AWS re:Inforce 2022 - Building and securing cloud-native WAN using new AWS services (NIS309)

AWS re:Inforce 2022 - Building and securing cloud-native WAN using new AWS services (NIS309)


AWS re:Inforce 2022 - Building and securing cloud-native WAN using new AWS services (NIS309)

A transition is underway in enterprise networking. Organizations are incorporating new, cloud-native, wide-area networking services into their infrastructure because of their ability to create and configure connectivity on the fly—with elastic capacity and consumption-based pricing. In this session, learn how to get started with cloud-native networks using the new AWS Cloud WAN and AWS Direct Connect SiteLink services. The session begins with a simple architecture and then dives into real-world use cases that include details on how these services work with your SD-WAN, AWS Direct Connect, and AWS Transit Gateway usage.

Learn more about AWS re:Inforce at https://bit.ly/3baitIT.

Subscribe:
More AWS videos http://bit.ly/2O3zS75
More AWS events videos http://bit.ly/316g9t4

ABOUT AWS
Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.

AWS is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.

#reInforce2022 #CloudSecurity #AWS #AmazonWebServices #CloudComputing


Content

0.9 -> - Hey, everyone. I'm Nick Matthews.
2.46 -> I am a Principal Product Manager on the VPC team.
5.91 -> So I lead AWS Cloud WAN.
9.39 -> Which is what we'll be talking about a lot today.
13.17 -> And so, we're gonna talk about doing a wide area network.
18.03 -> This is AWS, so some people know what that is,
19.65 -> some people don't.
20.483 -> I think you guys probably all do.
22.11 -> But wide area network is just a long network.
25.59 -> So if you strung a Cat 5 cable across the country,
28.29 -> that'd technically be a wide area network.
30.787 -> And AWS has put a lot of cable,
32.4 -> a lot of fiber into the ground.
34.77 -> And how would you go about using that
36.93 -> if you were going to try to build a wide area network?
40.92 -> So we're actually gonna start here
43.65 -> with a little bit of a history lesson.
45.33 -> So I've been here for a little over six years
47.28 -> doing these types of presentations.
49.11 -> And I've actually started to see
50.91 -> some of the same patterns that happened six years ago,
53.61 -> you know, and beyond start happening again,
56.7 -> even though we've built a lot of new things
58.59 -> to solve those old problems.
60.18 -> And so, if you go back in sort of history, right?
64.89 -> Virtual private cloud, VPC, is one of our favorite things.
68.49 -> You know, we've got customers
69.33 -> with thousands of these things.
71.22 -> But there was a time where we thought
72.45 -> customers just needed one.
74.19 -> And we just called it a virtual data center.
75.99 -> And so, we said, hey, look.
77.13 -> If we have the correct IEN
79.44 -> and the correct security group type things,
81.9 -> you could put hundreds or thousands
83.46 -> of different types of customers
85.08 -> and your business units in the same VPC.
87.84 -> And we've got people that do that.
90.36 -> And we thought that was how people should build the cloud.
93.356 -> You know, and then I think what happened
95.79 -> is we did more enterprise type stuff.
98.94 -> If you're a company, you're probably more used to saying,
101.43 -> hey, you know, someone wants to build a new app.
103.29 -> So we're gonna give them a subnet off the firewall,
106.16 -> or you know, a slash 24.
108.39 -> And then that's their kind of playground
110.49 -> for them to do networking things.
114.09 -> And then, that kind of VAPs more closely
116.4 -> to like an AWS account.
117.93 -> And so we found customers wanted to
119.13 -> have lots and lots and lots of different AWS accounts,
121.47 -> 'cause they didn't want people to have to share accounts,
124.11 -> either for billing reasons or security reasons or whatnot.
126.84 -> Which also means they get lots and lots of VPCs.
128.937 -> And so, customers were doing this whole Transit VPC thing
132.96 -> where they were using our own VPN service
135.27 -> in combination with some EC2 instances running routers.
138.21 -> And as you can see here,
139.77 -> there's lots and lots of lines, you know.
142.02 -> Two VPN connections for every single VPC.
145.23 -> But you do get this kind of pretty thing at the bottom
147.45 -> where you get one set of VPNs
148.77 -> and it direct connects at the bottom,
149.88 -> which is what everyone wanted.
151.38 -> 'Cause no one wants to set up
152.73 -> a whole nother two or four VPNs
154.115 -> every time they create a new VPC.
158.31 -> And so we took that feedback, listened,
160.83 -> and you know, four years ago or so,
164.55 -> we created Transit Gateway.
165.87 -> So that was like the native version
168 -> of doing a Transit VPC.
169.23 -> And so there's a cloudy goodness in this, right?
172.68 -> So it scales horizontally.
175.2 -> You can go up to 50 gigs of bandwidth.
178.14 -> Thousands of attachments,
179.49 -> and you still get the sort of pretty VPN
181.795 -> and direct connect consolidation at the bottom.
185.73 -> And so this has been a super popular architecture.
188.46 -> It is the way that customers--
190.35 -> This reference architecture
191.28 -> that I actually built in 2018 still holds up.
194.1 -> And a lot of customers are doing this.
196.8 -> But we're seeing some things that kind of go back
198.99 -> to the problems we had with Transit VPC.
200.7 -> So I can expand on that a little bit.
203.01 -> So essentially, if we take a look,
205.026 -> we kind of start from scratch.
206.91 -> What a lot of customers have is
208.02 -> they have a data center with some dusty, crusty servers.
211.26 -> And then, you know, connect into VPN
213.42 -> or direct connect to a Transit Gateway and a couple VPCs.
217.2 -> This does all the stuff we want it to do,
218.79 -> but then there's some other things
219.87 -> we'd probably want too.
221.19 -> So for example, as we start moving these servers up,
223.89 -> going from dusty, crusty to magic EC2 instances,
228.21 -> then what happens is maybe someone sets up a control tower
230.79 -> or they want 20 or 30 more VPCs,
232.68 -> or 20 or 30 or 40 more accounts,
235.68 -> or more dev test product type environments,
238.11 -> and you have more VPCs.
239.91 -> Each of these VPCs, you need to create a route,
242.28 -> create an association,
243.75 -> propagate it to the other route tables,
245.67 -> and there's some sort of manual clicking involved.
247.59 -> So a lot of people end up looking
248.58 -> at things like network automation.
251.04 -> And so, you know,
252.12 -> how would you actually build this with automation?
253.65 -> Well, you can do some of it
254.76 -> with CloudFormation and Terraform.
257.52 -> But we just end up seeing a lot customers
258.84 -> build like for example, Lambda code,
260.43 -> to automatically accept attachments,
261.9 -> or automatically propagate as they come on.
265.11 -> So it's one of the things these customers
266.487 -> are having to do in this situation.
269.04 -> The other thing is now we get some more instances,
271.2 -> get the data sort of moved out.
