assignment
AWS VPC Lab Session: Step-by-Step Practice Guide
Follow these detailed instructions to replicate the AWS VPC class lab, building a functional multi-subnet VPC with routing, gateways, and EC2 instances.
Add Subnets
Navigate to "Subnets" > Create subnet.
VPC: Select
svm-vpc-01.
For Public Subnet:
Subnet name:
Nimbus-publicAvailability Zone: Pick one (e.g., us-east-1a)
IPv4 CIDR block:
10.0.0.0/28(IPs 10.0.0.0–10.0.0.15)Click Add subnet.
For Private Subnet:
Subnet name:
Nimbus-privateAvailability Zone: Pick another or same
IPv4 CIDR block:
10.0.0.16/28(IPs 10.0.0.16–10.0.0.31)Click Create subnet.
Configure Route Table Routes
Public Route Table (rd-public):
Select
rd-public.Under Routes > Edit routes > Add route:
Destination:
0.0.0.0/0Target: Internet Gateway > Select
Nimbus-icw
Save changes.
Private Route Table (rd-private):
Select
rd-private.Under Routes > Edit routes > Add route:
Destination:
0.0.0.0/0Target: NAT Gateway > Select your NAT
Save changes.
Launch EC2 Instances
Go to "EC2 > Instances" > Launch Instance.
For the public instance:
Name:
public-instanceAMI: Amazon Linux 2 or Windows (as preferred)
Subnet:
Nimbus-publicAuto-assign Public IP: Enable (for public instance)
Security Group: Select one allowing SSH/RDP from your IP
Click Launch instance
For the private instance:
Name:
private-instanceSubnet:
Nimbus-privateAuto-assign Public IP: Disable (will not be internet-accessible directly)
Security Group: As above
Test Connectivity
SSH/RDP into your public instance using the public IP.
From the public instance, attempt to access the private instance (private IP).
For outbound internet:
From the private instance, use CLI (
ping,curl, etc.) to verify outbound connectivity (internet works via NAT Gateway).
Private instance is not reachable directly from the internet (secured).
Best Practices
Always associate NAT Gateway with a public subnet.
Never keep unused Elastic IP addresses.
Use least privilege on security group rules.
Map subnets deliberately to correct route tables for proper traffic flow.
