Full mesh connectivity for many VPCs, some with overlapping CIDRs.
→Deploy Transit Gateway. Remediate overlapping CIDRs by adding unique, secondary CIDR blocks to the affected VPCs.
Why: Transit Gateway provides scalable, transitive routing but cannot route between overlapping IP ranges. IP remediation is required.
High-throughput, low-latency, resilient hybrid connectivity.
→Provision two dedicated Direct Connect connections at two different Direct Connect locations.
Why: Using two different locations protects against location-level failures (fiber cuts, power outages), providing maximum resiliency. A single location, even with multiple connections, is a single point of failure.
Bidirectional DNS resolution between on-premises and AWS private hosted zones.
→Use Route 53 Resolver. Create Inbound Endpoints for on-prem to query AWS. Create Outbound Endpoints with forwarding rules for AWS to query on-prem.
Why: Inbound endpoints provide reachable IPs for on-prem DNS forwarders. Outbound endpoints enable conditional forwarding from within the VPC. The VPC default resolver (VPC+2) is not reachable from on-prem.
Provide service-level access between two VPCs without creating network-layer routes.
→Use AWS PrivateLink. Create a VPC Endpoint Service (backed by an NLB) in the provider VPC and an Interface VPC Endpoint in the consumer VPC.
Why: PrivateLink provides unidirectional, service-specific connectivity using ENIs in the consumer's VPC, completely avoiding network-level routing and CIDR overlap issues.
Provide outbound-only internet access for IPv6-enabled instances in private subnets.
→Create an Egress-Only Internet Gateway (EIGW) and add a route for `::/0` to the private subnet's route table pointing to the EIGW.
Why: An EIGW is stateful for outbound IPv6 connections, allowing return traffic but preventing unsolicited inbound connections, analogous to a NAT Gateway but for IPv6.
Inspect all inter-VPC traffic using AWS Network Firewall in a centralized model with Transit Gateway.
→Create a dedicated inspection VPC with Network Firewall. Configure TGW route tables to send all inter-VPC traffic to the inspection VPC. Within the inspection VPC, route tables must steer traffic through the NFW endpoints for symmetric routing.
Why: This architecture requires careful routing: TGW sends traffic to the inspection VPC; VPC route tables send it to the firewall endpoint; the firewall sends it back to the TGW attachment ENI; TGW routes it to the final destination.
Segmenting VPCs (e.g., prod vs. dev) using Transit Gateway, while allowing both to access a shared services VPC.
→Use multiple Transit Gateway route tables. Create a route table for each segment (prod, dev, shared). Associate VPCs with their respective tables. Propagate routes to create a hub-spoke topology where spokes can only see the hub.
Why: TGW route table associations and propagations are the primary mechanism for network segmentation and traffic isolation at the network layer.
Reduce latency for a dynamic, non-cacheable global application (e.g., API, gaming) hosted in a single region.
→Use AWS Global Accelerator. It provides anycast IPs that route users to the nearest AWS edge location, then traffic traverses the optimized AWS backbone to the origin.
Why: Global Accelerator optimizes the "first mile" and "middle mile" over the AWS network, reducing latency and jitter for TCP/UDP traffic. CloudFront is better for cacheable content.
Provide private access from a VPC to S3 and DynamoDB without traversing the internet.
→Create Gateway VPC Endpoints for S3 and DynamoDB. This adds prefix list entries to the specified subnet route tables.
Why: Gateway endpoints are the specific, highly-performant, and no-cost mechanism for S3 and DynamoDB private access. Other services use Interface Endpoints (PrivateLink).
Access VPCs in multiple AWS Regions from a single on-premises Direct Connect connection.
→Use a Direct Connect Gateway with a Transit Virtual Interface (T-VIF). Associate the DX Gateway with Transit Gateways in each required Region.
Why: A Transit VIF with a DX Gateway is the scalable solution for connecting to multiple Transit Gateways across regions. A Private VIF with a DX Gateway has lower limits.
Integrate a third-party virtual firewall appliance for transparent traffic inspection.
→Use a Gateway Load Balancer (GWLB). It operates at Layer 3 and uses the GENEVE protocol to encapsulate traffic, preserving the original source/destination IP.
Why: GWLB's GENEVE encapsulation makes it a "bump-in-the-wire," transparently inserting appliances into the network path without requiring source NAT, which is critical for security appliances.
Manage IP address allocation for hundreds of VPCs across a multi-account organization to prevent overlaps and track usage.
→Use Amazon VPC IP Address Manager (IPAM). Create a top-level pool and delegate Regional pools to automate VPC CIDR allocation.
Why: VPC IPAM is the purpose-built, scalable AWS service for centralized IP address management, replacing error-prone manual methods.
Integrate a third-party SD-WAN appliance with Transit Gateway using GRE tunnels and dynamic BGP routing.
→Use a Transit Gateway Connect attachment.
Why: TGW Connect is specifically designed for SD-WAN integration. It supports GRE for higher bandwidth (up to 5 Gbps per peer) and BGP for dynamic routing.
An IPv6-only VPC needs to communicate with IPv4-only resources on the internet.
→Enable DNS64 on the VPC's Route 53 Resolver settings and configure a NAT Gateway in a public subnet. Route `64:ff9b::/96` to the NAT Gateway.
Why: DNS64 synthesizes AAAA records for IPv4 destinations. The NAT Gateway performs the NAT64 protocol translation from the synthesized IPv6 address to the real IPv4 address.
Connect hundreds of VPCs across many regions with strict segmentation requirements (prod, dev, shared services).
→Use AWS Cloud WAN. Define segments and segment actions in a single core network policy to control inter-segment routing globally.
Why: Cloud WAN provides a centralized, declarative global network policy, which is more scalable and less complex than managing a full mesh of Transit Gateway peerings and route tables in each region.