AWS FAQs
AWS FAQs
Overview:
o Allows provisioning of an isolated section of the AWS cloud.
o Launch AWS resources in a custom-defined virtual network.
o Full control over networking (IP address ranges, subnets, route tables, gateways).
o Option to connect VPC to corporate datacenter using a hardware VPN connection.
Customization:
o Create public-facing subnets (e.g., web servers with Internet access).
o Create private subnets (e.g., backend systems without Internet access).
o Multiple layers of security: security groups, network access control lists.
Internet Gateway:
o Allows Amazon EC2 instances to access the Internet.
o Egress-only Internet Gateway available for outbound IPv6 traffic only.
o No bandwidth limits, horizontally-scaled, redundant, and highly available.
Accessing the Internet from VPC Instances:
o Use public IP addresses (e.g., Elastic IPs, IPv6 Global Unique Addresses) for
direct communication and inbound traffic.
o Modify route tables to route traffic through Internet Gateway.
Instances Without Public IPs:
o Use a NAT gateway/instance to route traffic using the NAT's public IP.
o Alternatively, route traffic through a virtual private gateway to a datacenter for
egress to the Internet.
Public IP Address:
Any IP that can be accessed over the Internet (e.g., public IPv4, Elastic IPs, IPv6 GUA).
Software VPN:
You can use a third-party software VPN to establish a site-to-site or remote access VPN
via the Internet gateway.
Traffic between instances or AWS services using public IP addresses stays within AWS’s
private network (not routed over the Internet).
Data is automatically encrypted at the physical layer across AWS’s global network.
Cross-region peering traffic and customer/service-to-service TLS connections add extra
encryption.
Private IP Assignment:
o You can specify the primary private IPv4 address during instance launch or AWS
assigns one automatically.
o Secondary private IPv4 addresses can be assigned anytime.
o For IPv6-only subnets, instances receive an IPv6 GUA automatically.
Changing Private IP:
o Primary private IPv4 is static for the instance's lifetime.
o Secondary private IPv4 and IPv6 GUAs can be reassigned or removed at any
time.
Reusing IP Addresses:
o IPv4 addresses cannot be reused until the instance is terminated.
o IPv6 addresses can be reused after removal.
Assigning IP Addresses:
o Only one instance can have a specified IP address at launch.
o You can assign multiple secondary IP addresses based on the instance type.
Elastic IP (EIP) Addresses:
o Assignable only for IPv4 and reachable from the Internet.
o Each EIP must be tied to a unique private IP.
o EIPs cannot be used in subnets configured with a NAT gateway/instance.
o EIPs are not supported for IPv6 in VPCs.
1. What is BYOIP? BYOIP (Bring Your Own IP) allows you to move your existing publicly
routable IPv4 or IPv6 address space to AWS for use with AWS resources while maintaining
ownership of the IP addresses. You can create Elastic IPs from your IPv4 space for use with EC2
instances, NAT Gateways, and Network Load Balancers. Similarly, IPv6 CIDR blocks can be
assigned to VPCs.
2. Benefits of BYOIP:
IP Reputation: Maintain the reputation of your IP addresses, especially for services like
outbound email.
Customer Whitelisting: Avoid re-establishing whitelists when moving workloads to
AWS.
Hardcoded IP Dependencies: Ease migration when IPs are hardcoded in devices or
architecture.
Regulatory/Compliance: Comply with regulations requiring specific IPs.
On-Prem IPv6 Network: Route IPv6 traffic via your on-premises network using
BYOIP.
If you release a BYOIP Elastic IP, it is returned to your BYOIP IP pool for future
allocation.
5. Regional Flexibility:
You can move a BYOIP prefix between AWS regions by de-provisioning from one and
provisioning it in another.
VPC IP Address Manager (IPAM) Overview:
1. What is IPAM? Amazon VPC IP Address Manager (IPAM) is a service to help plan, track,
and monitor IP addresses across AWS workloads. It streamlines IP address management by
automating allocations, tracking usage, troubleshooting issues, and auditing IPs.
Automated IP Allocation: Allocates IPs for networks across multiple accounts and
VPCs using configurable rules.
