Intro
AWS Virtual Private Clouds (VPCs) are a regional service
that provide isolated networking for cloud infrastructure.
VPCs are secure by default. Traffic inbound and outbound
of a VPC is blocked unless it is explicitly allowed.
There are 2 types of Tenancy's for a VPC.
Tenancy Type |
Description |
Extra Cost |
Default |
VPC resources are provisioned across shared infrastructure |
False |
Dedicated |
VPC resources are provisioned on dedicated infrastructure |
True |
The following diagram shows the conceptual layout of a VPC in AWS.
Default VPC
Each Region has a pre-configured VPC with a Public Subnet
in Each Availability Zone, an Internet Gateway, and DNS resolution
enabled. This allows customers to quickly spin up EC2 instances that
have access to the Public Internet.
Best Practice
The default VPC allows you to get started quickly. However, it's
recommended to use Custom VPCs designed to meet the corporate policy
and required use-case.
Custom VPC
A Custom VPC is just a VPC that you configure yourself
seperately to the Default VPC.
Availability Zone
Each Region has multiple Availability Zones and
a VPC Spans all Availability Zones in a Region.
Important
A VPC spans all availability zones in a region. However, a
subnet is constrained to a single availability zone.
CIDR Block
VPCs are assigned IP address CIDR blocks. Hosts deployed in
the VPC are assigned addresses from within the CIDR range.
IPv4 CIDR
- IPv4 CIDR blocks must be assigned from the RFC 1918 private address range.
- The maximum size is a /16
- The minimum size is a /28
- A VPC can have 1x Primary IPv4 CIDR block with optional secondary CIDR block(s)
IPv6 CIDR
A VPC can optionally assign a single IPv6 CIDR block.
IPv6 CIDR block can either be assigned from a BYO IPv6 pool
or assigned by AWS. If using AWS assigned IPv6 CIDR blocks
you have no choice in which block is assigned.
- Must be /56 in size.
- All IPv6 addresses are publicly routable by default, but explicit configuration is still required to enable access to/from them to the internet.
Subnets
VPC Subnets have the following Characteristics.
- Are constrained to a single Availbility Zone and are AZ resilient.
- Must be a subset of the VPC CIDR.
- Cannot overlap other subnets and must be unique within a VPC.
- Subnets have IP reachability to other subnets within a VPC.
- Subnets are private by default and require explicit configuration to make them public.
Reserved IPs
AWS reserves 5 IP addresses
in each subnet.
- Network/First Address
- Network Address +1 - VPC Router
- Network Address +2 - VPC DNS Resolver
- Network Address +3 - Reserved for future use
- Broadcast/Last Address
Auto Address Assignment Options
Public IP addresses can be automatically assigned to instances
when they are created. The following options must be enabled
for IPv4 and IPv6 subnets for this to happen.
- Auto Assign Public IPv4 address - Assigns an IPv4 Elastic IP address.
- Auto Assign IPv6 address - This must be enabled for instances to get an IPv6 address. (All IPv6 Addresses are Public)
Subnet Designation
How routing is configured for a subnet determines it's designation.
Designation |
Characteristics |
Public Subnet |
Has a direct route to an Internet Gateway and can access the Public Internet. |
Private Subnet |
Does not have a direct route to an Internet Gateway and requires a NAT device to access the Public Internet |
VPN-Only Subnet |
Has a route to a Site-to-Site VPN connection and does not have a route to an Internet Gateway. |
There are 3 types of IP Addressing for hosts in a subnet.
- IPv4 Only
- IPv6 Only
- Dual Stack (IPv4 + IPv6)
IPv4 Subnet
-
IPv4 addresses can only be assigned from the
RFC 1918 address blocks.
-
An IPv4 subnets size can range from a /28
up to a /16 which is the same size
as a VPC. The subnet must also be from the same CIDR range as the VPC.
-
Publicly routable IPv4 addresses are assigned to Elastic IP's but they
are NOT configured directly on an EC2 instance. They are used during
NAT outbound to the internet.
The following table lists the RFC 1918 address blocks.
Address Class |
Prefix |
A |
10.0.0.0/8 |
B |
172.16.0.0/12 |
C |
192.168.0.0/16 |
Important
IPv4 subnets MUST use a NAT device (Either an
Internet Gateway or a NAT Gateway) to reach the internet.
IPv6 Subnets
-
An IPv6 subnet must be a /64
in size and be from the same CIDR range as the VPC.