272.49 -> A lot of times people end up going multi-region,
274.95 -> either for disaster recovery,
276.9 -> or because maybe they have a company
279.544 -> and some people in a different area,
281.58 -> or maybe their users are there.
283.5 -> And they have to go multi-region.
284.76 -> So they create a peering connection
286.47 -> between their Transit Gateway.
287.91 -> Again, more sort of manual inputting of routes
291.21 -> and trying to make sure that all the routes on the left
293.19 -> and all the routes on the right
294.48 -> get sort of summarized and sent to the right spots.
297.72 -> Just a lot of work, to be honest.
300.84 -> Security tends to be another one.
302.13 -> So often when we see customers start off in this model,
305.61 -> they will keep the security in their data center.
308.28 -> So they'll send all the internet traffic from AWS,
310.8 -> going through a data center,
312.51 -> back into their sort of trusted,
314.1 -> loving, warm and fuzzy security stack.
316.44 -> Because the security people know it
317.94 -> and compliance people know it,
319.29 -> and there's 300 check boxes you need.
321.63 -> You know, you can check them all on premises.
323.91 -> But you find out that like,
325.14 -> hey, I have a machine learning workload
326.7 -> sending stuff to another thing in AWS,
329.067 -> and it needs to use a public endpoint.
331.05 -> So we're sending like all this machine data
333.33 -> and user data and bulk data back down
335.94 -> through our skinny VPN or direct connect pipe,
338.07 -> out the internet, and then back up to AWS again.
340.02 -> That doesn't make any sense.
341.61 -> But security likes it.
343.26 -> So the concept is, you know,
345.3 -> hey, let's take that security stack
346.71 -> and let's move it into AWS.
347.94 -> The internet's still scary.
349.56 -> We'll still have that security stack,
351.09 -> but it will just look differently.
352.29 -> It'll be build on cloud native security constructs,
354.69 -> which hopefully you've heard a lot
356.25 -> about this week in other sessions.
359.37 -> The other one ends up becoming kind of this extensibility.
362.43 -> You're running, you're doing well on your network,
364.8 -> and someone throws a wrench at ya,
365.94 -> and now you have another company that,
367.83 -> you know, you need to worry about.
369.709 -> Or maybe it's the development group
371.351 -> that doesn't follow IT standards
373.8 -> and doesn't have full control of it.
376.56 -> And so, how do you handle that?
377.88 -> So now it's like, all right,
378.713 -> well, we need to peer their Transit Gateway into ours.
380.4 -> We need to create more VPN connections.
382.11 -> And we're starting to get a lot of lines here again, right?
384.21 -> A lot of things that we need to manage
386.37 -> and sort of click around for.
388.451 -> And then you have this other thing,
389.88 -> like all right, well, now my data center is almost empty.
393.06 -> How would I create--
394.56 -> You know, what do I do with my WAN?
396 -> I've homerunned everything to that data center.
398.85 -> But now I need to get all that into AWS as well.
400.89 -> I've got business partners, or I've got the WAN.
405.09 -> You know, there's other things that look like clouds.
407.55 -> And you know, gotta connect that somehow.
410.04 -> How would we make that work?
411.57 -> And so this is kind of the rough agenda,
414.33 -> 'cause we're gonna take this mess
416.28 -> and kind of turn it into this.
418.14 -> Which is, let's put Cloud WAN in the middle of this thing.
422.531 -> And so figure out, how would we simplify
426.24 -> these sort of more complicated
427.65 -> and more sort of intricate designs into something simple?
430.86 -> And so, you know, some of the things with Cloud WAN,
433.59 -> for example, it's global.
434.82 -> It's got built-in automation.
436.53 -> There's built-in segmentation.
438.78 -> There's interoperability with Transit Gateway.
440.973 -> It also support dynamic routing.
443.16 -> So it's gonna fix and work with a lot of those problems
444.99 -> that we're talking about.
447.36 -> So if we dive in real quick.
449.61 -> I'll sort of go piece by piece
450.96 -> and show you how this stuff works.
453.39 -> So essentially, we start off with regions.
458.01 -> Cloud WAN is a global networking service,
459.84 -> which means it will run across those regions.
463.59 -> You don't have to do each one region by region,
465.75 -> like you do with Transit Gateway.
467.4 -> So you start off with this concept of a global network.
469.47 -> The global network is an existing thing.
471.12 -> We launched that a couple years ago
472.41 -> as part of network manager.
474 -> And it's basically the container, right now at least,
476.4 -> how it was being used is for Transit Gateways.
478.65 -> So you could register your Transit Gateway
479.76 -> as part of a global network.
481.23 -> And then you could go into the network manager console
483 -> and see all your sort of pretty things.
484.92 -> Topology graphs, metrics, logs.
488.16 -> You know, it's mostly a visibility tool.
490.41 -> So with Cloud WAN, what we've done is
491.7 -> we've added a whole new portion to
493.2 -> the global network called a core network.
496.35 -> So this core network is kind of
497.183 -> the demarkation line of where AWS takes
499.59 -> more of hands-on approach to this routing concept
502.65 -> as opposed to TGWs.
504.15 -> But since it's still within
505.05 -> the same global network sort of container,
507.3 -> we can essentially look and manage
509.25 -> both of them simultaneously.
511.5 -> And so, the core network,
513.48 -> underneath the hood is running something
514.71 -> called a core network edge.
516.21 -> There's one of those per region.
517.32 -> It's essentially, you can think of it like a TGW,
519.93 -> except for you don't have API access to it.
524.04 -> From there, you create attachments,
525.9 -> much like you would with Transit Gateway.
527.58 -> So VPC, VPN, connect for SD WAN.
533.49 -> And then you attach all those things to your core network
536.7 -> and the regions you've selected.
539.1 -> From there, you know, you can also now--
542.93 -> So we went GA two weeks ago in New York.
545.85 -> You can now attach and Transit Gateway to Cloud WAN.
548.85 -> Which means if you have existing VPCs
550.5 -> or an existing direct connect,
551.94 -> any of those types of things,
553.53 -> you can attach your Transit Gateway to Cloud WAN
555.78 -> and then now all that's gonna sort of flow through.
558.66 -> And then, underneath this is a new concept
561.03 -> called core network policy.
562.74 -> So core network policy is essentially
564.045 -> a single JSON document that represents
567.15 -> the intent of your network.
568.95 -> And so, you build this JSON document out,
571.14 -> or click around the console.
572.34 -> You don't have to go with JSON.
574.744 -> And then it builds the configuration out.
576.6 -> That configuration has a few different parts.
578.7 -> One of them defines, for example, the segments.
581.31 -> So the segments tell you,
582.93 -> basically your layer three isolated routing domains.
586.29 -> And then segment actions,
588.33 -> like what should happen between these segments,
590.46 -> which is primarily routing.
592.05 -> Should we share routes?
592.883 -> Should we end the static routes?
596.34 -> And then there are attachment policies.
599.25 -> So essentially what we've done is we've automated
602.49 -> the way that attachments map to segments.
606.24 -> And the primary way to do that is through tags.
