what is the usage of CIDR notation route rule in aws - amazon-web-services

I have created a VPC and internet gate way. And attached internet gateway to the vpc. Create two subnets one is public subnet and another is private subnet. And created a route table to route the traffic. In route table added a route rule 0.0.0.0/0 to IGW(internet gatway). To test this I launch a EC2 instance in public subnet. I have generated a public IP address example : (554.6.8.24). Using that IP address do ssh and I am connecting from local machine to EC2 instance.
My question is I am connecting to the EC2 instance from my local machine using public IP. What is the point of adding route rule in 0.0.0.0/0 to IGW(internet gatway) in route table?. With out route rule can I connect to Ec2?

If an Internet Gateway is not present in an Amazon VPC, then that VPC has no connection to the Internet. This can be very useful for creating private networks.
If you want to connect a VPC to the Internet, then you need to:
Create an Internet Gateway for that VPC
Create a Route Table that sends traffic to the Internet Gateway
Attach the Route Table to a Subnet (thereby making that subnet a Public Subnet since it routes to the Internet Gateway)
Put resources inside the Public Subnet (eg EC2 instances)
In contrast, Private subnets do not have a Route Table entry that points to an Internet Gateway. Therefore, those subnets cannot access the Internet. This is an added layer of security to prevent access to private resources.
The only difference between a Public Subnet and a Private Subnet is having the Route Table entry that points to an Internet Gateway. Without that entry, a subnet will remain private.

Related

AWS VPC with both internet gateway and NAT

I am lost on how to provide outbound internet access to AWS Lambda in our VPC while also having internet gateway to support inbound access (from Internet) to certain resources in our VPC.
From the documentation provided (below), I understand we need to create a private and public subnet (with NAT), and have one route table pointing to IGW, and another to the NAT.
https://aws.amazon.com/premiumsupport/knowledge-center/internet-access-lambda-function/
Our setup is as follows.
VPC
Private subnet
Public subnet
Route Table
Table1
Public subnet
0.0.0.0/0 - IGW
Table2
Private subnet
0.0.0.0/0 - NAT
Lambda
VPC
Private subnet
RDS (Need access from outside of VPC)
Under VPC
With this setup, Lambda can access internet but the setup stops external inbound access to our resources in the VPC.
If we reroute our 0.0.0.0/0 in our private subnet to IGW, we can access our resources in VPC from external network but the Lambda loses connectivity to Internet.
Any one has clarity on how to set this up?
Appreciate any views on this.
Just move the resources that need to be publicly accessible into a public subnet (a subnet with a route to the Internet Gateway). The Lambda function has to remain in a private subnet (a subnet with a route to a NAT Gateway).
So in your case the RDS instance should be in the public subnet, and the Lambda function should be in the private subnet.

AWS VPC - Private subnet added to the public route table attached to internet gateway

Hope you are all doing good.
AWS allows us to attach a private subnet (created in a Customer VPC) with a route table having route to the internet via internet gateway. Does it make any difference to the instance launched in the private sub-net? or it is as good as having the private subnet not linked to the route table having route to the internet
Regards
AJ
A subnet is not private if it has routes to/from the internet. The instances launched in a private subnet cannot access the internet and cannot be reached from the internet.
For e.g if you have a database instance and you don't want anyone but the instances to access the instance, you can launch the instance in the private subnets.
Also if you want the instances in the private subnet to access internet, you need to setup a Nat Gateway (or a Nat Instance)
Hope this helps
First, we need to know what's the difference between a public subnet and a private subnet.
Public Subnet means this subnet has an Internet Gateway attached to it.
Private Subnet means this subnet has a NAT Gateway attached to it.
And the Internet Gateway can have both inbound and outbound but the NAT only can have outbound to the Internet.
And A NAT will be built in a public subnet but attach to a private subnet.
You can have lots of public/private subnets at the same time and attached NAT or IGW for them, but the IGW only can have one in each VPC.
In some use cases, we will not attach any kinds of NAT and IGW for a subnet. that's because it might be a database subnet and won't expect it to communicate with the Internet.
Normally, we will use a subnet with NAT attached for our application such as EC2 or ECS, Internal Load Balancers.
On the other hand, we will use a subnet with IGW attached for Internet-facing Load balancers, Nginx, Apache.
AWS VPC Design:
https://aws.amazon.com/tw/answers/networking/aws-single-vpc-design/
I think the hidden magic here is that the instance in the private subnet needs a public IP to communicate with outside, we never ever think this an issue in our lives. When our computer connect to the router, it get access to internet without any issue, why it works so smoothly? All because the router handles everything for us, including allocating a private IP for us, making recursively DNS query for us, and the most important, translating the private IP using the router's public IP so that our computer can communicate with the outside bidirectionally.
Let's go back to this AWS VPC scenario, you attached a route table with a default route to the Internet Gateway to your private subnet, which makes it looks like a public subnet. However, the instances still have no public IPs, and, not like our router, the Internet Gateway of AWS VPC doesn't do NAT works! So how can an instance with no public IP and no NAT access the internet? It's impossible.