-
There are 256 available
/64 subnets for use in a
/56 VPC CIDR.
-
All IPv6 addresses are publicly routable and NAT is not
required to access the internet.
Important
IPv6 addresses have a bi-directional routing capability through an
Internet Gateway. To restrict inbound traffic to IPv6 subnets from
the internet set their default gateway to an Egress-Only Internet Gateway.
IPv4 vs IPv6 Services
Not all AWS services have feature parity for IPv6 as with IPv4.
VPC DNS
DNS services can be provided within a VPC. The
DNS service has the following characteristics.
- DNS within a VPC is provided by the Route53 service.
- The DNS resolver IP address is the Subnet IP +2.
-
The enableDnsHostnnames setting must
be enabled allow VPC instances to have public hostnames. This setting
is Disabled by default.
-
The enableDnsSupport setting allows
instances to use the DNS resolver for name resolution. This setting
is Enabled by default.
BYO CIDRs
You can bring you own IPv4 and IPv6 CIDRs for use in AWS with the
following considerations.
-
Imported prefixes are advertised by BGP from the AWS with the ASNs
16509 or 14618.
-
Imported prefixes MUST be Resource Public Key Infrastructure (RPKI) validated
and, have a Route Origin Authorisation (ROA) with the issuing Regional Internet
Registry (RIR) permitting AWS to advertise the prefixes from their ASN's.
-
A /24 is the smallest IPv4 prefix you can bring.
-
A /48 for publicly advertised and
a /56 for non-publicly advertised IPv6 prefixes are
the smallest you can bring.
-
CIDRs are imported Per-Region so A CIDR is only available
in the Region it is imported into.
-
There is a 5 IPv4 and IPv6 CIDR limit
Per-Region Per-Account.
-
It is NOT possible to share IPv4 or IPv6 CIDRs with other accounts using
AWS Resource Access Manager (RAM).
VPC DHCP
DHCP in a VPC is used to provide the IP, subnet mask and gateway addressing.
DHCP Option Set
Within a VPC you can customise the DHCP settings via
a DHCP Option Set. The following options
are configurable.
- Domain Name
- DNS Servers
- NTP Servers
- NetBIOS Name Servers
- NetBIOS Node Type
DHCP Option Sets have the following characteristics.
- Each subnet is assigned a DHCP option set.
-
DHCP Option sets are immutable and cannot be changed once created.
To edit them you must create a new option set and delete the old one.
-
You can create multiple option sets. However,
only a single option set can be assigned to a VPC at a time.
VPC Router
The VPC router is a virtual router within a VPC which is
fully managed by AWS. The VPC Router has the following
characteristics.
-
Highly available across all AZs within a region.
-
Routes traffic between subnets in a VPC as well as
to/from a VPC.
-
The VPC router uses the subnet +1 address for each subnet
in a VPC as the default gateway.
-
The Routing behavour of the VPC router can be modified using
Route Tables.
Route Table
Route Tables are used to define routing behavour for a VPC. A
Route Table has the following characteristics.
-
Route Tables are associated with subnets. There are 2
types of route tables. The default Main
table and Custom tables.
-
Subnets can only be associated with 1 Route Table. Changing
a subnet to use a Custom Table removes the association of
the Main Table.
-
A subnet must have a route table, so if you dissacociate a
Custom Table, the Main Table will be automatically re-associated.
-
Routes are select based on the longest match prefix length.
More specific routes are preferred over less specific routes.
IE: a /32 is preferred over a
/16.
-
By default, the main route table has a route for the
VPC CIDR for both IPv4 and IPV6 if it is enabled. This allows
traffic to route between all subnets in a VPC.
-
The target for these routes are local
which means, sourced from the VPC.
-
Route Tables can be associated with different types of Gateways.
Best Practice
Leave the Main Route Table in it's default configuration.
If changes to a Route Table are required, a Custom Route Table should be created.
The following table shows an example Route Table.
Destination |
Target |
10.18.192.0/18 |
local |
2600:1f16:190:6a00::/56 |
local |
Gateway Route Table
When associating a route table with a VGW or IGW, the RT is known
as a Gateway Route Table.
Subnet route tables allow you to control VPC routing behavour on
the Egress direction.
Gateway route tables allow you to control the routing behavour
on the Ingress direction to a VPC.
A common use for a Gateway Route Table is to route traffic from
from an IGW to a security appliance for inspection.