609.15 -> So essentially, as you create an attachment,
612.09 -> you give it a tag,
613.02 -> and that tag is now gonna map it to a segment.
615.75 -> So you don't have to manually take attachments
617.91 -> and push them on a segment or anything like that.
619.896 -> That's the automation we've built in.
624.45 -> Cool, so as opposed to me going through
626.79 -> and telling you all the things we can do,
628.29 -> I'm gonna turn this into a bit of a story here.
630.15 -> We'll see how this goes.
632.16 -> So how many of you are like networking people?
636.03 -> How many of you are like security people?
638.73 -> How many of you are like developer people?
641.67 -> Okay, so we have some identity crisis here.
644.55 -> I think there's a lot of overlap.
646.41 -> But that pretty much covers everyone, I think.
649.47 -> And so the idea is that you,
650.31 -> as a network cloud security type person.
653.19 -> And all the people that bug you for network stuff
654.96 -> and security stuff and what they want.
656.85 -> And sort of how this sort of builds through
658.68 -> in a semi-realistic kind of scenario.
662.76 -> So you get this.
666 -> You're sitting around doing your job.
668.88 -> Someone builds out this giant proposal.
671.04 -> Maybe it's get an official IT project
672.72 -> and code name associated with it to build a,
675.554 -> you know, a brand new sort
677.07 -> of self-service thing on the cloud.
679.68 -> The developers are running a million miles an hour,
681.63 -> which is great.
682.56 -> You want them to do that.
683.61 -> But someone's gotta sort of tame that
685.92 -> and keep control of it,
686.877 -> and sort of keep it in governance, but also move fast.
690.48 -> At Amazon, this is probably what we would get.
692.58 -> We would probably get this document.
693.87 -> The probably most unrealistic portion
695.46 -> of this presentation is the fact
696.51 -> that someone's gonna clearly give you requirements.
701.16 -> So I'm gonna show you.
702.31 -> We're gonna slowly lower that quality
704.52 -> of requirements you're getting over time
706.35 -> so it becomes more realistic.
708.131 -> So the idea is, yeah, the developers are moving fast.
710.46 -> And we need to build
711.293 -> a new cloud environment to handle this.
713.19 -> So we start off is, we're gonna create a single region.
719.19 -> We create that global network in network manager.
722.01 -> We create the core network.
724.62 -> And so, we have to design the policy.
726.51 -> We have to figure out what our intents gonna look like.
728.88 -> And then we're gonna apply the policy
730.26 -> and it's gonna create the network for us.
732.24 -> So the first step is really defining that network intent.
735 -> That's the hard part for a lot of folks.
737.1 -> Which is, in this case,
739.35 -> like you know, I've presented on this before.
741.3 -> You can figure out how you wanna split your environment up.
743.97 -> We see pretty commonly that people
745.62 -> use the software development lifecycle to do this.
748.59 -> So production development staging.
750.51 -> This could very easily be, you know,
752.43 -> client one, client two, client three.
754.23 -> Or you know, oil, water, rock, earth, sun, whatever.
758.52 -> Or finance, HR, IT.
761.58 -> But you figure out sort of your communication matrix here.
766.328 -> What you have to figure out is basically four main things.
768.21 -> One is the network configuration.
769.38 -> So which regions you're gonna be in.
771.18 -> Which ASNs you wanna use in those cases.
773.58 -> We will automatically deploy the ASNs,
776.7 -> or you can manually choose it per region if you want.
780.24 -> The segments, they have names.
782.07 -> They also have some defaults we'll talk about.
783.48 -> Like, should things be automatically accepted or not?
787.02 -> You know, what's the behavior
788.43 -> of two things attached to the same segment?
790.14 -> Some things like that.
792.27 -> The routing and essentially kind of
794.37 -> defining this green and red matrix here.
798.45 -> As well as how that attachment should work.
800.43 -> So what tags do we wanna use
802.89 -> to map things to these segments?
805.23 -> And so, this all basically becomes your network policy.
809.1 -> So in the case for this self-service IT thing,
812.67 -> we're gonna start here.
813.51 -> We're gonna do production, development, and hybrid.
815.82 -> Mostly because PowerPoint doesn't have
816.87 -> that many room for like a bunch of segments,
818.73 -> and it makes my life a little bit easier.
820.35 -> And I hope it makes it a little bit easier to follow too.
822.75 -> So production.
824.82 -> So essentially we're gonna start off in one region.
826.26 -> We're going US East-2.
828.84 -> It's like Virginia, but just not Virginia.
832.86 -> And we might need to go to more regions,
834.48 -> but the requirements document
835.8 -> didn't say anything about that.
838.23 -> We're gonna do the SDLC,
839.22 -> software development lifecycle type thing.
841.95 -> We do want development to be on demand.
843.66 -> So we're not going to require
844.675 -> any approval for developers to
847.08 -> get into the development segment.
849.99 -> And development can talk within development,
851.67 -> 'cause we're not sure what they may need to do there.
854.91 -> The routing, we're gonna share routes
856.62 -> from the hybrid segment to development and production.
860.64 -> Production should be able to talk to production,
862.2 -> 'cause we don't want something to happen there.
865.976 -> And then we're gonna use the very boring example here.
869.07 -> If you put the tag of segment,
870.81 -> development or segment production or segment hybrid in,
873.24 -> we're just gonna map that directly
874.26 -> to the name of the segment here.
876.96 -> And so, this is our new network policy.
881.52 -> If you're curious what the actual JSON looks like,
883.95 -> it looks like this.
885.6 -> So I've kind of highlighted in green,
886.86 -> like kind of like the key areas
888.48 -> that are not just sort of brackets.
891.87 -> You might notice over there on the right
893.03 -> in the attachment policies,
894.72 -> we basically say, hey, if the segment tag exists,
897.81 -> then we're gonna use the value, tag that,
900.9 -> and look for a segment with that name.
902.34 -> So even if we had 20 segments,
904.11 -> we only need that one policy,
906.21 -> 'cause then it just uses the name
907.38 -> that we're using in a tag.
908.46 -> You can also go hard code this.
910.02 -> You can also go use the VPC ID or account ID.
913.11 -> So there's a lot of different ways to handle that.
916.56 -> And so, now we've built our policy.
919.38 -> We've applied to the core network.
920.67 -> We've built it out.
922.53 -> So now what we're gonna do to get this out
924.45 -> to the rest of our organization,
925.53 -> we're going to resource access manager, or RAM.
928.71 -> And so, I can walk you through
930.57 -> a little bit what that looks like.
931.86 -> So essentially you have your Cloud WAN,
934.29 -> slash your core network.
935.337 -> And the console is actually called a core network.
938.4 -> That's usually in your cloud WAM admin account.
940.59 -> So that's typically your network engineering account,
942.93 -> maybe with direct connect in it,
944.22 -> or maybe with other Transit Gateway
946.89 -> and networking kind of stuff.
948.87 -> And then you share that out with the AWS organization.
