 1 VPC (unless TGW is used).
    • No built-in encryption.
  2. Public VIF
    • Connects to AWS public endpoints (e.g., S3, DynamoDB, STS).
    • AWS advertises all public IP prefixes; you advertise your public IPs.
    • Global scope (all AWS regions).
    • Not transitive: your prefixes are not re-shared by AWS.
    • Can combine with VPN for DX + VPN (low latency + encryption).
  3. Transit VIF
    • Connects via DX Gateway (DXGW) → TGW.
    • Scales to multiple VPCs across accounts/regions.
    • Requires BGP.
    • Enterprise-scale hub-and-spoke hybrid connectivity.

5.5 Direct Connect Gateway


5.6 Operational Considerations

5.7 Connection Sequence

Direct Connect Flow
🔌 Direct Connect – Physical + VIF Sequence

6. Domain Name System (DNS)

DNS (Domain Name System) resolves human-readable domain names (e.g., example.com) into IP addresses or service endpoints. Inside AWS, Route 53 is the managed DNS platform. For refresher material on registries, registrars, zone files, and baseline record types, see Domain Name System.

6.1 Route 53 Record Support


6.2 Apex (Naked) Domains


6.3 Route 53 Routing Policies

Routing Policy Purpose Example
Simple Single record → single resource example.com → 192.0.2.1
Weighted Split traffic by % between resources 80% → server1, 20% → server2
Latency Route to lowest-latency region US users → us-east-1, EU users → eu-west-1
Failover Primary resource + backup on failure Main site → backup site
Geolocation Route by user’s country/region US → 192.0.2.1, UK → 192.0.2.2
Geoproximity Route by distance + optional bias East Coast users → NJ DC, West Coast → CA DC
Multi-Value Return multiple IPs for LB/HA example.com → 192.0.2 .1, 192.0.2.2
IP-based Route by client IP blocks Corp IP range → private endpoint

6.4 DNSSEC Overview

Route 53 supports DNSSEC signing for public hosted zones, letting resolvers verify that responses originated from AWS without tampering. Review the cryptographic principles in DNSSEC basics before enabling it in production.

6.4.1 Enable signing on Route 53 zones

6.4.2 Publish DS at the registrar

6.4.3 Validation paths


6.5 Route 53 Resolver and Endpoints

By default, every VPC has an Amazon-managed DNS resolver at the reserved IP VPC-CIDR+.2 (e.g., 10.0.0.2).

👉 Limitation: The default .2 resolver only works inside the VPC. It cannot be queried from on-premises networks or other VPCs directly.

To integrate DNS across hybrid or multi-VPC environments, AWS provides Route 53 Resolver Endpoints:

These endpoints solve the DNS boundary problem where VPC and on-prem DNS could not previously resolve each other.

Route 53 Resolver Endpoints Flow
🔄 Route 53 Resolver – Inbound & Outbound Endpoint Flow

7. IPv6 in AWS

AWS VPCs support dual-stack networking (IPv4 + IPv6). Unlike IPv4, IPv6 is globally unique and publicly routable, which removes the need for NAT but requires careful access control.

7.1 Key Points


7.2 Considerations

8. Exam Reminders


Contents