VPC security

To open an application up to other VPCs, we can either:

  • Open the VPC up to the internet:

    • Security considerations; everything in the public subnet is public

    • A lot more to manage

  • Use VPC Peering:

    • You will need to create and manage may different peering relationships.

    • The whole network will be accessible. This isn's good if you have multiple applications within your VPC

Does VPC Peering use a Virtual private gateway?

No, VPC Peering does not use a Virtual Private Gateway (VGW).

VPC Peering creates a direct network connection between two VPCs using AWS's internal network infrastructure. The connection is established through:

  • A peering connection resource that you create between the VPCs

  • Route table entries that direct traffic through the peering connection

  • AWS's underlying network fabric

Virtual Private Gateway is a different AWS component used specifically for:

  • VPN connections between your VPC and on-premises networks

  • AWS Direct Connect connections

  • Transit Gateway attachments

Key differences:

  • VPC Peering: VPC-to-VPC communication within AWS

  • Virtual Private Gateway: VPC-to-external network communication (on-premises, other cloud providers)

What VPC Peering actually uses:

  • AWS's internal network backbone

  • Peering connection endpoints within each VPC

  • Modified route tables to direct traffic

  • Security groups and NACLs for access control

The peering connection appears as a logical network interface in your route tables, but it's implemented through AWS's software-defined networking rather than through a virtual gateway appliance.

Last updated

Was this helpful?