LZ Workshop 3.2 Advanced Network Routing
LZ Workshop 3.2 Advanced Network Routing
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• Objective
• Layer VPC Security (recap)
• Deployment Model
• Network Architect
• E/W & N/S Inspection
• Centralized Ingress
• Centralized Egress
• Orchestration and Observability
• Capture requirements
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Objectives
• Introduction best practices for Network Inspection
• Enable the team on the solution for Centralizing Ingress and Egress
• Discover initial design patterns that align with the VCB’s cloud adoption strategy through
Q&A
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network Deep Dive Topic Discussion
(1) Describing your step-by-step when inspecting traffic between Workloads on AWS for
Debugging and Troubleshooting.
• Sharing about factor to ensure network issue happening for only one of your workload, not the
others
• Can you walk through how do you protect traffic East - West?
• Do you have any special security control requirements (regulation or VCB’s security policy) to
control traffic between application to application or VPC to VPC or On-Premises to AWS?
(3) Discuss about the network routing readiness for significant changes/requirements in the future.
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Layered VPC Security
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Layered Security
Inside VPC
VPC
VPC Boundary
Availability Zone A Availability Zone B
NACL NACL +
Subnet A Subnet B Application
Gateway Load Third-party AWS Network
Security Balancer appliance Firewall
Group
Observability
AWS WAF
Amazon Amazon
Orchestration VPC Flow Traffic
Logs Mirroring
AWS Firewall
Manager
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC
HTTPS
(TCP 443)
“Web ELB”
• Microsegmentation HTTP
(TCP 80)
• Mandatory, all instances have an associated Security Group “Web Tier”
security group
• Can be cross-referenced Web server Web server
MySQL DB
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Aurora
Network Access Control Lists (NACLs) (Recap)
Region 1
Default NACL Configurations
Availability Zone A
Subnet:10.0.1.0/24
Outbound Rules
Network
access
control list
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Beyond Security Groups and NACLs (Recap)
• Scale
§ A security group allows for 1,000 rule entries (60 by default)
§ A NACL allows for a maximum of 40 rule entries (20 by default)
• Inspection Depth
§ Both NACLs and security groups operate at the network and transport layer
• Centralize Management
§ AWS Firewall Manager Service for security groups only
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network Architectures
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network Architectures
• Internet ingress
• Internet egress
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Current network routing to deep dive
1. Each VPC will have its own TGW route table
Open question
1. Route summary could be used to simplify the routing management overhead
on AWS Transit Gateway
2. Routing approach to enable network automation
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Route Summary
2. If so, have you planned for future usage ? (Multi-Region vision, Automation,…)
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sample pattern for TGW Routing tables
Transit Gateway attachments are associated to a Transit Gateway route table. An attachment can be
associated to one route table. However, an attachment can propagate their routes to one or more Transit
Gateway route tables.
The following table shows route table and associated Transit Gateway attachments.
TGW Route Table Name VPC Associations Destination Route type TGW Attachment
Workload VPCs Propagated VPC Attachments
Shared Services VPC Propagated Shared Services VPC Attachment
Inspection Inspection VPC Attachment Egress Prod VPC Propagated Egress Prod VPC Attachment
SD WAN VPC Propagated SD WAN VPC Attachment
0.0.0.0/0 Static Route Egress Prod VPC Attachment
Shared Services VPC Propagated Inspection VPC Attachment
10.10.0.0/16 Static Route Inspection VPC Attachment
Workload VPC Attachments Ingress VPC Propagated Ingress VPC Attachment
0.0.0.0/0 Static Route Egress VPC Attachment
On-prem Prod CIDR Static Route VPN Attachment
10.10.0.0/16 Static Route Inspection VPC Attachment
Shared Services Shared Service VPC Attachment 0.0.0.0/0 Static Route Egress Prod VPC Attachment
On-prem Prod CIDR Static Route VPN Attachment
Workload VPCs Propagated VPC Attachments
On-Prem Spoke VPN Attachment
Shared Services VPC Propagated Shared Services VPC Attachment
Workload VPCs Propagated Workload VPC Attachments
Shared Services VPC Propagated Shared Services VPC Attachment
Egress Egress VPC Attachment
Ingress VPC Propagated Ingress Attachment
Inspection VPC Propagated Inspection VPC Attachment
Workload VPCs Propagated Workload VPC Attachments
Ingress Ingress VPC Attachment Integration VPC Propagated Integration VPC Attachments
0.0.0.0/0 Static Route Egress Attachment
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Traffic Inspection (recap)
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Ingress Architectures
Internet to VPC
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Ingress
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Current Ingress setup to deep dive
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Should I centralize internet ingress?