Monitoring and Alerts: Monitors IP usage, detects potential issues like IP depletion or
conflicts, and provides alerts.
Network Troubleshooting: Quickly identifies issues like IP misconfigurations.
Auditing: Retains up to three years of monitoring data for retrospective analysis and
auditing.
3. Components of IPAM:
Scopes: Containers representing IP space, including a private and a public scope for IP
pools.
Pools: Collections of contiguous IP ranges organized based on routing and security
needs.
Allocations: CIDR assignments from an IPAM pool to VPCs or other resources.
IPAM supports managing both BYOIPv4 and BYOIPv6 addresses. Existing BYOIP
customers can migrate to IPAM for simplified management.
You can share IPAM pools with other AWS accounts within or outside your organization
via AWS Resource Access Manager (RAM).
Bring Your Own IP (BYOIP) in AWS allows you to bring your own publicly routable IP
address space (IPv4 or IPv6) to AWS for use with AWS resources such as EC2 instances, NAT
Gateways, and Network Load Balancers. BYOIP helps in maintaining IP reputation, enabling
customer whitelisting, supporting hardcoded IP dependencies, meeting compliance regulations,
and routing IPv6 traffic from on-prem networks.
You retain ownership of the IP addresses and can manage them like any other AWS resource.
Key features include Elastic IP allocation, support for IPv4 and IPv6, and the ability to share
prefixes across VPCs within an account.
VPC IP Address Manager (IPAM) is a managed AWS service that helps to plan, track, and
manage IP addresses for AWS workloads. It organizes and automates IP address allocation
across VPCs and accounts, detects IP conflicts, and provides monitoring and auditing
capabilities. IPAM integrates with BYOIP and supports Amazon-provided contiguous IPv6
CIDR blocks for more efficient IP address management.
Security and Filtering within a VPC is handled using security groups (stateful filtering) and
network ACLs (stateless filtering). Security groups control inbound and outbound traffic at the
instance level, while ACLs filter traffic entering or exiting a subnet. AWS supports both types
for added layers of network security.
Monitoring is done through VPC Flow Logs, which capture IP traffic information for analysis
and troubleshooting, and Traffic Mirroring, which allows deeper inspection of actual traffic
content for threat monitoring and troubleshooting. Flow logs are useful for high-level network
insights, while traffic mirroring is more detailed for packet-level analysis.
These tools are designed to help manage complex AWS networking environments efficiently and
securely, allowing scalability while maintaining visibility and control over network traffic.
AWS operates state-of-the-art, highly available data centers. Although rare, failures can occur that affect the
availability of instances that are in the same location. If you host all of your instances in a single location that is
affected by a failure, none of your instances would be available.
VPCs can span multiple Availability Zones, but subnets cannot. Each subnet must
reside within a single Availability Zone.
When launching an EC2 instance, you specify the subnet, determining which Availability
Zone the instance will be placed in.
Data transfer between instances in different subnets (if in different Availability Zones)
incurs a cost of $0.01 per GB.
Default VPCs:
Default VPCs are automatically created the first time you provision EC2 resources and
offer features similar to EC2-Classic.
Each default VPC has one default subnet in each Availability Zone.
You can still create additional VPCs, subnets (including private subnets), or delete
default VPCs and subnets.
Default VPCs offer advantages like ease of use and advanced features (e.g., security
group egress filtering, multiple IPs, and interfaces).
You can switch from EC2-Classic to EC2-VPC by requesting to convert your account.
Regions
Available Regions: AWS is divided into different regions, each with its own
infrastructure for resource management. A region is a physical location that contains
Availability Zones (AZs).
Regional endpoints: Each AWS region has its own API endpoint for services to interact
with. These endpoints are specific to the region.
Local Zones
Available Local Zones: These are extensions of an AWS Region that provide low-
latency access to AWS services closer to specific locations.
Instances in Local Zones: EC2 instances can also be launched in Local Zones to serve
applications requiring low-latency access to end users in those areas.
Wavelength Zones
Available Wavelength Zones: AWS Wavelength Zones are designed for ultra-low-
latency applications by providing infrastructure closer to 5G networks.