951.24 -> You can also share that out with individual account IDs,
953.49 -> or just your whole organization.
955.35 -> But it is limited to one organization.
957.87 -> And so, those accounts now,
959.64 -> we'll be able to see a core network
961.71 -> and be able to go ask and attach to it.
964.62 -> And so when they have the VPCs and other things,
966.96 -> you can go create those cross account attachment requests.
972.03 -> So we share it with core network.
974.34 -> You know, just organizationally,
975.36 -> we need to let users know they can do this somehow.
977.82 -> So there's a couple tricks.
978.84 -> Like, for instance,
979.673 -> you could put like a little Wiki
980.506 -> in the description of the core network
982.08 -> so they can go look that up and find out
983.608 -> what tags and what things are supported.
987.93 -> So now you start creating attachments.
989.55 -> You create attachments and you tag those.
991.71 -> They start attaching to the network.
994.08 -> You also then, if it's a VPC,
995.73 -> you're gonna wanna go and insert a route
997.95 -> into the VPC route tables into the correct subnets.
1001.1 -> So what a lot of people will do in this case,
1002.99 -> if the internet is on premises like in here,
1005.3 -> they'll put a zero zero route
1006.59 -> that points to the core network interface.
1011.42 -> And so, that's most of it, right?
1014.36 -> So you've know built sort of a self-service network.
1019.04 -> And relatively low amount of effort here.
1022.31 -> So what happens next?
1024.95 -> You're doing actual work.
1026 -> And someone puts a meeting on your calender.
1028.61 -> Something, something, we need to get in the EU.
1030.86 -> You don't know what's going on.
1033.32 -> Eventually you find out that,
1035.66 -> hey, we have like legal requirements to be into Germany,
1040.01 -> and Germany doesn't wanna be
1041.03 -> treated like the rest of the world.
1042.05 -> So we need a specific set of our applications in Germany.
1044.84 -> Okay.
1046.64 -> So if you wanna see what this looks like in JSON,
1049.85 -> all you do is add one line here.
1051.74 -> So in edge locations list,
1053.99 -> you just add the EU central one, which is Frankfurt.
1057.83 -> And now we're gonna go automatically
1060.08 -> and replicate everything you've done
1061.73 -> for the rest of this policy into Frankfurt.
1064.7 -> And so, in the console, it just looks like this.
1067.46 -> You would pick another edge location,
1069.65 -> create your policy, and apply your policy.
1072.35 -> And now your network is extended to another region.
1076.94 -> And so, like you said, yeah, you edited the policy.
1080.57 -> You apply the policy.
1081.83 -> And then once the policy is applied,
1083.81 -> you know, it takes maybe sometimes
1085.1 -> 10 minutes to go to another region.
1086.96 -> Under the hood,
1087.793 -> we're creating a whole new core network edge,
1089.57 -> and we're doing peering connections,
1091.19 -> and we're enabling dynamic routing and all these things.
1094.94 -> Just for that one line of configuration that you did.
1098.51 -> From there, you get another meeting.
1100.43 -> Another surprise meeting.
1102.02 -> You're not really sure what this is about.
1102.95 -> But now legal found out that we're in Germany.
1105.5 -> And they're very concerned that we're not meeting
1106.91 -> some laws and compliance over there,
1108.41 -> and they wanna really lock stuff down.
1110.36 -> And so, you find out that they wanna make sure
1113.33 -> that this segment only ever exists in Germany
1116.45 -> and that it can never talk outside of Germany.
1119.42 -> But from a networking perspective,
1120.53 -> you still wanna manage it all as one big network.
1123.11 -> So what you can do is there's a couple segments settings
1126.32 -> that you can go change here.
1127.46 -> So in this case, we're gonna actually--
1129.5 -> You can change which edge locations the segment runs in.
1131.66 -> By default, it runs in all segments, or in all regions.
1137.15 -> So we're gonna specifically limit it to just Germany.
1140.63 -> And then here, it also says,
1142.13 -> like which segments it's allowed to talk to.
1144.68 -> So by default, you can do this in very permissive,
1146.96 -> kind of easy ways to say like,
1148.43 -> I want hybrid to talk to everyone.
1150.62 -> Well, then, you know, you don't want
1152.03 -> hybrid talking to Frankfurt,
1153.08 -> 'cause they don't wanna talk to anyone else.
1154.13 -> So you can really lock that down do deny specific lists
1157.16 -> or allow specific lists in segments.
1160.1 -> So compliance people are pretty happy about this.
1161.8 -> So we take a look at what this looks like now.
1163.67 -> It is now, you know, we've got a Frankfurt region.
1166.904 -> But we're gonna create
1168.23 -> that specific segment just for the EU.
1170.12 -> And it's gonna live just in Germany.
1172.49 -> Which for us, is 65,002 is the ESN.
1176.09 -> Cool, so doing well so far.
1180.8 -> All right, now we get a page.
1182.06 -> We're eating lunch, doing more work.
1183.62 -> And production's down.
1185.51 -> Sam, it's always Sam.
1187.55 -> You knew they were gonna push a change today.
1190.52 -> Well, it brought the network down.
1193.1 -> This is no bueno.
1194.6 -> Which is Spanish for outage.
1196.49 -> So now people wanna know how like the network works,
1199.52 -> 'cause it didn't work very well.
1200.89 -> So everyone wants to know the details.
1203.06 -> So the way the changes actual happen in Cloud WAN
1205.97 -> is a two step process.
1208.37 -> So first is you create the network policy.
1210.59 -> There's an API for this.
1212.24 -> Once you create that API and submit it to us,
1215.48 -> or you know, the console or API,
1216.73 -> or however you wanna do it.
1219.14 -> We're gonna validate it as valid and the JSON's good
1221.45 -> and the rules are right, and that kind of stuff.
1223.7 -> But then we're gonna generate a change set.
1226.46 -> So this is a concept we borrowed from CloudFormation
1229.19 -> where we're gonna tell you what's different in the network.
1231.5 -> We can say that you're going to have more regions
1233.72 -> or less regions or some segments are gonna appear
1236.27 -> or some of your attachments are gonna move
1239.544 -> to someplace else based upon some new tag change.
1243.32 -> So we can give you an idea of
1244.28 -> the typology change that's gonna happen.
1246.29 -> As well as you can actually go
1247.58 -> and see like in a get style diff
1249.984 -> of what the actual changes look like.
1253.1 -> And so, from there once that looks good
1255.44 -> and it looks like what I expected,
1257.96 -> you can execute the policy.
1259.7 -> Once they execute policy,
1260.81 -> network managers gonna roll that change out
1262.82 -> to all the places where it needs to go.
1265.37 -> And we added some features recently
1266.75 -> to show you what's going on
1267.74 -> so you can get a couple steps
1268.7 -> so you can see what's going on and how long it took,
1270.29 -> that kind of thing.
1271.767 -> And so now when you go back to
1273.32 -> tell people how this stuff works,
1274.58 -> you can make some changes.
1275.42 -> So you can say, for example,
1277.13 -> we're gonna create a new role for Sam.