Route Selection
Route selection is AWS is pretty straight forward.
There are some different considerations depending on the
services that are in use. The goal is to find a single
best route to a destination.
Note
IPv4 and IPv6 routes are evaluated independently of each other.
VPC Route Table
Route priority in a VPC is determined as
in the following order (from highest to lowest priority).
-
Longest prefix (most specific) match.
-
When multiple equal length prefix matches exist,
routes are prefered based on the route type:
-
Static routes.
-
Prefix list routes.
-
VGW Propagated routes.
VGW Propagated Routes
When a VGW is attached to a VPC, the following route selection
rules apply for propagated routes (from highest to lowest priority).
-
BGP propagated routes from a Direct Connect (DX).
-
Static routes to a Site-to-Site VPN connection.
-
BGP propagated routes from a Site-to-Site VPN connection.
-
When multiple equal length BGP learned prefix matches exist,
routes are prefered based on a BGP attribute:
-
Shortest AS_PATH.
-
Lowest MED.
Network ACL
Network ACLs (NACLs) logically sit around a Subnet
filtering Inbound and
Outboud of the
Subnet boundary.
The following diagram is a visual representation of a NACL.
Network ACLs have the following characteristics.
-
Network ACLs are Stateless.
-
Network ACLs match traffic based on a
5-tuple match criteria:
Source + Destination IP, Source + Destination Port, Protocl.
-
NACLs are configured in 2 directions:
Inbound and Outbound.
-
The direction of traffic (Inbound or Outbound) is determined by
which host is the source of the traffic.
-
A subnet can only be associated with a single NACL.
-
By default, all traffic is Allowed
Inboud and Outbound through the Default NACL.
-
Rules are processed in order from the Lowest
to the Highest rule number.
-
Rule processing is stopped when a rule is matched.
-
Implicit rules are denoted with a *
-
There are 2 actions that can be performed on matched traffic:
Allow or Deny.
The following table shows and example Inbound Network ACL.
Rule Number |
Type |
Protocol |
Port Range |
Source |
Allow/Deny |
100 |
All traffic |
All |
All |
0.0.0.0/0 |
Allow |
101 |
All traffic |
All |
All |
::/0 |
Allow |
The following table shows and example Outbound Network ACL.
Rule Number |
Type |
Protocol |
Port Range |
Destination |
Allow/Deny |
100 |
All traffic |
All |
All |
0.0.0.0/0 |
Allow |
101 |
All traffic |
All |
All |
::/0 |
Allow |
Important
Network ACLs do not filter traffic within a subnet
between instances. This is done with Security Groups.
Custom NACLs
When creating a custom NACL the following criteria applies.
-
By default, all traffic is Denied
in/out through a Custom Network ACL.
-
Custom NACLs are not associated with any subnets when initially
created.
Security Group
Security Groups logically sit around an
Elastic Network Interface (ENI)
filtering Inbound and
Outboud of the
ENI boundary.
The following diagram is a visual representation of a Security Group.
Security Groups have the following characteristics.
-
Security Groups have an Implicit Deny
that block all traffic that is not
Explicitly allowed.
-
Security Groups are Statefull and
return traffic is implicitly allowed.
-
Security Groups are configured in 2 directions:
Inbound and Outbound.
-
Security Groups can match traffic based on a 5-Tuple match.
They can also match Application Layer protocols and other
logical AWS resources (including themself).
-
Default Security Groups have an implicit Allow
rule that permits all traffic from anything in the Security Group.
-
Security Groups are attached to
Elastic Network Interfaces (ENIs)
NOT to EC2 Instances.
Important
Security Groups do not have the ability to
explicitly deny traffic.
The following table shows and example Inbound Security Group.
Name |
Security group rule ID |
IP version |
Type |
Protocol |
Port range |
Source |
Description |
- |
sgr-0aec7b2c7b9f8d6eb |
- |
All traffic |
All |
All |
sg-0fba9702a97ac5405 / default |
- |
The following table shows and example Outbound Security Group.
Name |
Security group rule ID |
IP version |
Type |
Protocol |
Port range |
Destination |
Description |
- |
sgr-034c70fb26e78345b |
Ipv4 |
All traffic |
All |
All |
0.0.0.0/0 |
- |
- |
sgr-02bde64e798ce5123 |
Ipv6 |
All traffic |
All |
All |
::/0 |
- |
NAT Gateway
NAT Gateways are used to provide EC2 instances in Private Subnet
access to AWS Public Services and the internet.
