Design and set up a Virtual Private Cloud (VPC) with public and private subnets. Implement routing, security groups, and network access control lists (NACLs) to ensure proper communication and security within the VPC. Work in the AWS EU-West-1 (Ireland) region.
VPC (Virtual Private Cloud): A logically isolated section of the AWS cloud where you can launch AWS resources in a virtual network.
- Public Subnet: A subnet with a route to an internet gateway, making its resources accessible from the internet.
- Private Subnet: A subnet that does not have a direct route to the Internet.
- Internet Gateway (IGW): A horizontally scaled, redundant, and highly available VPC component that allows communication between instances in KCVPC and the internet.
- NAT Gateway: Allows instances in a private subnet to connect to the internet or other AWS services, but prevents the internet from initiating a connection with those instances.
- Public Route Table: Directs internet traffic to the IGW.
- Private Route Table: Routes internet traffic to the NAT Gateway.
Are Virtual firewalls that control inbound and outbound traffic for your instances.
- Network ACLs (NACLs): Provide an additional layer of security for your VPC by controlling traffic to and from one or more subnets.
- A network access control list (NACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. You might set up network ACLs with rules similar to your security groups in order to add a layer of security to your VPC.
- Login to the AWS Console, search for VPC
- Name: KCVPC
- IPv4 CIDR block: 10.0.0.0/16
![VPC](https://private-user-images.githubusercontent.com/67696393/346345240-6464103a-7f57-4d39-ad1c-777afa158c4a.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.shkM9oJsJR2RKvTZRhDrBt-O4YJyRx1IQtdX7mxL9RI)
- Public Subnet:
- Name: PublicSubnet
- IPv4 CIDR block: 10.0.1.0/24
- Availability Zone: Select anyone from your region
- Private Subnet:
- Name: PrivateSubnet
- IPv4 CIDR block: 10.0.2.0/24
- Availability Zone: Select anyone from your region
- Create and attach an IGW to KCVPC.
![IGW2VPC](https://private-user-images.githubusercontent.com/67696393/346345626-40b1a2d6-8cde-46c5-a737-8529c0cc763b.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.xcE3QNjqQ0UsUFSB3NFNbqrwHLebAcw7dDC2m0asR9U)
- Public Route Table:
- Name: PublicRouteTable
![RT](https://private-user-images.githubusercontent.com/67696393/346347617-ba807b39-7545-435d-abfe-ee3b65bc49d0.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.Po08VZcTZlv7AiHcwADRMZdhX_C_Gwql0Q6tcqs1rZM)
- Associate PublicSubnet with this route table.
- Add a route to the IGW (0.0.0.0/0 -> IGW).
![PublicSNRT](https://private-user-images.githubusercontent.com/67696393/346345666-67c7cd4e-6f46-4ef2-a5d2-2b9c739e7838.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.frfYDX4-Rxpnz3_kx1R4OkWLzfEYZt-3fgn6nc2Pocw)
- Private Route Table:
- Name: PrivateRouteTable
- Associate PrivateSubnet with this route table.
- There should not be any direct route to the internet.
![PrivateSNRT](https://private-user-images.githubusercontent.com/67696393/346345688-54502399-c5bc-48ef-ba13-4c3b1544d0d4.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.3ObeIgmIl3SuNXT0cJc_pt-1M2qbXWno4R-7c2enr2c)
- Create a Security Group for public instances (e.g., web servers):
- Allow inbound HTTP (port 80) and HTTPS (port 443) traffic from anywhere (0.0.0.0/0).
- Allow inbound SSH (port 22) traffic from a specific IP (e.g., your local IP). (https://www.whatismyip.com/)
- Allow all outbound traffic.
- Create a Security Group for private instances (e.g., database servers):
- Allow inbound traffic from the PublicSubnet on required ports (e.g., MySQL port 3306).
- Allow all outbound traffic.
- Configure NACLs for additional security on both subnets.
- Public Subnet NACL: Allow inbound HTTP, HTTPS, and SSH traffic. Allow outbound traffic.
- Private Subnet NACL: Allow inbound traffic from the public subnet. Allow outbound traffic to the public subnet and internet.
![NACL](https://private-user-images.githubusercontent.com/67696393/346347965-8bc247e1-ee5c-471f-970b-ec31c955acf0.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.TKR1uccpCvAnpuXqnUhXvbVTWs3F2XashMMLYfUutHQ)
- Launch an EC2 instance in the public subnet:
- Use the public security group.
- Verify that the instance can be accessed via the internet.
- Launch an EC2 instance in the private subnet:
- Use the private security group.
- Verify that the instance can access the internet through the NAT Gateway and can communicate with the public instance.
![Instances](https://private-user-images.githubusercontent.com/67696393/346353224-b867ffb8-7b5f-46c9-becb-3705bf21dcbe.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.1stGPAelg8bwioN7-P-x-DAc1RMoR1rsYOvYNrkYfa0)