<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Nehemiah Cheburet</title>
    <description>The latest articles on DEV Community by Nehemiah Cheburet (@nehemiah_cheburet_298053c).</description>
    <link>https://dev.to/nehemiah_cheburet_298053c</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3663682%2F3acb081f-a849-4e0f-b0ec-ae1bb39025b0.png</url>
      <title>DEV Community: Nehemiah Cheburet</title>
      <link>https://dev.to/nehemiah_cheburet_298053c</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/nehemiah_cheburet_298053c"/>
    <language>en</language>
    <item>
      <title>How to create a VPC with Public and Private Subnets (NAT Gateway and Bastion Host)</title>
      <dc:creator>Nehemiah Cheburet</dc:creator>
      <pubDate>Wed, 14 Jan 2026 19:56:52 +0000</pubDate>
      <link>https://dev.to/nehemiah_cheburet_298053c/how-to-create-a-vpc-with-public-and-private-subnets-nat-gateway-and-bastion-host-4a4</link>
      <guid>https://dev.to/nehemiah_cheburet_298053c/how-to-create-a-vpc-with-public-and-private-subnets-nat-gateway-and-bastion-host-4a4</guid>
      <description>&lt;p&gt;In the world of cloud computing, "default" settings are often the enemy of security. When you launch your first resource on AWS, it’s tempting to put everything in a public subnet for the sake of simplicity. However, in a production environment, exposing your application servers or databases directly to the internet is like leaving your front door wide open in a crowded city.&lt;/p&gt;

&lt;p&gt;The gold standard for cloud networking is the Virtual Private Cloud (VPC) configured with a "Public-Private" split.&lt;/p&gt;

&lt;p&gt;By isolating your sensitive resources in a private subnet, you ensure they are invisible to the public web. But this raises two critical questions:&lt;/p&gt;

&lt;p&gt;How do your private servers get out? (e.g., for software updates or API calls).&lt;/p&gt;

&lt;p&gt;How do you get in? (e.g., for maintenance or troubleshooting).&lt;/p&gt;

&lt;p&gt;The answer lies in two essential components: the NAT Gateway and the Bastion Host.&lt;/p&gt;

&lt;p&gt;In this guide, we will walk through the end-to-end process of building a secure, professional-grade network architecture. We’ll cover everything from CIDR blocks and route tables to configuring the "Jump Box" that keeps your environment both accessible and airtight.&lt;/p&gt;

&lt;p&gt;Whether you are preparing for the AWS Solutions Architect exam or building a secure home for your next big project, this walkthrough will give you the foundational knowledge you need to deploy with confidence.&lt;/p&gt;

&lt;p&gt;**Defining the VPC&lt;br&gt;
**In the AWS Console, when you head to VPC &amp;gt; Your VPCs &amp;gt; Create VPC, you generally have two choices: "VPC only" or "VPC and more." For this guide, let's focus on VPC only to understand the manual configuration of each component.&lt;/p&gt;

</description>
      <category>aws</category>
      <category>vpc</category>
      <category>bastionhost</category>
      <category>natgateway</category>
    </item>
  </channel>
</rss>