The following points list the characteristics of a NAT Gateway.
-
NAT Gateways are AZ Resilient. To achieve NAT Gateway resilience, a
NAT Gateway is required in
each Availability Zone in a Region. Private
Subnets must have their Route Table point
to the NAT Gateway within the
same AZ.
-
NAT Gateways are deployed in Public Subnets.
-
Nat Gateways allow outbound and return
traffic from Private Subnets. Unsolicited inbound traffic is not allowed.
-
NAT Gateways can Scale from 5 up-to 45 Gbps of throughput.
-
NAT Gateways support up-to 55k simultanious connections to
each destination. If this is
exceeded, the ErrorPortAllocation
metric is triggered CloudWatch.
-
Mulitple NAT Gateways can be deployed within an AZ to aid in
scalling.
-
NAT Gateways use static Elastic IPs
that CANNOT be changed. To use a different
Elastic IP a New NAT Gateway must be deployed.
-
NAT Gateways are billed Per-Instance, Per-Second. And also, Per-Gbps processed.
-
NAT Gateways CANNOT be used across VPC Peers,
Site-to-Site VPNs, or AWS Direct Connects.
-
NACL are used to secure NAT Gateways at the Subnet Level. Security Groups
are NOT supported on NAT Gateways.
The following diagram shows a typical NAT Gateway deployment.
The following points describe the above diagram.
-
NAT Gateways need a Public Elastic IP adress so are deployed
in a Public Subnet.
-
NAT Gateways do NOT have any directly assigned Public IPv4 Addresses.
-
An Elastic IP is translated for the NAT Gateways Outside interface
to and from the internet.
-
The EC2 Instances in the Private Subnets use the NAT Gateway in the
Public Subnet as their Default Route to access the Internet.
Internet Gateway
Internet gateways sit at the edge of a VPC and the
AWS Public Zone allowing access to the
Public Internet and to
AWS Public Services.
Internet Gateways are Highly Available and Scalable across all
Availability Zones in a Region. They are also fully managed by AWS.
The following points describe the above image.
-
The Internet Gateway permits IPv4 and IPv6 for both the inbound and outbound
directions.
-
The EC2 Instance in the Public Subnet has an RFC1918 private address
that has a 1:1 Static NAT to a Public Elastic IP on the Internet Gateway.
-
The NAT gateway sits in the Public Subnet and has a Private IPv4 address
on it's Outside Interface. The Private address is translated to a Public
Elastic IP address at the Internet Gateway.
-
The EC2 Instance in the Private Subnet has Dual-Stack IPv4 and IPv6 addresses.
-
The EC2 Instance in the Private Subnet uses the NAT Gateway as it's default
route for IPv4 routes.
-
The EC2 Instance in the Private Subnet uses the Internet Gateway as it's default
route for IPv6 routes.
Egress-Only Internet Gateway
There can only be a single Internet Gateway Per-VPC. However, a VPC can
also have a single Egress-Only Internet Gateway which is used to restrict IPv6
Subnets to Outbound initiated traffic flows.
The following points describe the above image.
-
The Public and Private Subnets are IPv6-Only Subnets.
-
The EC2 Instance in the Public Subnet uses the Internet Gateway
as it's default route for IPv6 traffic.
-
Both Outbound and Inbound
initiated traffic flows are permitted through the Internet Gateway.
-
The EC2 Instance in the Private Subnet uses the Egress-Only
Internet Gateway as it's default route.
-
The EC2 Instance in the Private Subnet is restricted to
Outbound initiated traffic flows.
PrivateLink
AWS PrivateLink allows you to connect to 3rd Party Provider Services, supported AWS
services, and your on-premises network without traversing the public
internet.
The following considerations are relevant to PrivateLink.
-
PrivateLink powers both Gateway and
Interface Endpoints.
-
Only IPv4 and TCP protocols are supported.
-
Private DNS can be used to override Public DNS records for PrivateLink services.
Gateway Endpoint
Gateway Endpoints allow instances in Private
subnets to access supported Public Services
without traversing the internet. The current supported services are
S3 and DynamoDB.
The following points list the characteristics of Gateway Endpoints.
-
Allow Private Access to
Public Services.
-
Gatway Endpoints are a Regional Service and
provide access to supported services within
the Region they are deployed.
-
Gateway Endpoints are Higly-Available across all Availability Zones within a
Region.