Lambda function access rds instance (with Internet Gateway)

The link explains that need to use NAT Gateway for the public subnet to make it possible to access the internet and the lambda function access the RDS instance. First does it realy have to be NAT Gateway can't use instead a Internet Gateway for that purpose?
Second have two Route Tables one named PublicNetwork that haves two subnets and the route haves one Internet Gateway,
the second Route Table that haves only one subnet called PrivateNetwork.
when had only one Route Table with all 3 subnets could access the rds (db) instance with Microsoft SQL Server Management (security group with inbound rules of type MS SQL and Source my ip address) now with the changes can't access anymore.
My database in RDS haves in Subnet group my default-vpc that haves the 3 subnets is it needed to create another vpc and transfer the private subnet to it to be able to access my database again?
All subnets in a VPC can communicate with each other
An Internet Gateway connects the VPC to the Internet
Any subnet that has a Route Table pointing 0.0.0.0/0 to the Internet Gateway is called a Public Subnet (because it can directly communicate with the Internet)
Any subnet that does not have such a Route table entry is called a Private Subnet
If a resource in a private subnet needs to communicate with the Internet, it must send the network traffic via a NAT Gateway in the Public Subnet. The NAT Gateway will forward the traffic to the Internet, then return any response that is received.
If you are having difficulty connecting to resources within the same VPC, then the Security Group is the most likely cause of the problem.

I can't connect through RDP to my EC2 Windows instance

NETWORK:
I have a private subnet and a public subnet. A VPC with IG attached. There is a NAT Gateway in the public subnet. I also have 2 route table, the public route table routes everything to the IG, the private route table routes everything to the NAT Gateway.
EC2:
My EC2 Windows instance is in the private subnet with a EIP and a Public DNS. It has a security group that allows all fron internet inbound/outbound but i cant even ping neither rdp
All the machine or instances in the private subnet cannot be connected externally hence the name private subnet. If you want to connect to your instance externally you must place it in the public subnet (the subnet that is connected to the internet gateway). Eventhough, you attach an elastic ip (which is a public ip) but it is routed through a NAT. The EIP must go through the internet gateway only.
If you really want to connect you need to VPN to your VPC (using AWS VPC VPN) and then RDP to your instance. Or have a gate instance in your public subnet.
Verify that the route table for the subnet has a route that sends all traffic destined outside the VPC to the internet gateway for the VPC. For more information, see Creating a Custom Route Table (Internet Gateways) in the Amazon VPC User Guide.

Mailing isn't working in Django AWS Lambda (Zappa) behind a VPC

I have an AWS lambda function (Django zappa) that is running inside a VPC thus I'm not able to send emails because Lambda isn't connected to the internet, I tried NAT Gatway but with no hope.
I created a NAT Gatway using one public subnet of the VPC.
Created another private subnet with a route table that routes 0.0.0.0/0 to the NAT Gateway.
I would appreciate any help.
Go to VPC Dashboard and use the Launch VPC Dashboard
Create (Allocate) an elastic IP address and keep it handy. Select the option VPC with Public and Private Subnets
Configure the subnet CIDRs and associate the elastic IP created in the previous step in the form. This will create a NAT Gateway and set it up automatically with correct route tables.
Things to note:
NAT Gateway should always be in the public subnet.
Route table of Private Subnet should have a route 0.0.0.0/0 to NAT Gateway
Route table of Public Subnet should have a route 0.0.0.0/0 to Internet Gateway
Lambda function should be configured with the Private Subnet and not the Public Subnet
Security Group configured in the lambda function should allow outbound to 0.0.0.0/0 (which is there by default, but you should verify)