• Barajar
    Activar
    Desactivar
  • Alphabetizar
    Activar
    Desactivar
  • Frente Primero
    Activar
    Desactivar
  • Ambos lados
    Activar
    Desactivar
  • Leer
    Activar
    Desactivar
Leyendo...
Frente

Cómo estudiar sus tarjetas

Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda

Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba

Tecla H: Muestra pista (3er lado).tecla h

Tecla N: Lea el texto en voz.tecla n

image

Boton play

image

Boton play

image

Progreso

1/18

Click para voltear

18 Cartas en este set

  • Frente
  • Atrás
When you create a VPC you create automatically
*Route Table
*Netwrok ACL
*Security Group
How we storage data from Redshift to S3 bucket only be transported within the AWS private Network?
*Enable Amazon Redshift Enhanced VPC Routing.
*Create and configure an Amazon S3 VPC endpoint.

Redshift will not be able to access the S3 VPC endpoints without enabling Enhanced VPC routing.
VPC flow logs
Get the source IP addressess that access in a Private Subnet

Monitor traffic flowing in and out of EC2. The EC2 is in a VPC.

VPC Flow Logs is a feature that enables you to capture information about the IP traffic going to and from network interfaces in your VPC.
Flow log data is stored using Amazon CloudWatch Logs.
EC2 is in a private subnet.
EC2 need to access to S3.
*Create a VPC endpoint for S3.
*Use route table to control which instances can Access to S3 via endpoint.
*The traffic go inside Amazon Private network.
Application needs to access resources from another AWS account of another VPC in the same regions. How can do this?
VPC Peering between both accounts.

A VPC peering connection is a networking connection between two VPCs that enables you to route traffic between them privately. Instances in either VPC can communicate with each other as if they are within the same network. You can create a VPC Peering connection between your own VPCs, with a VPC in another AWS account, or with a VPC in a different AWS Region.
Connect two applications and use the internal AWS network between two different VPCs. The solution will be highly scalable and secure.
* Deploy Network Load Balancer with VPC endpoint services (AWS Private Link) to establish connectivity between the VPC's in the Region.
When you use a VPC Endpoints?
When you want to connect AWS services without leaving Amazon Internal Network
Types of VPC endpoints
Interface endpoint
Gateway endpoint
*Useful to connect S3 and DynamoDB
VPC Peering
Connect 1 VPC with other
Transitive peering is not supported
Peer between regions
No overlapping CIDR address ranges
AWS PrivateLink
Peering VPCs to 10, 100 or 1000 of customer VPCs.
Require a NLB on the VPC and ENI on the customer VPC.
VPN Connections
Connect VPCs with On-premise Network
"VPN Connections" encrypts the traffic.

By default, instances that you launch into an Amazon VPC can't communicate with your own (remote) network. You can enable access to your remote network from your VPC by attaching a virtual private gateway to the VPC, creating a custom route table, updating your security group rules, and creating an AWS managed VPN connection.
AWS Direct Connect
Allow to connect VPC with on-premise network

AWS Direct Connect does not encrypt traffic in connections between AWS VPCs and the On-premises network.
Prerequisite to establish connection between on-premise network to the VPC.
Public IP address on the customer gateway for the on-premise network.
Virtual Private Gateway attached to the VPC.

"VPN Connections" encrypts the traffic.

By default, instances that you launch into an Amazon VPC can't communicate with your own (remote) network. You can enable access to your remote network from your VPC by attaching a virtual private gateway to the VPC, creating a custom route table, updating your security group rules, and creating an AWS managed VPN connection.
Connection between on-premise network to the VPC with "redundacy"
Direct Connect with LAG enable
Transit Gateway
Limit how VPCs talk to one another
Work with Direct Connect and VPN Connections
Company use AWS transit gateway to interconnect VPC and on-premise network. The security team asks to implement a control that allow or block traffic between EC2 network interfaces and Transit Gateway. What is a good approach to accomplish?
Apply NACL rules between EC2 instances in the subnets and Transit Gateway associations to control the traffic.
Your company uses REST APIs to expose critical patient data to internal front-end systems. The data is stored in Aurora.
How can you ensure that patient data REST endpoints is only accessed by authorized internal users?
Use IAM resource policies to restrict access to your REST APIs by adding the aws:SourceVpce condition to the API Gateway resource policy

Use an Interface VPC Endpoint to make your REST endpoint private and only accessible from within your VPC and through your VPC endpoint.
You have EC2 instance in a subnet of VPC.
EC2 instances should have completed access to the internet.
EC2 is in a public subnet.
What of the following is necessary ?
Add routes for 0.0.0.0/0 in the Internet Gateway