Pros of centralizing Cons of centralizing
• Simpler to control internet • Increased blast radius
access by centrally restricting
• Increased complexity
IGW association to VPCs
• Increased cost (in most cases)
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Web Application Firewall (WAF)
PROTECT YOUR WEB APPLICATIONS
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model
INGRESS ROUTING Packet Packet
Ingress route Ingress route
Availability Zone 1 Availability Zone 2 Availability Zone 1 Availability Zone 2
Edge VPC Edge VPC
Ingress VPC: 10.0.0.0/24 Internet Ingress VPC: 10.0.0.0/24 Internet
Gateway Gateway
GWLBE Subnet 1 GWLBE Subnet 2 GWLBE Subnet 1 GWLBE Subnet 2
Or Or
Transit Gateway
App VPC App VPC App VPC 1 App VPC 2 App VPC 3
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Egress
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Current Egress setup to deep dive
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model
EGRESS ROUTING Availability Zone 1 Availability Zone 2 Ingress Route Table
Egress VPC: 10.0.0.0/24 IGW Routes:
GWLBE Subnet 1 and 2 Route Table VPC CIDR via Local
GWLBE Subnet 1 GWLBE Subnet 2 Public Subnet 1 via GWLB Endpoint 1
Routes: Public Subnet 1 via GWLB Endpoint 2
VPC CIDR via Local
0.0.0.0/0 via IGW Packet
GWLBE 1 GWLBE 2
Public Subnet 2 Route Table
Public Subnet 1 Route Table
Routes:
Public Subnet 1
Edge VPC Public Subnet 2 Routes:
VPC CIDR via Local
VPC CIDR via Local
0.0.0.0/0 via GWLBE 2
0.0.0.0/0 via GWLBE 1 Packet
NAT GW 1 NAT GW 2
GWLBE Subnet 2 Route Table
TGW Subnet 1 Route Table
TGW Subnet 1 TGW Subnet 2
Packet Routes:
Routes: TGW ENI 1 TGW ENI 2 VPC CIDR via Local
VPC CIDR via Local 0.0.0.0/0 via NAT GW 2
0.0.0.0/0 via NAT GW 1
Routes:
VPC CIDR via Local Packet
0.0.0.0/0 via TGW
EC2 EC2 EC2
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Orchestration and Observability
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network Observability – Flow Logs
• Diagnosing overly restrictive
security group rules
Transit
VPC Flow Gateway
Log – Flow
Fields
VPC
Amazon
CloudWatch
Direct
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved. Connect
VPC Reachability Analyzer
Resource types to use either as a
source or as a destination:
Amazon VPC A
• Instances
Network ACL Network ACL Use Reachability Analyzer to:
• Internet gateways
Private subnet Private subnet
• Troubleshoot connectivity issues
• Network interfaces
Security group Security group
• Verify intended connectivity
• Transit gateways
• Automate verification of connectivity
• Transit gateway attachments
intent
• VPC endpoints
• VPN gateways
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon VPC Network Access Analyzer
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network Access Analyzer Use Cases
• Internet accessibility to resources in VPCs
• Network segmentation
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Capturing Requirements
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Q&A
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inter VPC Architecture
Same Region
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Current E/W Inspection to discuss
2. They only layered security for E/W traffic is Security Groups in Workload AWS
account.
Open question
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Common pattern for network routing
As customers grow the nuVCBer of VPCs or VPC CIDRs, they can use route summarization when configuring
the association between Transit Gateway and Direct Connect gateway. Summarizing routes is one strategy
that can help you remain under the quota threshold for Direct Connect transit VIFs.
