Virtual Private Cloud (VPC) :
A Virtual Private Cloud (VPC) is a virtual network dedicated to your AWS account. It provides logically isolated sections of the AWS Cloud where you can launch resources. Key aspects of VPC include:
Example :
Let's create a VPC with CIDR block 10.0.0.0/16 :
VPC: 10.0.0.0/16
Subnetting :
Subnetting involves dividing a large network into smaller, manageable sub-networks or subnets. Subnets are created within a VPC and allow you to segment resources based on use case or security requirements.
Example :
Within the VPC, let's create two subnets:
Subnet 1: 10.0.1.0/24
Subnet 2: 10.0.2.0/24
Security Group :
A Security Group acts as a virtual firewall for your instance to control inbound and outbound traffic. It allows or denies traffic based on rules defined for the security group.
Example :
Create a security group for a web server allowing HTTP (port 80) and SSH (port 22) traffic :
Security Group:
- Inbound Rule: Allow traffic on port 80 (HTTP)
- Inbound Rule: Allow traffic on port 22 (SSH)
Route Table :
A Route Table contains a set of rules, called routes, that are used to determine where network traffic is directed. Each subnet in a VPC must be associated with a route table. A default route table is automatically created when you create a VPC.
Example :
Create a route table with a route to an internet gateway for public subnets:
Route Table:
- Destination: 0.0.0.0/0
Target: Internet Gateway
Ports :
Ports are logical constructs that represent specific communication endpoints in networking. They allow different services on the same device to utilize network resources without interference.
Example :
Suppose you have an EC2 instance in Subnet 1 running a web server. The Security Group associated with it allows traffic on port 80 (HTTP).
EC2 Instance (Subnet 1):
- IP: 10.0.1.10
- Security Group: Allow Inbound on port 80
Access the web server at http://10.0.1.10
Conclusion :
Understanding and configuring VPCs, subnets, security groups, route tables, and ports are essential for designing a secure and scalable network architecture in the cloud. The examples provided illustrate the basic configurations, but real-world scenarios may involve more complex setups and additional considerations based on specific use cases and security requirements.