1279.41 -> And he only has access to the core network create function.
1284.48 -> And then now before we make any of these changes,
1287.6 -> we're gonna run this stuff through a change review board
1289.4 -> or a CAB, 'cause those are really fun.
1291.512 -> But it helps with compliance and not making mistakes.
1295.55 -> So the CAB can review changes.
1297.617 -> And we're gonna create another role
1299.3 -> for the more senior admins
1300.899 -> that know how this process should work,
1303.56 -> and they're the only ones that can execute the policy.
1305.57 -> So now we can let the new people create policies,
1308.39 -> but the sort of trusted people actually go put those on.
1311.027 -> And you can time bound that
1312.26 -> and all types of other things that works with IM.
1315.56 -> And so, you know, what's also gonna happen is,
1319.062 -> at Amazon, what we do is called a correction of error,
1322.31 -> or COE, which basically means like
1324.53 -> we're gonna ask a whole bunch of questions,
1325.67 -> like, why, why, why, why, why, why?
1327.29 -> And then we're gonna come up
1328.47 -> with what we call like mechanisms,
1329.51 -> which are like,
1330.59 -> if you think about this whole team,
1333.23 -> if you replaced the whole team
1334.13 -> with a whole new set of people
1335.15 -> and only had processes and procedures to fix this problem,
1338.45 -> what would that look like?
1339.83 -> 'Cause if you go, well, you know,
1341.06 -> Bob is supposed to look after Sam.
1342.32 -> So we're just gonna ask Bob to look after Sam better.
1345.11 -> Like, that doesn't work.
1345.943 -> That's called best intentions, at least what we call it.
1348.23 -> So that's not gonna work.
1350.93 -> And so, someone's gonna,
1352.58 -> usually your operation's person is gonna be like,
1354.14 -> how do we make sure this stuff is working properly?
1356.33 -> So one of the good parts of network manager,
1359.15 -> and this is, like I said,
1360.11 -> what we originally built it for was
1361.97 -> to give you that sort of level of visibility.
1364.1 -> And so, you can come in here
1365.267 -> and you can show like which regions you're in,
1367.58 -> you know, where you're at.
1368.9 -> You can see, for example, the topology
1370.7 -> and how the routing and the segments
1373.22 -> and the attachments are related to each other.
1376.58 -> You can come in and get events.
1377.69 -> So this is all an event bridge.
1379.7 -> So for example, if you wanted to create a slack room
1382.61 -> that has every single BGP change
1384.77 -> or tag change or network change going on,
1388.01 -> you can get all that here.
1389 -> You can take all that
1389.833 -> and you can feed it into a pager,
1391.924 -> or into webpage or whatever.
1394.7 -> It's just events.
1395.69 -> That's what event bridge does really well.
1400.07 -> And then you also have some more
1401 -> of these dashboards and graphs.
1402.2 -> So if you want to, for example,
1403.67 -> put up a pretty graph so your knock
1405.68 -> looks like they know what they're doing,
1407.87 -> so that IT managers believe why
1409.85 -> they're spending all this money,
1411.65 -> you know, there's a graph for that.
1414.08 -> And also more of a logical graph.
1415.7 -> If you need to get into more
1416.6 -> of the troubleshooting or the,
1418.1 -> you know, architecture and design kind of side of things,
1421.25 -> there's some pretty graphs there for you to use.
1424.16 -> Cool, well, things are going pretty well.
1427.07 -> Now you get another email.
1429.29 -> Now you get an email that says,
1430.97 -> hey, the pen testers,
1433.19 -> they were deploying WordPress with
1434.21 -> some unpatched plugins or something like that out there,
1438.38 -> which doesn't last for very long
1440.09 -> on the internet when it's not patched.
1442.28 -> And they've also found out they've moved laterally
1444.59 -> from that one WordPress server to something else.
1448.07 -> So this is also no bueno, which means we got hacked.
1450.59 -> So one of the things you can do here,
1453.8 -> this one's pretty simple.
1454.85 -> You can go in here into the development segment.
1457.61 -> 'Cause again, we weren't approving
1459.41 -> or being in this workflow at all.
1461.63 -> So we just let anyone join the development segment
1463.58 -> if they used the right tags, which is cool.
1465.56 -> A little dangerous.
1466.79 -> So we can reduce the danger here
1469.55 -> by creating this isolated attachments mode.
1472.61 -> This means we can let hundreds
1474.68 -> or thousands of developers onto the same segment
1478.1 -> and they can't talk to each other.
1479.57 -> Much like if you're, you know, at a conference
1482.33 -> and you're on the access points for wireless, you know,
1484.85 -> I can't go and ping and SSH someone else's computer
1487.22 -> on the same wireless network,
1488.15 -> 'cause they block that sort of local control.
1490.4 -> So it's basically the same thing,
1491.51 -> but you know, for VPC and attachment type routing.
1495.77 -> So that's pretty good, 'cause that was a quick fix.
1500.06 -> So what this looks like is, you know,
1501.83 -> in this case, I have multi-region,
1503.48 -> but it could be in the same region.
1504.95 -> Which means these to VPCs on development
1508.22 -> now can't talk to each other.
1509.09 -> So I put this little lock icon next to development
1511.37 -> so I know what that means now.
1513.409 -> It's also good for sandboxes.
1516.195 -> It's good for production where production apps
1517.82 -> don't need direct access to each other.
1520.55 -> Any place where you're doing auto accept attachments
1523.55 -> because you have no idea what potentially are in those.
1526.7 -> Or we'll talk about this later,
1527.87 -> also if you wanna connect a bunch of external networks
1529.283 -> that you don't necessarily trust,
1531.59 -> you can do that as well.
1534.32 -> What if you don't know if this is a good idea or not?
1536.48 -> How do you know that I can just remove all this access?
1539.96 -> One way is you can do flow logs.
1541.37 -> So flow logs show you the IP address
1543.41 -> and VPC IDs of flows.
1545.42 -> So you can go in there
1546.253 -> and all your VPCs enable this that you care about,
1548.21 -> and then, you know, run it through Athena
1549.98 -> or some other query languages to find out
1551.69 -> if you have anything going on there.
1553.52 -> We also just enabled on Transit Gateway last week
1556.1 -> the able to turn flow logs on for a whole TGW.
1558.83 -> So that's a new feature you can use
1560.66 -> if you're already using TGWs.
1561.83 -> That's new.
1562.94 -> You can also check for security groups
1564.35 -> for access that you've explicitly allowed.
1567.05 -> As well as VPC access analyzers.
1568.79 -> A fairly new tool that will let you go in there
1571.55 -> and query like, can this talk to this?
1573.32 -> Can this talk to this?
1575.3 -> And like give you alerts and that kind of thing.
1576.83 -> And you can automate it.
1577.663 -> There's APIs. It's pretty cool.
1579.26 -> So if you're not aware of it, it's worth checking out.
1582.86 -> All right, so things are going well.