Instances in Wavelength Zones: EC2 instances can be deployed in these Wavelength
Zones to optimize for applications like gaming or media streaming.
AWS Outposts
EC2-Classic Overview
Retirement Date: EC2-Classic was officially retired on August 15, 2022. AWS
requested customers to migrate any resources still running on EC2-Classic to VPC before
this date.
Impact on Accounts: Accounts using EC2-Classic are affected, but AWS will
automatically disable EC2-Classic for regions without activity since January 2021. To
check if EC2-Classic is enabled, you can use the AWS Console or AWS CLI.
Migration to VPC
Benefits of Amazon VPC: Migrating to VPC offers advantages like logical isolation,
configurable subnets, management of route tables, network gateways, and access to
newer instances and services. VPC also allows better control over network security.
How to Migrate:
o Use scripts to identify EC2-Classic resources across regions.
o Follow specific migration guides for instances, security groups, load balancers,
databases, Elastic Beanstalk, and other AWS services.
o AWS Application Migration Service (AWS MGN) can be used for automated
migration, simplifying the process.
Runbook for Simple EC2 Migrations: AWS Systems Manager Automation offers a
runbook AWSSupport-MigrateEC2ClassicToVPC, automating the process by creating an
AMI of the EC2-Classic instance, launching it in VPC, and optionally terminating the
EC2-Classic instance.
Key Dates
October 30, 2021: AWS stopped issuing reserved instances (RIs) for EC2-Classic.
August 15, 2022: AWS no longer allowed the creation of instances or services in EC2-
Classic.
1. Inter-Region Peering:
o Peering connections can be established between VPCs in different regions
globally (excluding China).
2. Cross-Account Peering:
o VPCs belonging to different AWS accounts can be peered, provided the owner of
the other VPC accepts the peering request.
3. Costs:
o No charges for creating VPC peering connections; however, data transfer across
peering connections incurs costs. Refer to the EC2 Pricing page for rates.
4. Internet Gateway Requirement:
o An Internet Gateway is not needed for VPC peering connections.
5. Traffic Encryption:
o Traffic between instances in peered VPCs is not encrypted by default, but it
remains private and isolated.
6. Peering Connection Termination:
o If one side of a peering connection is deleted, the other side will lose access to the
VPC.
7. Transitive Peering:
o Transitive peering (A to B and B to C implies A to C) is not supported.
8. Connection Reliability:
o AWS infrastructure supports VPC peering connections, providing redundancy and
eliminating single points of failure.
9. Bandwidth Limitations:
o Bandwidth for peering connections is similar to that between instances within the
same VPC, but full-bisection bandwidth is not guaranteed across peered VPCs.
10. Traffic Encryption for Inter-Region Peering:
o Traffic is encrypted using modern AEAD algorithms.
11. DNS with Inter-Region VPC Peering:
o Public hostname queries resolve to public IP addresses by default, but Route 53
private DNS can resolve to private IPs.
12. Security Group References:
o Security groups cannot reference each other across Inter-Region VPC Peering
connections.
13. IPv6 Support:
o Inter-Region VPC Peering supports IPv6.
14. EC2-Classic Link:
o Inter-Region VPC Peering cannot be used with EC2-Classic Link.
ClassicLink
1. Overview:
o ClassicLink allows EC2 instances in the EC2-Classic platform to communicate
with instances in a VPC using private IP addresses. You must enable it for a VPC
and associate a VPC Security Group with the EC2-Classic instance.
2. Cost:
o No additional charges for ClassicLink, but cross-AZ data transfer charges apply.
3. Usage:
o Enable a VPC for ClassicLink, then associate a Security Group from the VPC
with the EC2-Classic instance. An EC2-Classic instance can only be linked to one
VPC at a time.
4. Membership:
o The EC2-Classic instance becomes a member of the associated VPC Security
Group, but it does not become a member of the VPC itself.
5. DNS Resolution:
o EC2 public DNS hostnames will not resolve to private IPs between EC2-Classic
and EC2-VPC instances.
6. VPC Limitations:
o ClassicLink cannot be enabled for VPCs with specific CIDR ranges, particularly
those within 10.0.0.0/8, unless they are exceptions.
