In this hands-on guide, you’ll build a ready-to-use AWS networking environment in just a few minutes. You will create a fully functional VPC with public and private subnets, internet access, routing, and security controls, then launch an EC2 instance to verify that everything works as expected. This is one of the fastest ways to get a working VPC layout, especially if you're just starting to explore AWS networking and want something reliable to build on.
Step 1: Create the VPC
- Open the VPC Console.
- Select Create VPC.
- Choose VPC and more.
- Set:
- Name: my-quickstart-vpc
- Number of AZs: 2 or 3 (default is fine)
- Customize subnets: optional
- Leave other defaults as-is
- Create the VPC.
AWS will automatically provision all required networking components.
Step 2: Review Your Subnets
After creation, go to Subnets.
You’ll see:
- Public subnets (routed to the IGW)
- Private subnets (routed through the S3 Gateway Endpoint)
- Subnets distributed across two Availability Zones (for example, us-east-1a and us-east-1b)
This gives you a practical multi-AZ layout without manual planning.
Step 3: Check the Internet-Enabled Path
Open Internet Gateways.
You should see the IGW attached to your new VPC.
This is what gives public subnets outbound internet access.
Step 4: Launch an EC2 Instance
- Go to the EC2 Console → Launch instance.
- Configure:
- AMI: Amazon Linux 2
- Instance type: t3.micro (free tier eligible)
- Key pair: Create a new key pair named "hands-on-key" (RSA, .pem)
- Network: my-quickstart-vpc
- Subnet: choose one of the public subnets
- Auto-assign public IP: Enabled
- Security Group: use the default SG or create one allowing SSH
- Launch the instance.
Step 5: Connect and Test Connectivity
Connect to the instance using SSH:
ssh -i hands-on-key.pem ec2-user@<public-ip>
A successful connection confirms that:
- The instance has a public IP
- The route table is correctly configured
- Port 22 is allowed by the Security Group
- Outbound internet access
From inside the instance:
curl https://www.google.com
A successful response confirms outbound internet connectivity.
Troubleshooting
No public IP
Ensure the selected subnet is public and auto-assign is enabled.SSH blocked
Check your SG inbound rule for port 22.curl fails
Make sure the public route points to the IGW.
Tips for Using This VPC Setup
- Use clear and consistent naming for VPCs, subnets, and route tables.
- Place internet-facing resources in public subnets only.
- Keep backend workloads in private subnets to reduce exposure.
- Treat this VPC as a baseline that can be extended as your architecture grows.
Conclusion
You now have a functional multi-AZ VPC with clearly separated public and private subnets and internet connectivity through an Internet Gateway. This setup illustrates how AWS networking components work together to manage traffic flow and resource isolation, and it provides a solid foundation for future architectural extensions.




Top comments (0)