01) VPC - Normal Setup
01) VPC - Normal Setup
• You can easily customize the network configuration of your Amazon VPC.
For example, you can create a public-facing subnet for your web servers
that have access to the internet. You can also place your backend systems,
such as databases or application servers, in a private-facing subnet with
no internet access. You can use multiple layers of security, including
security groups and network access control lists, to help control access to
Amazon EC2 instances in each subnet.
Security Group and NACL
Firewall concept in VPC
NACL
NACL also adds an additional layer of security associated with
subnets that control both inbound and outbound traffic at the
subnet level.
In Mumbai
1) Open AWS Console –Services – VPC – Your VPC – Create VPC- Type name :
project1-vpc – IP CIDR block -10.100.0.0/16 – Create VPC
4) Route table –Create Route table – Name tag: Project1-RT1 – VPC - project1-vpc –
Create
After creating select it – subnet association –edit –select project1-subnet1 ---save
Go to Routes –Edit –Add route – 0.0.0.0/0 --- Target – Internet gateway - project1-int-
gtw – save routes
A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255
Reserved IP in VPC --Subnet
The first four IP addresses and the last IP address in each subnet CIDR block
are not available for you to use, and cannot be assigned to an instance.
1) No public IP
2) Security group--SSH –mapped—webserver-SG
3) No route table configuration
Provide Internet Connectivity (Outbound) to Private Subnet