7. Traffic Routing:
o Traffic from EC2-Classic instances can only reach private IP addresses within the
VPC and cannot egress to the Internet or peered VPCs.
8. Access Control:
o ClassicLink does not change access control defined by existing EC2-Classic
Security Groups.
9. Persistence of Settings:
o ClassicLink settings do not persist through stop/start cycles; the EC2-Classic
instance needs to be linked back after being restarted.
10. Security Group References:
o EC2-Classic Security Group rules cannot reference VPC Security Groups, and
vice versa.
VPCs per Region 5 Yes Increasing this quota increases the quota on internet
gateways per Region by the same amount.
IPv4 CIDR blocks 5 Yes This primary CIDR block and all secondary CIDR blocks
per VPC (up to 50) count toward this quota.
IPv6 CIDR blocks 5 Yes The number of CIDRs you can allocate to a single VPC.
per VPC (up to 50)
DNS
Each EC2 instance can send 1024 packets per second per network interface to Route 53 Resolver (specifically
the .2 address, such as 10.0.0.2 and 169.254.169.253). This quota cannot be increased. The number of DNS
queries per second supported by Route 53 Resolver varies by the type of query, the size of the response, and
the protocol in use. For more information and recommendations for a scalable DNS architecture, see the AWS
Hybrid DNS with Active Directory Technical Guide.
Elastic IP addresses
Gateways
Egress-only internet 5 Yes To increase this quota, increase the quota for
gateways per Region VPCs per Region.
Versions per 1,000 Yes If a prefix list has 1,000 stored versions and you add a
prefix list new version, the oldest version is removed so that
the new version can be added.
Network ACLs
Network 200 Yes You can associate one network ACL to one or more
ACLs per subnets in a VPC.
VPC
Rules per 20 Yes This quota determines both the maximum number of
network inbound rules and the maximum number of outbound
ACL rules. This quota can be increased up to a maximum
of 40 inbound rules and 40 outbound rules (for a total
of 80 rules), but network performance might be
impacted.
Network interfaces
Network 5,000 Yes This quota applies to individual AWS account VPCs
interfaces per and shared VPCs. This limit is enforced per
Region Availability Zone (AZ). If, for example, the network
interfaces are in three AZs, each AZ will have a limit
of 5,000 limit and the Region will have a limit of
15,000.
Route tables
Route tables per 200 Yes The main route table counts toward this quota.
VPC Note that if you request a quota increase for route
tables, you may also want to request a quota
increase for subnets. While route tables can be
shared with multiple subnets, a subnet can only be
associated with a single route table.
Routes per route 50 Yes You can increase this quota up to a maximum of
table (non- 1,000; however, network performance might be
propagated impacted. This quota is enforced separately for IPv4
routes) routes and IPv6 routes.
Security groups
VPC security 2,500 Yes This quota applies to individual AWS account VPCs and
groups per shared VPCs.
Region
If you increase this quota to more than 5,000
security groups in a Region, we recommend that
you paginate calls to describe your security groups
for better performance.
Inbound or 60 Yes This quota is enforced separately for inbound and
outbound outbound rules. For an account with the default quota
rules per of 60 rules, a security group can have 60 inbound rules
security group and 60 outbound rules. In addition, this quota is
enforced separately for IPv4 rules and IPv6 rules. For
an account with the default quota of 60 rules, a
security group can have 60 inbound rules for IPv4
traffic and 60 inbound rules for IPv6 traffic. For more
information, see Security group size.
The resources that make up the NAU count have their own individual service quotas. Even if a VPC has NAU
capacity available, you won't be able to launch resources into the VPC if the resources have exceeded their
service quotas.
Name Default Adjustable Comments
Network 64,000 Yes (up to to The maximum number of NAU units per VPC.
Address Usage 256,000)
Peered 128,000 Yes (up to The maximum number of NAU units for a VPC and
Network 512,000) all of its intra-Region peered VPCs. VPCs that are
Address Usage peered across different Regions do not contribute
to this number.
AWS PrivateLink
1. Overview:
o AWS PrivateLink allows customers to privately access services hosted on AWS
without exposing traffic to the public Internet. It keeps all network traffic within
the AWS network, ensuring high availability and scalability.
