Traffic Encryption Options Direct Connect Ra
Traffic Encryption Options Direct Connect Ra
CIDR Attachment
B
Elastic network interface A Sample traffic flow
192.168.0.0/16 DX gateway
server A client located in the corporate network needs to
spoke VPC B cross-connect MACsec
encrypted A route network traffic to the IP address of an EC2
10.1.0.0/16 Direct Connect route AWS (MACsec encrypted)
AWS Direct customer or customer instance in the spoke VPC A, and routes the traffic
CIDR Attachment device partner device
Availability Zone A Connect gateway to the customer gateway.
VPC
Transit Gateway association 10.0.0.0/24 spoke VPC A gateway The customer gateway determines that the best
subnet user B route to the VPC is via the transit VIF, indicating
10.1.0.0/24 10.1.0.0/24 spoke VPC B
gateway the traffic should be sent over the Direct Connect
association connection.
NOTE:
elastic network interface The connection between the customer or partner device As per the Transit Gateway Direct Connect route
Spoke VPC B route
at the AWS Direct Connect Location and the on-
C table, the traffic is forwarded to the spoke VPC A,
workload subnet
Destination Target premises customer gateway is only MACsec enabled if and then routed to the EC2 instance.
10.1.1.0/24
the Layer-2 circuit was extended all the way.
10.1.0.0/16 local Return traffic from the EC2 instance to the client
D located in the corporate network follows a reverse
If the Layer-2 circuit terminates on the customer or
EC2 instance 0.0.0.0/0 tgw-id but identical path, as described in steps A-D.
partner device at the AWS Direct Connect Location, the
responsibility for that segment of the circuit lies with
the customer or partner.
For more information about MACsec in AWS Direct
Reviewed for technical accuracy March 3, 2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Reference Architecture Connect, see Adding MACsec security to AWS Direct
Connect connections.