DEV Community

Cover image for Day 11 - AWS VPC
Rahul Joshi
Rahul Joshi

Posted on

Day 11 - AWS VPC

When you start learning AWS, services like EC2, S3, Lambda, and RDS feel exciting.

But behind almost every real AWS architecture, there is one silent foundation:

Amazon VPC β€” Virtual Private Cloud

If EC2 is your server, RDS is your database, and ALB is your traffic manager, then VPC is the private network where all these resources live.

In this blog, we will understand:

  • What is VPC
  • CIDR and subnetting basics
  • Public and private subnets
  • Route tables
  • Internet Gateway
  • Security Groups
  • VPC Peering
  • Step-by-step VPC Peering example

πŸ”— Resources


What is AWS VPC?

Amazon VPC stands for Virtual Private Cloud.

A VPC is your own isolated network inside AWS. AWS describes it as a virtual network dedicated to your AWS account where you can define IP ranges, create subnets, configure route tables, attach gateways, and apply security controls.

Think of it like this:

AWS Cloud
 └── Your VPC
      β”œβ”€β”€ Public Subnet
      β”œβ”€β”€ Private Subnet
      β”œβ”€β”€ Route Tables
      β”œβ”€β”€ Internet Gateway
      β”œβ”€β”€ Security Groups
      └── EC2 / RDS / Load Balancer
Enter fullscreen mode Exit fullscreen mode

In a traditional data center, you create networks, switches, routers, firewalls, and subnets manually.

In AWS, VPC gives you similar networking control, but in a cloud-native way.

VPC Dashboard

Image vpc


Why VPC is Important

Without a VPC, your cloud architecture has no proper network boundary.

A VPC helps you:

  • Isolate your AWS resources
  • Control inbound and outbound traffic
  • Separate public and private workloads
  • Connect multiple AWS services securely
  • Build production-ready cloud architecture
  • Connect different VPCs using VPC Peering
  • Connect AWS with on-premise networks using VPN or Direct Connect

Example:

Public Subnet  β†’ Load Balancer / Bastion Host
Private Subnet β†’ Application Server / Database
Enter fullscreen mode Exit fullscreen mode

This separation is one of the most important cloud security practices.


CIDR and Subnetting Basics

Before understanding subnets, you need a little idea about CIDR.

CIDR stands for Classless Inter-Domain Routing.

In simple words, CIDR defines the IP address range of your network.

Example:

10.0.0.0/16
Enter fullscreen mode Exit fullscreen mode

This means your VPC has a large private IP range starting from 10.0.0.0.

The /16 tells how big the network is.

Common examples:

10.0.0.0/16    β†’ Large VPC range
10.0.1.0/24    β†’ Smaller subnet range
10.0.2.0/24    β†’ Another subnet range
Enter fullscreen mode Exit fullscreen mode

Simple way to understand:

VPC CIDR:       10.0.0.0/16

Public Subnet:  10.0.1.0/24
Private Subnet: 10.0.2.0/24
DB Subnet:      10.0.3.0/24
Enter fullscreen mode Exit fullscreen mode

So the VPC is the big network, and subnets are smaller parts inside that network.


What is a Subnet?

A subnet is a smaller IP range inside your VPC.

AWS says a subnet is a range of IP addresses inside your VPC where you can launch resources like EC2 instances. ([AWS Documentation][1])

Example:

VPC: 10.0.0.0/16

Subnet A: 10.0.1.0/24
Subnet B: 10.0.2.0/24
Subnet C: 10.0.3.0/24
Enter fullscreen mode Exit fullscreen mode

Subnets are created inside Availability Zones.

Example:

VPC: 10.0.0.0/16

AZ-1:
 └── Public Subnet: 10.0.1.0/24

AZ-2:
 └── Private Subnet: 10.0.2.0/24
Enter fullscreen mode Exit fullscreen mode

Subnetting description

Public Subnet vs Private Subnet

A subnet becomes public or private based on its route table.