1585.38 -> Security was impressed by the fact
1586.94 -> that you just fixed the developer issue pretty fast.
1590.06 -> And now the contracts are up for all
1591.28 -> of the on prim security gear.
1593.75 -> They don't really wanna spend, I guess,
1595.07 -> 1.2 million dollars on super Gbix.
1598.31 -> And so they wanna move this to the cloud somehow.
1600.98 -> And have come to you to figure out what this looks like.
1605.66 -> This is not a real spreadsheet, by the way.
1607.13 -> But it's indicative.
1609.65 -> So essentially what they wanna do
1612.5 -> is they wanna take this internet access
1613.94 -> that's down here off the VPN.
1615.95 -> And they wanna move it into the cloud.
1618.5 -> And so, how does that work?
1620.21 -> Typically what happens is,
1621.41 -> you put the firewalls into a VPC.
1623.12 -> Call it like a buffer VPC or inspection VPC.
1625.43 -> Put a word on it.
1627.35 -> To the actual Cloud WAN network,
1629.33 -> it just looks like an VPC attachment.
1630.95 -> So what we're really doing here
1632.03 -> is we're doing some kind of fancy routing
1634.07 -> and fancy type of order of routes rules
1637.112 -> to make this happen in this way.
1640.52 -> If you're on this sort of journey,
1642.92 -> you're probably gonna look at
1643.76 -> a whole bunch of other services.
1645.26 -> So Gateway Load Balancer and AWS Network Firewall
1648.44 -> are the types of things you'd put
1649.273 -> in this inspection VPS.
1650.78 -> But you've also got things like GuardDuty,
1653 -> Amazon Detective, and AWS Security Hub,
1655.7 -> which are a little more sort of cloud native ways
1657.86 -> to look at your whole VPC environment.
1660.41 -> And so you'd probably wanna
1661.243 -> use these things in conjunction.
1662.69 -> So the real short story is like,
1664.64 -> yes, the firewalls stack.
1665.69 -> You have on premises meets 100 different check boxes.
1669.62 -> And when you move that into AWS,
1670.97 -> you're gonna have to change how you meet those check boxes
1673.07 -> usually in a couple of different ways.
1674.78 -> And so, you can basically combine
1675.92 -> a lot of AWS native services,
1677.24 -> plus if you want to, you can just bring your favorite,
1680.685 -> you know, favorite firewall vendor up
1682.55 -> into AWS and do that.
1685.395 -> To go a little bit deeper on that one,
1687.5 -> to give you a little bit better idea
1688.52 -> of that magic routing I was talking about,
1689.93 -> it looks something like this.
1691.49 -> So in this example, in your core network,
1693.98 -> and you create a separate firewall segment,
1696.59 -> or you just use the hybrid segment
1699.32 -> and attach a new VPC to that.
1701.03 -> And that VPC, in this example,
1702.65 -> I'm using two different availability zones.
1704.93 -> So I'd split that into four subnets.
1706.85 -> One for my core network attachments
1708.95 -> and one for the firewalls.
1710.27 -> If you have a Gateway Load Balancer involved,
1711.68 -> you might have a little bit more in here.
1714.65 -> Or if you're using some of the new firewalls of service,
1716.51 -> like Paul Alto has one,
1717.89 -> that drops endpoints in your VBC,
1719.12 -> that looks a little bit different.
1719.99 -> So this is kind of a generic version of this.
1723.05 -> But the idea is, you create that VPC.
1724.82 -> You attach it to Cloud WAN.
1726.275 -> And then you create segment actions.
1728.99 -> So you would basically make sure
1730.25 -> that the hybrid network is sharing its routes
1733.7 -> with development and production.
1735.2 -> And then within development and production,
1736.85 -> for example, if you wanna do centralized network egress,
1739.88 -> you would put a zero zero route,
1741.71 -> a static zero zero route through
1743.63 -> the segment actions in those segments.
1746.51 -> And that would forward all
1747.83 -> the traffic through the firewall.
1750.65 -> And so, depending upon your architecture here,
1752.63 -> this design is gonna shift a little bit.
1754.13 -> We have some blogs.
1755.45 -> Most of this stuff that you'd do with Transit Gateway
1756.98 -> is gonna sort of apply one to one here.
1760.88 -> So yeah, that's gonna just depend a little bit.
1763.1 -> You know, you can talk to any of us,
1763.933 -> and we can help you out with that
1764.93 -> if you get sort of stuck on it.
1768.38 -> Cool, all right, well, things are going well.
1770.69 -> You have security and internet in the cloud.
1772.94 -> And now, you know, you're minding your business.
1776 -> Eating cereal on your kitchen counter
1779.15 -> and reading tweets for the day
1780.59 -> before you do some actual work.
1782.33 -> And you find out from Twitter
1784.34 -> that your company's buying another company.
1787.49 -> And no one talked to you because you're not, I guess,
1789.89 -> high enough or important enough to know about these things.
1792.59 -> But you know, like this is gonna roll your way.
1796.22 -> 'Cause they're gonna need network stuff at some point.
1798.17 -> So over the next couple of weeks,
1800.03 -> you get clued in, you find out.
1802.31 -> You find out more about the startup.
1804.5 -> The startup's cool.
1805.46 -> They're making a bunch of money.
1807.41 -> They're so cool your company doesn't wanna mess with them.
1810.08 -> Like, don't mess what's working with them.
1811.94 -> Like, we don't wanna turn them into us.
1814.52 -> We want them to just continue being cool for awhile.
1816.17 -> We'll ruin them later.
1817.25 -> But for now, they'll be cool.
1820.19 -> And so you find out from their networking folks,
1821.78 -> they've got a Transit Gateway with, you know, some VPCs.
1824.78 -> So it kind of looks like your architecture,
1826.07 -> but it's not your architecture.
1828.83 -> And they don't want your standards.
1830.39 -> This is kind of like the cowboy scenario.
1832.46 -> You might even have these people working in your company
1834.38 -> that just don't like IT.
1836.42 -> Maybe you don't have to acquire someone
1837.53 -> to have cowboys in your company.
1839.39 -> But this is pretty standard.
1840.32 -> We see this all the time.
1841.73 -> Don't feel bad if this happens to you.
1842.99 -> This is very normal.
1845.36 -> So the way this work is,
1847.97 -> they have an existing Transit Gateway.
1850.31 -> Luckily, for the ease of PowerPoint magic,
1853.37 -> they're in one of the regions we're already using.
1855.14 -> And it doesn't matter if they are actually.
1857.71 -> It just makes my PowerPoint more complicated.
1859.76 -> So in this case, what we can do is
1861.95 -> we can attach their Transit Gateway to the Cloud WAN.
1864.59 -> We may attach it multiple times.
1866.3 -> So some of their traffic goes to one place,
1868.28 -> some of it goes to another place.
1869.84 -> Luckily, because they watch all these
1871.16 -> same reinforce and reinvent presentations,
1872.93 -> they've also chosen to use development
1875.57 -> and production for their route tables.
