23
NETWORKING IN THE CLOUD clifflu <[email protected]>

Networking in the cloud

Embed Size (px)

Citation preview

Page 1: Networking in the cloud

NETWORKING IN THE CLOUD

clifflu <[email protected]>

Page 2: Networking in the cloud

ABOUT ME

• 呂昭寬 `CLIFFLU`TREND MICRO DCS

• USING AWS SINCE ’09 ASFULL-STACK WEB DEV(OPS)

• HTTP://BLOG.CLIFFLU.NET

• BADMINTON / BASEBALL

Page 3: Networking in the cloud

WHY NETWORKING

• EVERYONE KNOWS SOMETHING ABOUT NETWORKING• INFRASTRUCTURE

• ARCHITECT

• DEVELOPER

• OPERATOR

• LOTS OF TRAPS

•WHEN YOU FEEL YOU SHOULD LEARN IT, IT’S TOO LATE

Page 4: Networking in the cloud

FIREWALL

Page 5: Networking in the cloud

VPC

•NETWORK IN AWS

•USES EC2 API ENDPOINT / RESOURCES

•HANDLES … IN MANAGEMENT CONSOLE• SUBNET

• SECURITY GROUP

• NETWORK ACL

• DHCP

• VPN

• PEERING

• ROUTE TABLE

• IGW, CGW, VGW

Page 6: Networking in the cloud

VPC: SECURITY GROUP

• L4 FIREWALL, (TCP) STATEFUL

•DEFAULT DENY

• ALLOW RULES ONLY

• AWS CREATES DEFAULT OUTBOUND RULE• ALLOW ALL EGRESS

Page 7: Networking in the cloud

VPC: SECURITY GROUP

•SECURITY GROUPS ARE VALID SOURCE / TARGET IN SG RULES, AS LONG AS THEY BELONG TO THE SAME VPC

Page 8: Networking in the cloud

VPC: NETWORK ACL

• L3 FIREWALL, STATELESS

•DEFAULT DENY

• CREATE ALLOW OR DENY RULES

• FIRST MATCH

• EPHEMERAL PORTS

Rule # Src IP Proto Port100 0.0.0.0/0 TCP 80110 0.0.0.0/0 TCP 443120 TCP 22130 TCP 3389140 0.0.0.0/0 TCP 49152-65535

* 0.0.0.0/0 all allRule # Dest IP Proto Port

100 0.0.0.0/0 TCP 80110 0.0.0.0/0 TCP 443120 10.0.1.0/24 TCP 1433130 10.0.1.0/24 TCP 3306140 0.0.0.0/0 TCP 49152-65535

* 0.0.0.0/0 all all

Inb

ou

nd

Ou

tbou

nd

Page 9: Networking in the cloud

EPHEMERAL PORTS

Platform OS / Distribution Port RangeBSD BSD 1025 - 5000

FreeBSD < 4.6 1025 - 5000FreeBSD >= 4.6 49152 - 65535

Linux * 32768 - 61000Windows Server 2003 1025 - 5000

Server 2003 + MS08-037 49152 - 65535Server 2008 49152 - 65535Server 2008 + Exchange 2007

1025 - 60000

ELB - 1024 - 65535

Page 10: Networking in the cloud

CONNECTIVITY

Page 11: Networking in the cloud

DIRECT CONNECT (DX)

• DEDICATED CONNECTION

• GUARANTEED BANDWIDTH & LATENCY

• PAY • ISP FOR THE LINE

• AWS FOR • PORT

• OUTBOUND TRAFFIC (AWS DATACENTER)

• OUTBOUND TO INTERNET (DATACENTER – DX INTERNET)

Page 12: Networking in the cloud

DX: NOTES

• CHANGING VLAN REQUIRES MANUAL OPERATION FROM APN, USUALLY TAKES DAYS ~ WEEKS

• SECURITY ?• DATA SHOULD BE ENCRYPTION AT REST AND IN

TRANSIT TO ACHIEVE MAXIMAL DATA SECURITY.

• DX DOES NOT ASSURE DEFENSE AGAINST EAVESDROPPING OR OTHER MALICIOUS BEHAVIOR

Page 13: Networking in the cloud

VPC: VPN

• IPSEC W/ PRE-SHARED KEY

• BUILT-IN HA (VPC CLIENT) W/ BGP

• STANDARD DATA RATES APPLY

• VPN SERVER• TAKES A DEDICATED PUBLIC IP

• VPN BOX / SOFTWARE VPN

Page 14: Networking in the cloud

VPC PEERING

• SAME REGION

• NON-TRANSITIVE

• NO CIDR OVERLAP

• BUILT-IN HA

• CHARGED OVER• CONNECTION-HOURS

• DATA TRANSFER

• ACTION REQUIRED ON ROUTE TABLE

Page 15: Networking in the cloud

ROUTING

Page 16: Networking in the cloud

VPC: ROUTE TABLE

•DEFAULT ROUTE: LOCAL• CAN’T OVERRIDE IT

• LONGEST PREFIX

• PROPAGATED ~ REALTIME

Page 17: Networking in the cloud

VPC: ROUTE TARGET

• NAT INSTANCE (I-* / ENI-*)• TURN OFF SRC./DEST. CHECK

• SECURITY GROUP / NACL APPLIES

• ALSO WORK FOR EC2-BASED VPN CONNECTION

• INTERNET GATEWAY (IGW-*): • PUBLIC / ELASTIC IP REQUIRED

• VIRTUAL GATEWAY (VGW-*)• WORKS FOR DX AND VPC:VPN

• PEERING (PCX-*)

Page 18: Networking in the cloud

VPC: ROUTE PROPAGATION

• REMOTE ROUTES TO VPC• CREATES ROUTE TABLE ENTRIES AUTOMATICALLY

• LOCAL ROUTES TO DATA CENTER• MAY RUIN ROUTE TABLES IN CASE OF IP CONFLICT

Page 19: Networking in the cloud

EC2: ROUTING

• lo• LOOPBACK

• eth0• LOCAL

• DEFAULT (GATEWAY)

Page 20: Networking in the cloud

EC2: NETWORK TRICKS

• MULTIPLE ENI• AS LONG AS THEY BELONG TO THE SAME AZ

• SG APPLIES TO ENI, NOT EC2

• SECONDARY PRIVATE IP• CONFIGURE OVER MANAGEMENT CONSOLE / API

• ENABLE IN EC2• ifconfig eth0:0 [SECONDARY_IP] netmask [NETMASK]

Page 21: Networking in the cloud

OTHER TRICKS

•NAT• SNAT

• DNAT (PORT FORWARDING)

• TUNNELING

Page 22: Networking in the cloud

VPN with BGP back

propagation

NETWORK EXAMPLE

BetaDB

Prod SharedVPC

H/W VPN

Beta

Prod

AWS S3

Logs

S/W VPN

S/W

S/W

Peering

Page 23: Networking in the cloud

THANK YOU