Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Shay_Levin
Admin
Admin

AWS - Finally Allow You to Inspect Traffic Between Subnets In a VPC

Until today, AWS didn't allow to add to a routing table a more specific route than the default VPC local route.

For example, when the VPC range is 10.0.0/16 and a subnet has 10.0.1.0/24, a route to 10.0.1.0/24 is more specific than a route to 10.0.0/16.

Routing tables no longer have this restriction. Routes in a routing table can have routes more specific than the default local route. You can use such a more specific route to send all traffic to a dedicated virtual appliance to inspect, analyze, or filter all traffic flowing between two subnets (east-west traffic). The route target can be the network interface (ENI) attached to a CloudGuard Gateway, an AWS Gateway Load Balancer (GWLB) endpoint to distribute traffic to multiple appliances for performance or high availability reasons.

It also allows inserting a virtual appliance between a subnet and an AWS Transit Gateway.

Check out the bellow simple use case

Traffic that is being sent between Subnet QA and Subnet Prod is now inspected by the CloudGuard Gateway.

This is the most basic use case, you can leverage it and use it in more complex use case where you have multiple VPC, TGW, and Gateway LoadBalnacer.

Feel free to comment and ask any question.

AWS Diagram-Copy of AWS DeepDive.drawio.png

 

 

 

 

9 Replies
This widget could not be displayed.

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.