Route Priorities and Administrative Distance The administrative distance applies a priority value to a prefix in the routing table relative to other routing protocols that may be running on the router. A static route’s administrative distance configuration is an optional value that is used to determine the trustworthiness of the route. The lower the administrative […]
Optimizing Dynamic Routing BGP route selection may not always be the optimal path to the destination as the protocol does not take into consideration latency, congestion, or jitter. As a result, your traffic may be routed over a suboptimal path. The path that BGP chooses may need to be overwritten with a better path. Path […]
THE AWS CERTIFIED ADVANCED NETWORKING – SPECIALTY EXAM OBJECTIVES COVERED IN THIS CHAPTER MAY INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING: Task Statement 3.1: Maintain routing and connectivity on AWS and hybrid networks. Industry-Standard Routing Protocols Used in AWS Hybrid Networks When creating a hybrid network with AWS, a standards-based routing protocol is required […]
Review Questions 1.Due to federal governance restrictions, your sensitive customer data is not allowed to traverse the public Internet when in transit between certain AWS hosted applications. You need to interconnect two private VPCs in the Osaka region. What AWS network interconnect option would you use to meet these requirements?A.CloudWatchB.CloudTrailC.Direct ConnectD.PrivateLink
Exercises 1.Read and review the AWS VPC sharing documentation:https://docs.aws.amazon.com/vpc/latest/userguide/vpc-sharing.html2.Read and review the AWS VPC peering documentation:https://docs.aws.amazon.com/vpc/latest/userguide/vpc-peering.html3.Read and review the Transit Gateway Service documentation:https://aws.amazon.com/transit-gatewayhttps://aws.amazon.com/transit-gateway/faqs4.Read and review the AWS PrivateLink documentation:https://docs.aws.amazon.com/whitepapers/latest/building-scalable-secure-multi-vpc-network-infrastructure/aws-privatelink.htmlhttps://aws.amazon.com/privatelink/features5.Know the details of the AWS Organizations service:https://docs.aws.amazon.com/organizations6.Understand the Resource Access Manager service:https://aws.amazon.com/ram7.Understand the AWS Active Directory services, their use cases, and how they are implemented:https://aws.amazon.com/directoryservice Review […]
Summary This chapter on inter-VPC and multi-account networking was a continuation of the previous chapter on hybrid networks. You learned about how to interconnect and access VPCs both inside and between accounts including VPC sharing, peering, and PrivateLink. Common VPC network architectures were presented including the Transit Gateway, Transit Gateway Connect, and transit VPCs. WAN […]
Active Directory Active Directory provides a centralized management application for Microsoft Windows computers and user administration. The AD architecture is a distributed hierarchical database for information about your IT infrastructure, containing configuration and management for users, user credentials, and access rights based on group memberships, DHCP, policy management, DNS zones and records, applications and devices, […]
Security Association Markup Language Security Association Markup Language (SAML) is used to simplify authentication services and allow for single sign-on operations. SAML allows users to authenticate with the identity provider one time using a single set of credentials; they then get access to multiple applications and services without any additional sign-ins. SAML-enabled applications delegate authentication […]
Resource Access Manager As you learned in Chapter 7, the AWS Resource Access Manager (RAM) is an AWS management utility that allows you to share the AWS resources created in one AWS account and make it available to other AWS accounts. You can create a resource in one account using the Resource Access Manager to […]
Organizations Organizations use policies to create controls that are applied to accounts. A policy is a document containing one or more rules. Standard policies are used for defining backups, tag keys with allowed values, how artificial intelligence services store and use content, and service control policies that we will discuss in this section. Policies can […]