How To Use Transit Gateways To Monitor Traffic

Amazon Web Services ( AWS) cloud network connectivity is something many businesses have begun using, as it allows them to create run different network architectures. It has made migration of on premises services to the cloud a lot easier overall. 

In the past, businesses would need to use Virtual Private Cloud (VPC)  peering or Transit VPCs to create a system that allowed for connectivity between between on site centers and applications running in the cloud. This wasn't scalable though, and didn't allow for increased connectivity. 

Transit gateways are a new way of managing traffic through different VPCs and AWS accounts, making it a lot easier to use. Here's how the system works. 

What Is A Transit Gateway?

A transit gateway is a hub that connects up VPCs and on premises networks. It can support all kinds of attachments, from VPCs to VPN connections, SD-WAN network appliances, and AWS gateways too. 

There are several features a network gateway can offer you, so they're worth looking into:

Availability zone: A VPC attachment will create a network interface in the Availability Zone. When this has been enabled, you can use any subnet to route traffic through the transit gateway. 

Routing: You can handle complex routing needs with a transit gateway. You can have both dynamic and static routing tables, according to your needs. Static routes and black hole routes are available to uses, when you need to isolate attachments from each other. 

Inter region peering: Using an inter region attachment, you can peer transit gateways in different regions. This allows you to create global networks and take advantage of low latency communication, essential when your business is spread across different regions. 

Cross account connectivity: An AWS resource access manager can be used to share a transit gateway, and control communication between accounts. 

On premises connection: As a user, you can connect to the transit gateway by using a direct connect gateway. That allows you to connect while being on premises. It also allows for the creation of a backup, if needed. 

Multicast communication: A multicast protocol will allow you to deliver a single stream of data to several hosts at the same time. This is something that's highly useful in several fields, such as those working in video transcoding on the financial fields. 

How To Put Together Transit Gateway Topologies

One of the best things about a transit gateway is that there are lots of different ways you can use them, so you can create topologies according to your needs. Here are some examples you can use. 

Centralized router: This is one of the simplest ways to use a transit gateway. The gateway is used as a centralized router, which connects all attached VPCs, direct connects and so on. This allows all attachments to route packets to each other, and support transitive connectivity. 

Isolated VPCs: There are two different ways you can set up this topology. Firstly, you can use an isolated VPC with shared services. This gives you the addition of a shared services VPC. Each VPC can connect to on site services, but not each other. The other way is to use a peering transit gateways topology. The transit gateways used in different regions are peered together, allowing them to route traffic between them. You can also route traffic from an on site location to VPCs in different regions. 

Appliance shared services VPC: You can use this topology to host an appliance in a VPC, and have all your traffic routed through it. This is a good way to monitor traffic that's being used this way. 

Centralized outbound routing: This allows you to set up all outbound routing to go through a centralized VPC with an internet gateway attached. With this, you won't need an internet gateway for any other VPC that you use. This is often used for enterprise grade deployments. 

There are all kinds of ways you can use a transit gateway in your business. They allow you to change up your network in accordance with your needs, and allow for much easier working. They also help increase connectivity between on premises and cloud based systems. With all this information, you are now in a position set up a network that works for you. 

Emily Henry is a professional writer currently working with Dissertation Abstract UK writing service.

Ypu Might Also Read: 

Incident Response In The AWS Cloud:

 

« Google’s DeepMind Faces Legal Action Over Data Misuse
Russian Cyber Security Chief Charged »

Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

WEBINAR: How to build a secure access service edge (SASE) model in AWS

WEBINAR: How to build a secure access service edge (SASE) model in AWS

Thursday, 21 October, 2021 - In this webinar, SANS and AWS Marketplace will explore SASE and share how organizations can move to a SASE model to enhance security for modern infrastructures.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.