Ref: https://aws.amazon.com/blogs/networking-and-content-delivery/using-aws-transit-gateway-connect-
to-extend-vrfs-and-increase-ip-prefix-advertisement/
Operation efficiency
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC
Region
GWLBE 1 GWLBE 2
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC Packet Flow
Region
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC Reverse Packet Flow
Region
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
East-West Network Inspection Concept
1 Application from VPC Spoke A establishes traffic to other Application in VPC Spoke B. Traffic is routed to Transit GW.
Traffic reaches out to Firewall endpoint Inspection VPC. Origin traffic is forwarded to Palo Alto via GWLB endpoint in Inspection VPC.
2 Default destination is kept.
3 Palo Alto inspects the traffic. It scans the rule then will allow the traffic if rule matchs. If not, then traffic is denied.
4 Finally, origin traffic from Spoke A VPC reaches destination in Spoke B VPC via Transit Gateway
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inter VPC Architecture
Inter Region
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC
Option 1: Single Inspection
Region 1 Region 2
Availability Zone 1 Availability Zone 2 Availability Zone 1 Availability Zone 2
Inspection VPC 1: 192.168.1.0/24
TGW 1 Inspection Route Table
GWLBE Subnet 1 GWLBE Subnet 2
Associated with Inspection VPC
and TGW Peering
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC
Option 1: Single Inspection
Region 1 Region 2
Availability Zone 1 Availability Zone 2 Availability Zone 1 Availability Zone 2
Inspection VPC 1: 192.168.1.0/24
TGW 1 Inspection Route Table
GWLBE Subnet 1 GWLBE Subnet 2
Associated with Inspection VPC
and TGW Peering
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Packet Flow
Centralized Model: VPC to VPC
Option 2: Double Inspection
Region 1 Region 2
Availability Zone 1 Availability Zone 2 Availability Zone 1 Availability Zone 2
Inspection VPC 1: 192.168.1.0/24 Inspection VPC 2: 192.168.2.0/24
TGW 1 Inspection Route Table TGW 2 Inspection Route Table
GWLBE Subnet 1 GWLBE Subnet 2 GWLBE Subnet 1 GWLBE Subnet 2
Associated with Inspection VPC Associated with Inspection VPC
Routes: Routes:
GWLBE 1 GWLBE 2 10.1.1.0/24 via Spoke VPC 1 Attachment 10.2.2.0/24 via Spoke VPC 2 Attachment GWLBE 1 GWLBE 2
10.2.0.0/16 via TGW Peer Attachment 10.1.0.0/16 via TGW Peer Attachment
TGW Subnet 1 TGW Subnet 2 TGW Subnet 1 TGW Subnet 2
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC
Option 2: Double Inspection
Region 1 Region 2
Availability Zone 1 Availability Zone 2 Availability Zone 1 Availability Zone 2
Inspection VPC 1: 192.168.1.0/24 Inspection VPC 2: 192.168.2.0/24
TGW 1 Inspection Route Table TGW 2 Inspection Route Table
GWLBE Subnet 1 GWLBE Subnet 2 GWLBE Subnet 1 GWLBE Subnet 2
Associated with Inspection VPC Associated with Inspection VPC
Routes: Routes:
GWLBE 1 GWLBE 2 10.1.1.0/24 via Spoke VPC 1 Attachment 10.2.2.0/24 via Spoke VPC 2 Attachment GWLBE 1 GWLBE 2
10.2.0.0/16 via TGW Peer Attachment 10.1.0.0/16 via TGW Peer Attachment
TGW Subnet 1 TGW Subnet 2 TGW Subnet 1 TGW Subnet 2
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Packet Flow
Hybrid Architecture
VPC and On Premises
2025
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Connectivity to AWS
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Model: VPC to VPC
DX Co-Location Facility
On Premises
AWS Cloud
Transit VIF
Cross-connect
DX Co-Location Facility
On Premises
AWS Cloud
Transit VIF
Cross-connect
Packet
Customer or AWS Device
Partner Direct Connect
Device
Gateway
TGW Inspection Route Table
Customer or AWS Cage
Partner
Cage Associated with Inspection VPC
Note
You can use the same model for inspection of traffic to other AWS Regions using AWS Transit Gateway Inter-Region Peering feature
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.