1876.92 -> So it actually maps very cleanly to our architecture.
1879.5 -> And so, in this case, you map the Transit Gateway
1882.8 -> to a couple different segments here.
1885.2 -> Their VPCs.
1886.033 -> And so now you can think about it
1886.866 -> instead of these VPCs attaching directly to the Cloud WAN,
1889.25 -> they just transitively map through Transit Gateway.
1894.59 -> And so, in cases like this, a couple different things.
1897.98 -> Like one is we see this interop use case.
1900.23 -> Hey, someone has a TGW, you wanna work with it.
1902.45 -> We also see these like migrations in Brownfields.
1905.87 -> And then we also see sort of like
1907.1 -> this like federation type case,
1908.6 -> which I'll talk in a little bit more depth here.
1911.84 -> So the way this actually works is like this.
1914.33 -> So a Transit Gateway, Cloud WAN.
1917.78 -> You create a peer.
1919.91 -> This is a little bit different.
1920.75 -> If you're familiar with like VPC peering
1922.49 -> and Transit Gateway peering,
1923.9 -> once you do a peer with those services,
1925.64 -> like you can start routing stuff.
1927.32 -> It's not the case with Cloud WAN.
1928.85 -> When you peer this,
1929.683 -> this is kind of like a trunk in
1931.64 -> the old layer two switching world.
1933.38 -> This just opens up a relationship
1935.36 -> between the Transit Gateway and the Cloud WAN.
1938 -> And so, what's actually happening underneath the hood here
1941.21 -> is we're going into your Transit Gateway
1943.13 -> and we're doing some things.
1944.57 -> So we're enabling dynamic routing.
1946.7 -> We're creating something that's called a policy table,
1949.01 -> which allows us to do this keep segments mapped.
1952.49 -> So we're actually doing some policy stuff
1954.14 -> underneath the hood.
1955.01 -> You don't have to worry about that stuff,
1956.42 -> 'cause it's network magic.
1957.89 -> But it is there, and it's pretty cool.
1959.84 -> It also means this is how you can enable
1961.25 -> dynamic routing on your Transit Gateway today
1964.46 -> by using this feature.
1966.2 -> And so, next what you do is
1968.27 -> you create route table attachments.
1970.4 -> So these are attachments just like
1972.26 -> every other attachment we have.
1973.79 -> And it follows the same rules
1975.05 -> and the same automation that we built earlier,
1977.39 -> which means that if you want these attachments
1979.04 -> to actually map to something,
1980.84 -> you have to tag them.
1981.92 -> So you tag these route table attachments.
1984.14 -> And then after that,
1985.34 -> that's when the BGP
1986.21 -> and all that sort of stuff is functioning.
1989.12 -> And so this allows you,
1990.35 -> you can do many to one or one to one
1992.27 -> or whatever you wanna do on your route tables here.
1994.52 -> If you only have one route table
1995.66 -> and you want a flat network, that's cool too.
1997.43 -> You don't have to use segments at all.
2002.41 -> If, for example, you said, hey, look,
2003.85 -> I don't wanna maintain two networks,
2005.02 -> 'cause that's expensive and time consuming
2006.4 -> and I don't wanna talk to auditors
2007.78 -> about two different sets of solutions,
2009.13 -> and like I only want one set of Terraform code or whatever.
2012.73 -> You can migrate.
2013.78 -> And so, what that looks like is,
2015.37 -> you've got inside your VPCs.
2017.14 -> You have that zero zero route
2018.64 -> pointing to a TGW network interface.
2022.03 -> What this would look like is you would attach
2023.8 -> your VPCs to Cloud WAN.
2026.2 -> You would have both of those live at any given point.
2030.16 -> You test it.
2031.06 -> Or I'm sorry, you would move the route table over.
2033.61 -> And now you can start testing it.
2034.807 -> You could do this for just a single slash 32 route,
2036.88 -> or whatever you wanna do.
2038.35 -> You could test all this stuff out.
2039.97 -> And if this doesn't work and something goes wrong,
2041.89 -> you just change that route back
2043 -> and you're back on Transit Gateway again.
2045.43 -> Once you feel comfortable and happy with all these things,
2047.65 -> you can then take away some of the old stuff.
2050.08 -> So you can take away the peerings and attachments.
2053.44 -> You can take away the whole Transit Gateway if you want to.
2054.9 -> If you don't need it anymore.
2056.47 -> And so you could do a full migration sort of like that.
2062.86 -> All right, well, we thought we were doing pretty well
2065.89 -> with this whole startup thing.
2067.84 -> We find out the startup has made some very bad decisions.
2071.35 -> And they're using some other thing
2073.24 -> that looks like a cloud.
2074.65 -> Some other thing.
2076.54 -> I couldn't find like any sort of diagram for other clouds
2081.67 -> in our architecture diagram library for some reason.
2084.01 -> So I had to hand draw this one.
2087.07 -> I also made sure the kerning was incorrect
2088.78 -> that way the branding doesn't look the same as ours.
2090.711 -> Just so no one gets confused at all.
2093.7 -> So this is now our official other cloud symbol.
2097.45 -> And so we have to figure out how to deal with this.
2100.93 -> So in this case,
2103.72 -> the other cloud's over here somewhere.
2106.66 -> One of the things we can do is
2107.59 -> we can create a VPN directly there.
2110.23 -> Because IP set a standard,
2111.49 -> and it's pretty well established across lots of places.
2114.79 -> And because about a year ago,
2116.59 -> AWS built a feature called Ike Initiation,
2119.35 -> which allows us to initiate
2120.76 -> a VPN connection to somewhere else.
2122.83 -> This allows us to interoperate
2123.97 -> with a bunch of other VPN services.
2126.43 -> And so not all of the other VPN services
2130.33 -> act exactly like ours
2131.47 -> and use the same sort of like two tunnels,
2134.38 -> you know, 169.254 addressing, all those kind of things.
2137.32 -> So in a lot of cases,
2139.18 -> once you interoperate,
2140.08 -> you only get one of those tunnels running.
2142.27 -> But maybe you create two VPN connections.
2144.46 -> And a lot of the other folks don't support
2146.11 -> equal cost multipath, ECMP.
2148.3 -> So usually you're limited to like one tunnel
2150.19 -> at about one gig, 1.2 gigs or so.
2154.03 -> But for a lot of cases, like maybe for authentication
2156.19 -> is just hanging out over there.
2157.417 -> And you don't need a lot of intensive data and whatnot.
2160.33 -> You just need basic connectivity.
2162.37 -> So VPN's a great option for that.
2164.17 -> Otherwise if you say like,
2165.64 -> hey, actually we need to run like 10 gigs
2167.41 -> of stuff to this other place.
2170.95 -> You can use direct connect.
2172.03 -> So right now, a Cloud WAN doesn't have
2173.933 -> a native direct connect attachment.
2176.83 -> We're just transitively using it
2178.18 -> through Transit Gateway.
2179.08 -> So we're getting a lot of use
2179.92 -> out of the transit word on TGW here.