2. Service Users:
o Users need to create interface type VPC endpoints for PrivateLink-enabled
services. These endpoints appear as Elastic Network Interfaces (ENIs) with
private IPs in their VPCs. Traffic destined for these IPs is routed privately to the
corresponding AWS services.
3. Service Owners:
o Service providers must register their services by establishing a Network Load
Balancer (NLB) in front of their services and creating a PrivateLink service linked
to the NLB. They must also whitelist customer accounts and IAM roles to allow
access.
4. Supported Services:
o AWS services that currently support PrivateLink include:
Amazon EC2
Elastic Load Balancing (ELB)
Kinesis Streams
Service Catalog
EC2 Systems Manager
Amazon SNS
AWS DataSync
o Many third-party SaaS solutions also support AWS PrivateLink. AWS
Marketplace provides a selection of these products.
5. Integration with Direct Connect:
o Yes, on-premises applications can connect to AWS PrivateLink service endpoints
over AWS Direct Connect. The service endpoints automatically direct traffic to
the relevant AWS services.
Additional Questions about Amazon VPC
1. Management Console:
o You can use the AWS Management Console to manage Amazon VPC objects,
including VPCs, subnets, route tables, Internet gateways, and IPSec VPN
connections. A wizard is also available for creating a VPC.
2. Resource Limits:
o For information on VPC limits (number of VPCs, subnets, Elastic IP addresses,
and Internet gateways), refer to the Amazon VPC user guide.
3. AWS Support:
o Yes, AWS provides support for Amazon VPC. More information is available
through AWS support channels.
4. ElasticFox:
o ElasticFox is no longer officially supported for managing Amazon VPC.
Management is available via AWS APIs, command line tools, the AWS
Management Console, and various third-party utilities.
Amazon S3 Overview
Usage:
o S3 provides a web service interface for storing and retrieving data, enabling the
development of cloud-native applications. It scales easily, allowing users to start
small and grow without compromising performance or reliability.
Flexibility:
o You can store any type and amount of data, from small files to large datasets,
supporting various applications, including FTP and sophisticated web
applications.
No Upfront Investment:
o Unlike on-premises solutions, S3 allows you to leverage Amazon’s infrastructure
without upfront costs, ensuring quick, secure, and always available data access.
Getting Started
To start using Amazon S3, you need an AWS account. You can sign up through the S3
console and access documentation and resources to assist with your setup.
Data Storage Capacity
Types of Data:
o Virtually any kind of data can be stored in any format, subject to AWS licensing
agreements.
Storage Limits:
o There are no limits on total data volume or object count. Individual objects can
range from 0 bytes to 5 TB, with single PUT uploads capped at 5 GB (use
multipart uploads for larger objects).
Bucket Types
Data Privacy
Amazon stores your data for usage tracking and billing, but will not access it for other
purposes unless required by law, as outlined in the AWS Licensing Agreement.
Reliability:
o S3 is designed to be highly scalable and available. Different storage classes have
varying availability guarantees:
S3 Standard: 99.99%
S3 Standard-IA, S3 Intelligent-Tiering, S3 Glacier Instant Retrieval:
99.9%
S3 One Zone-IA: 99.5%
S3 Glacier Flexible Retrieval and S3 Glacier Deep Archive: 99.99% with
a SLA of 99.9%.
Handling Traffic Spikes:
o S3 can handle sudden traffic spikes effectively due to its scalable infrastructure
and pay-as-you-go pricing model, ensuring uninterrupted service.
Service Level Agreement (SLA):
o Amazon S3 provides a SLA that offers service credits if uptime falls below a
specified threshold in any billing cycle.
Consistency Model
Read-after-Write Consistency:
o S3 automatically delivers strong read-after-write consistency, ensuring that once
an object is written or overwritten, any subsequent read request will immediately
access the latest version. This also applies to list operations, reflecting changes
right after a write.
Benefits of Strong Consistency:
o This feature is particularly beneficial for applications that frequently read
immediately after writing. It ensures that all reads reflect the most recent writes,
improving performance for high-traffic workloads and reducing costs by
eliminating the need for additional infrastructure to ensure consistency.