Public Subnet

A public subnet has a route to the internet through an Internet Gateway.

Example route:

Destination: 0.0.0.0/0
Target: Internet Gateway
Enter fullscreen mode Exit fullscreen mode

Public subnet is useful for:

  • Load balancer
  • Bastion host
  • Public EC2 instance
  • NAT Gateway

Private Subnet

A private subnet does not have a direct route to the Internet Gateway.

Private subnet is useful for:

  • Application servers
  • Databases
  • Internal services
  • Backend workloads

Example:

Private Subnet
 └── EC2 App Server
 └── RDS Database
Enter fullscreen mode Exit fullscreen mode

In production, databases should usually stay in private subnets.


Route Tables

A route table controls where network traffic goes.

AWS defines a route table as a set of rules, called routes, that decide where traffic from your subnet or gateway is directed. ([AWS Documentation][2])

Example route table:

Destination       Target
10.0.0.0/16       local
0.0.0.0/0         igw-xxxxxxxx
Enter fullscreen mode Exit fullscreen mode

Meaning:

10.0.0.0/16 β†’ Traffic inside VPC
0.0.0.0/0   β†’ Traffic to internet through Internet Gateway
Enter fullscreen mode Exit fullscreen mode

Every subnet must be associated with a route table. A subnet can be associated with only one route table at a time, but one route table can be associated with multiple subnets.

Route table description


Internet Gateway

An Internet Gateway allows communication between your VPC and the internet.

For a subnet to become public, two things are required:

1. Internet Gateway attached to VPC
2. Route table route:
   0.0.0.0/0 β†’ Internet Gateway
Enter fullscreen mode Exit fullscreen mode

Internet gateway

Architecture:

Internet
   ↓
Internet Gateway
   ↓
Public Route Table
   ↓
Public Subnet
   ↓
EC2 Instance
Enter fullscreen mode Exit fullscreen mode

Without an Internet Gateway route, your subnet will not be publicly reachable.

Internet gateway


Security Groups

A Security Group acts like a virtual firewall for AWS resources.

AWS explains that a security group controls traffic allowed to reach an instance, and only traffic allowed by security group rules can reach that resource.

Security Groups are attached to resources like:

  • EC2
  • RDS
  • Load Balancer
  • Lambda inside VPC

Example Security Group rule:

Inbound Rules:

Type        Port     Source
SSH         22       Your IP
HTTP        80       0.0.0.0/0
HTTPS       443      0.0.0.0/0
Enter fullscreen mode Exit fullscreen mode

Important point:

Security Groups are stateful.

That means if inbound traffic is allowed, response traffic is automatically allowed.


VPC Peering

VPC Peering allows two VPCs to communicate privately using private IP addresses.

Example:

VPC-A: 10.0.0.0/16
VPC-B: 192.168.0.0/16
Enter fullscreen mode Exit fullscreen mode

After VPC Peering:

EC2 in VPC-A can communicate with EC2 in VPC-B privately.
Enter fullscreen mode Exit fullscreen mode

Use cases:

  • Connect two application VPCs
  • Connect shared services VPC with app VPC
  • Connect dev VPC with monitoring VPC
  • Connect VPCs across accounts
  • Connect VPCs across regions

Important: VPC Peering does not support overlapping CIDR blocks. AWS states that you cannot create a VPC peering connection if the VPCs have matching or overlapping IPv4 or IPv6 CIDR blocks.

vpc peering


Step-by-Step Example: Create VPC Peering

Let’s say we have two VPCs:

VPC-A: 10.0.0.0/16
VPC-B: 192.168.0.0/16
Enter fullscreen mode Exit fullscreen mode

Goal:

EC2 instance in VPC-A should communicate with EC2 instance in VPC-B.
Enter fullscreen mode Exit fullscreen mode

Step 1: Create VPC-A

Go to:

AWS Console β†’ VPC β†’ Create VPC
Enter fullscreen mode Exit fullscreen mode

Create:

Name: VPC-A
CIDR: 10.0.0.0/16
Enter fullscreen mode Exit fullscreen mode

Create subnet:

Name: VPC-A-Private-Subnet
CIDR: 10.0.1.0/24
Enter fullscreen mode Exit fullscreen mode

Step 2: Create VPC-B

Create second VPC:

Name: VPC-B
CIDR: 192.168.0.0/16
Enter fullscreen mode Exit fullscreen mode

Create subnet:

Name: VPC-B-Private-Subnet
CIDR: 192.168.1.0/24
Enter fullscreen mode Exit fullscreen mode

Step 3: Launch EC2 Instances

Launch one EC2 instance in each VPC.

EC2-A β†’ VPC-A β†’ 10.0.1.0/24 subnet
EC2-B β†’ VPC-B β†’ 192.168.1.0/24 subnet
Enter fullscreen mode Exit fullscreen mode

Make sure both instances have private IPs.

Example:

EC2-A Private IP: 10.0.1.10
EC2-B Private IP: 192.168.1.10
Enter fullscreen mode Exit fullscreen mode

Step 4: Create VPC Peering Connection

Go to:

VPC Console β†’ Peering Connections β†’ Create Peering Connection
Enter fullscreen mode Exit fullscreen mode

Fill details:

Name: VPC-A-to-VPC-B
Requester VPC: VPC-A
Accepter VPC: VPC-B
Enter fullscreen mode Exit fullscreen mode

Click:

Create Peering Connection
Enter fullscreen mode Exit fullscreen mode

Step 5: Accept Peering Request

Go to:

VPC β†’ Peering Connections
Enter fullscreen mode Exit fullscreen mode

Select the request.

Click:

Actions β†’ Accept Request
Enter fullscreen mode Exit fullscreen mode

Now the peering connection status should become:

Active
Enter fullscreen mode Exit fullscreen mode

Step 6: Update Route Table of VPC-A

Go to VPC-A route table.

Add route:

Destination: 192.168.0.0/16
Target: VPC Peering Connection
Enter fullscreen mode Exit fullscreen mode

AWS requires route tables on both sides to be updated so private IPv4 traffic can flow between peered VPCs. The destination should be the peer VPC CIDR and the target should be the VPC peering connection. ([AWS Documentation][6])


Step 7: Update Route Table of VPC-B

Go to VPC-B route table.

Add route:

Destination: 10.0.0.0/16
Target: VPC Peering Connection
Enter fullscreen mode Exit fullscreen mode

Now both VPCs know how to reach each other.


Step 8: Update Security Groups

For EC2-A security group, allow traffic from VPC-B:

Type: ICMP / SSH / Custom TCP
Source: 192.168.0.0/16
Enter fullscreen mode Exit fullscreen mode

For EC2-B security group, allow traffic from VPC-A:

Type: ICMP / SSH / Custom TCP
Source: 10.0.0.0/16
Enter fullscreen mode Exit fullscreen mode

For testing ping:

Allow ICMP
Enter fullscreen mode Exit fullscreen mode

For testing SSH:

Allow TCP 22
Enter fullscreen mode Exit fullscreen mode

Step 9: Test Connectivity

Login to EC2-A and ping EC2-B private IP:

ping 192.168.1.10
Enter fullscreen mode Exit fullscreen mode

Or test SSH:

ssh ec2-user@192.168.1.10
Enter fullscreen mode Exit fullscreen mode

If route tables and security groups are correct, communication should work privately.


Final Thoughts

AWS VPC is one of the most important concepts in cloud networking.

If you understand VPC properly, then services like EC2, Load Balancer, RDS, EKS, Lambda networking, VPN, Direct Connect, and Transit Gateway become much easier.

At a high level, remember this:

VPC = Your private network in AWS
Subnet = Smaller network inside VPC
Route Table = Traffic direction rules
Internet Gateway = Internet access
Security Group = Firewall for resources
VPC Peering = Private connection between two VPCs
Enter fullscreen mode Exit fullscreen mode

Top comments (0)