-
Gateway Endpoints are deployed at the VPC level and
Subnets are Assigned to a Gateway Endpoint.
-
Assigned Subnets have an AWS managed Prefix List
added to their Route Table that points the the Gateway Endpoint.
-
Endpoint Policies are used to control what resources the Gateway Endpoint can
access.
-
Gateway Endpoints are non-transitive and can only
be used by resources within the VPC they are
deployed.
-
Gateway Endpoints have no associated cost.
The following diagrams shows a typical Gateway Endpoint deployment.
The following points summarize the above diagram.
-
A Gateway Endpoint is deployed in the VPC which is available
across all Availability Zones.
-
Both Private Subnets are associated with the Gateway Endpoint
and have an AWS managed Prefix List added to their Route Tables.
The Prefix List points routes for S3 and DynamoDB toward the
Gateway Endpoint.
-
There is an Endpoint Policy applied to the Gateway Endpoint which
restricts access to specific resources.
-
EC2 instances use the Gateway Endpoint to access S3 and DynamoDB without
traversing the public internet.
Interface Endpoint
Interface Endpoints provide private
access to services that integrate with PrivateLink
except DynamoDB. The list of services
can be found here.
The following points list the characteristics of Interface Endpoints.
-
Allow Private Access to
Public Services.
-
Interface Endpoints are Elastic Network Interfaces (ENIs)
attached to a Subnet within a VPC.
-
Interface Endpoint are Not Highly Available.
To achieve HA, an Interface Endpoint is required in at least one Subnet,
in Each Availability Zone.
-
An Interface Endpoint can be deployed into exactly one
Subnet per Availability Zone.
-
Security Groups can be used to control access to the Interface Endpoint.
-
Endpoint Policies are used to control what resources the Interface Endpoint can
access.
-
Interface Endpoints have an endpoint specific DNS name assigned based on their Service.
The Service can then be accessed by using the domain name which points to the Private
IP address from the Subnet the Interface Endpoint is deployed into.
-
Interface endpoints get 2 default DNS names automatically assigned. A
Regional and a Zonal DNS name.
-
Regional DNS names can be used across a Region. EG:
vpce-02d8c9b4abf048db4-mxlm5x10.sns.us-west-1.vpce.amazonaws.com
-
Zonal DNS names point to a specific Availability Zone within a Region. EG:
vpce-02d8c9b4abf048db4-mxlm5x10-us-west-1a.sns.us-west-1.vpce.amazonaws.com
-
Optionally, a Private DNS name can be used
to Override the default DNS names. This option
is Enabled by default.
-
Enabling Private DNS associates a Route53 Private Hosted Zone to the VPC pointing
the default service DNS name, EG: sns.us-west-1.amazonaws.com
to the Interface Endpoint IP address.
Note
S3 does not support private DNS for interface VPC endpoints.
The following diagrams shows a typical Interface Endpoint deployment.
The following points summarize the above diagram.
-
Interface Endpoints 1/2 are deployed into private subnets in AZ-A/B of the VPC.
The are assigned an IP address from the Subnets they reside in.
-
Endpoint 1 provides Private access to the S3 Service and has a Security Group applied
that limits access to the Endpoint.
-
Endpoint 2 provides Private access to the SNS Service and has an Endpoint Policy applied
that limits which SNS resources that it can access.
-
Endpoint 1 is accessed by the auto-generated Regional DNS name
vpce-123-abc.s3.region.vpce.amazonaws.com
which points to the Private IP address
of the Endpoint.
-
Private DNS is enabled for Endpoint 2 and the Public service DNS name
sns.region.amazonaws.com now points to the
Private IP address of the Endpoint.
VPC Peering
VPC peering allows you to connect two VPC's
together via an encrypted virtual link.
The following points list the characteristics of VPC Peering.
-
VPCs can be peered within the same region OR between different regions.
-
VPCs can be peered within the same account OR between different accounts.
-
To create a VPC peering connection, the requestor
initiates a connection from the source VPC.
The acceptor
accepts the connection from the destination VPC.
-
VPC peering connections are non-transitive. A VPC
CANNOT be transited to reach another VPC or external connection via an Internet Gateway,
S2S VPN, Direct Connect, etc..
-
VPCs with overlapping CIDR ranges CANNOT be peered.
-
Route tables MUST be configured to forward traffic between the VPCs.
-
Security Group references can be used with
VPC peering connections in the same region.
