Example Routing tables configuration
This is an example routing configuration for your multi-account transit gateway setup. The configuration includes:
A transit gateway route table with routes to all three VPCs
Individual VPC route tables for each VPC
Configuration notes including CIDR allocations and future considerations
Security recommendations
The routing tables are designed to:
Allow direct communication between all VPCs through the transit gateway
Keep inter-VPC traffic off the public internet
Support future expansion to additional VPCs and regions
Maintain proper isolation where needed
Transit Gateway and VPC Routing Configuration
Transit Gateway Route Table
The transit gateway route table will contain routes for all VPC CIDR blocks and direct traffic to the appropriate VPC attachments.
VPC Route Tables
VPC 1 Route Table (Account 1)
VPC 2 Route Table (Account 1)
VPC 3 Route Table (Account 2)
Configuration Notes
Each VPC has its own CIDR block:
VPC 1: 10.1.0.0/16
VPC 2: 10.2.0.0/16
VPC 3: 10.3.0.0/16
Transit Gateway Configuration:
Auto-accept shared attachments: Enabled
Default route table association: Disabled
Default route table propagation: Disabled
DNS support: Enabled
VPN ECMP support: Enabled
Default route table: tgw-rtb-main
Transit Gateway Attachments:
Each VPC has a dedicated transit gateway attachment
Subnet route tables in each VPC point to their respective transit gateway attachment for inter-VPC traffic
Transit gateway attachments are associated with the main transit gateway route table
Future Considerations:
For additional VPCs in different regions:
Create new transit gateway in target region
Set up transit gateway peering attachment
Add routes for the new CIDR blocks in all route tables
Update transit gateway route tables in both regions
For new VPCs in same region:
Create new transit gateway attachment
Add routes for the new CIDR block in all route tables
Associate attachment with transit gateway route table
Security Considerations:
Network ACLs and Security Groups should be configured to allow necessary inter-VPC traffic
Consider implementing network traffic monitoring
Implement proper IAM roles and resource sharing between accounts
Enable flow logs for security analysis and troubleshooting
Last updated
Was this helpful?