-
Cross account Security Group references are possible within the same
region. However, the Account ID is included when specifying the Securint Group ID. EG:
acn-12345/sg-67890
-
Optionally, Public Hostnames can be configured
to resolve to Private IPs across a VPC peering connection.
VPC Flow Logs
VPC Flow Logs capture Metadata
about traffic flows in and out of a VPC.
Flow Log Sources
Flow Logs are sourced from Elastic Network Interfaces (ENIs)
and be enabled in 3 locations for a VPC.
The following table lists the 3 locations of VPC where Flow Logs
can be enabled.
Location |
ENIs Captured |
VPC |
All ENIs in the VPC |
Subnet |
All ENIs in the Subnet |
ENI |
Only the specific ENI |
Flow Logs Destinations
Flow logs destinations can be either
S3 or
CloudWatch Logs.
The follow table list the Flow Destinations and their benefits.
Destination |
Benefits |
S3 |
- Access directly by 3rd party monitoring solutions
- Access by custom built application
- Use Athena to query logs
|
CloudWatch Logs |
- Stream to different locations
- Access progrmatically via CloudWatch API
- Access via CloudWatch Console
|
The following diagrams shows an overview of the VPC Flow Logs architecture.
The following points describe the above diagram.
-
Logs are sourced from Elastic Network Interfaces (ENIs) depending on where Flow Logs are enabled.
-
The orange circle denotes Flow Logs enabled on the VPC were Logs from all ENIs are captured.
-
The purple circle denotes Flow Logs enabled on the Private Subnet were logs from all ENIs in the Private Subnet are captured.
-
The red circle denotes Flow Logs enabled on the ENI of the EC2 Instance in the Public Subnet, only this ENI caputed.
-
Logs are forwarded to either S3 or CloudWatch Logs.
Flow Log Format
Flow Logs can capture Metadata on either ACCEPTED,
REJECTED or ALL connections.
The following table lists example Flow Logs.
version |
account-id |
interface-id |
srcaddr |
dstaddr |
srcport |
dstport |
protocol |
packets |
bytes |
start |
end |
action |
log-status |
2 |
123456789010 |
eni-1235b8ca123456789 |
172.31.16.139 |
172.31.16.21 |
20641 |
22 |
6 |
20 |
4249 |
1418530010 |
1418530070 |
ACCEPT |
OK |
2 |
123456789010 |
eni-1235b8ca123456789 |
172.31.9.69 |
172.31.9.12 |
49761 |
3389 |
6 |
20 |
4249 |
1418530010 |
1418530070 |
REJECT |
OK |
Flow Logs have the following characteristics.
-
Flow Logs are show in the order that they are evaluated
-
If logs look to be part of the same flow and there is a ACCEPT followed by
a REJECT it's likely due to a Security Group permitting inbound traffic
and a NACL blocking outbound traffic.
-
Security groups are Stateful so evaluate the Request and
the Response as a single flow.
-
NACLs are Stateless and see the Request and Response as
2 seperate flows.
-
Flow logs are NOT realtime, there is a delay in the
time between the traffic occuring and it being visible
in the Flow Logs product.
Excluded From Flow Logs
Not all flows are logged and traffic to/from the following
services are excluded.
- The VPC metadata service 169.254.169.254
- The VPC NTP service 169.254.169.123
- The Subnet DNS Resolver Network Address +2
- DHCP requests within a VPC
- Amazon Windows License Server
Traffic Mirroring
Traffic Mirroring is used to direct traffic towards a content inspection
appliance.
Traffic Mirroring has the following characteristics.
-
Mirror Sources are Elastic Network Interfaces (ENIs).
-
Mirror Targets are an ENI, Network Load Balancer (NLG) or Gateway Load Balancer (GWLB).
-
Filters are used to restrict which traffic is mirrored.
-
A Mirror Session is the Source + Target + Filters.
-
Network Load Balancers (NLB) are used to direct traffic from the Source to the Target
for High Throughput and Availability.
-
Mirrored traffic to a Network Load Balancer is encapsulated in VxLAN (UDP 4789).
-
Mirrored traffic to a Gateway Load Balancer is encapsulated in GENEVE (UDP 6081).
-
ENIs can be a Mirror Source or Target but NOT BOTH.
-
VPC Flow Logs do NOT capture mirrored traffic.
-
The Sources route table requires a route to the Target for the
Inspection Applicance Subnet to receive Mirrored Traffic.