2183.79 -> And so you can do direct connect
2185.35 -> down to your direct connect point of presence.
2186.91 -> There's a whole bunch of partners
2188.62 -> that will basically connect you
2190 -> to every other cloud's sort of direct connect equivalent.
2193.72 -> And then you can just basically
2194.86 -> hairpin through them to get there.
2197.65 -> You could also just use the internet.
2199.84 -> I mean, if it's cloud native enough and it's got encryption
2202.63 -> and it's got authorization and security on it,
2205.18 -> then you may not need to create a private network at all.
2208.45 -> Or there's a whole bunch of SD WAN sort of solutions here
2211.54 -> that will run wherever you want them to
2213.337 -> and all connect together.
2216.58 -> So now your call center person,
2219.64 -> who you text every now and then
2221.26 -> and you mostly get bad news from, tells you that,
2223.544 -> hey, the voice quality in Singapore is not good.
2226.09 -> You know, they've got VPNs to Singapore and they flap,
2229.36 -> and the quality's not great.
2231.16 -> We need to fix it.
2232.33 -> So essentially what we're gonna do here
2235.66 -> is we're gonna add another region,
2237.1 -> which I showed you how to do earlier.
2240.1 -> But now what we're gonna do is
2241.12 -> we're not gonna create any VPCs in that region.
2242.89 -> We're just gonna create a VPN connection.
2245.86 -> So basically our core network is now in three regions.
2249.7 -> And now the site in Singapore
2251.92 -> can do a VPN connection just from,
2255.28 -> you know, within Singapore to the Singapore region.
2257.86 -> Luckily, Singapore is not a very big geographical place.
2260.38 -> So the internet connectivity from Singapore
2261.97 -> within Singapore is pretty good.
2264.04 -> And then it's gonna run over the AWS backbone,
2267.16 -> all the way into Germany or the United States,
2269.95 -> or wherever you wanna go.
2271.69 -> And so we can use that high quality network
2273.94 -> without having to go procure a whole bunch of,
2276.43 -> you know, third party contracts and whatnot over there.
2279.367 -> And so, now our voice quality people are pretty happy,
2281.95 -> and that makes us happy.
2286.12 -> Your CFO now asks you a question.
2288.94 -> He's sending this over RFC 1149.
2291.61 -> For those of you that aren't into
2293.5 -> 20 year old networking jokes,
2295.12 -> that's IP over avian carriers.
2298.54 -> So this goose--
2299.68 -> I put this in like pretty much all of my presentations,
2301.63 -> 'cause people leave feedback all the time
2303.22 -> of like they want more goose.
2305.26 -> So I'm always looking for more ways to insert more goose.
2308.131 -> If you leave feedback,
2309.56 -> maybe I'll do something different next time.
2313.81 -> Either way, this goose delivers a message to you.
2316.15 -> And it says like, hey,
2319.48 -> our data center's looking pretty lame.
2321.19 -> All the apps are out of it.
2322.84 -> And the only thing left are your stupid network racks.
2324.79 -> Get them out.
2325.623 -> I wanna close that contract out.
2328.42 -> And so, all right, well,
2329.74 -> let's figure out what that looks like.
2332.44 -> So what's actually left in your data center
2334.87 -> after you've done a huge migration?
2337.63 -> You've got the WAN and your WAN routers
2339.52 -> connecting MPLS and whatnot.
2343.06 -> You've got maybe a connection to another data center.
2346.18 -> Some dark fiber that you used to
2347.65 -> run storage synchronization over.
2350.38 -> Maybe you do have this sort of extranet
2352.877 -> where you have VPNs and maybe even direct fiber
2356.53 -> out some business partners of sorts.
2359.8 -> And then, you know,
2360.696 -> we're still going through the whole pandemic thing.
2363.37 -> So people are still coming in via VPN and client VPN.
2368.08 -> And so, yeah, we're still treating the data center
2370.18 -> like it's the center of our gravity,
2371.62 -> even though most of this stuff has gone up to AWS.
2373.33 -> And so, we wanna shift that.
2375.79 -> How do we shift all that into AWS now
2377.59 -> that AWS is now the new center of gravity for us?
2380.71 -> So way that this looks like is
2382.72 -> a couple different things we can do here.
2384.13 -> So we can take the VPN for the branches.
2387.22 -> So maybe they need MPLS, maybe they don't.
2390.37 -> We can came in over VPN.
2392.05 -> If they do want to keep MPLS, we can use direct connect.
2396.13 -> We can keep that coming in.
2399.864 -> Maybe you've got some sites where you're doing
2402.1 -> a bake off or some testing of SD WAN.
2406.083 -> You know, a lot of customers I've talked
2406.93 -> to are looking into SD WAN, or they have plans for it,
2409.51 -> or they're still in the initial
2410.925 -> sort of phases of roll out of it.
2414.22 -> And so, you can have a mix of both.
2415.78 -> You can have some VPN, some SD WAN.
2418 -> You know, if you have some old sites
2419.17 -> that you don't wanna maybe put a new SD WAN box in,
2421.6 -> you could have a mix.
2423.49 -> Or you could be fully SD WAN if you want.
2425.08 -> So we can handle sort of either scenario.
2428.32 -> And then, like I said,
2430.15 -> if you wanna do direct connect in the cloud, you can.
2432.58 -> But there's also a new feature called Site Link.
2435.76 -> So if you have two ports,
2437.17 -> like in the case of the slide before
2438.88 -> where we have two data centers
2440.26 -> that both have direct connect to AWS,
2442.18 -> if those two data centers need to talk to each other,
2444.49 -> you can use Site Link.
2445.45 -> You just basically enable flag on your direct connect port
2448.87 -> on the virtual interface that says enable Site Link.
2451.66 -> And if two ports on the same
2453.28 -> direct connect gateway enable that,
2454.72 -> you can send traffic directly between those data centers
2456.7 -> without ever hitting an AWS region.
2458.38 -> So you're just using our fiber
2460.3 -> to get between two locations.
2462.58 -> And so, if you need that sort of like faster bandwidth
2465.91 -> and you already have direct connect ports,
2467.86 -> it makes a ton of sense.
2471.13 -> And then, yeah, we can do client VPN as well.
2473.26 -> So we have a native service that you map into this.
2476.29 -> Or you can use your third party solution if you want.
2478.66 -> Pretty much all of them have some sort
2479.95 -> of virtual AMI that you can load up, put it in a VPC,
2483.7 -> point the routes similar to the firewall situation.
2486.28 -> You put in a VPC,
2487.113 -> put some static routes pointing at each other,
2488.68 -> and you can get your client VPN all into this as well.
2491.89 -> Which that's handy for client VPN,
2494.26 -> 'cause now like, hey, we need client VPNs in India.
2497.86 -> We need them in South Africa.
2499.3 -> We need them in Dubai.
2500.14 -> We need them wherever.
2502.21 -> You can create those endpoints
2504.13 -> all over the world very quickly.
2509.5 -> So the other case that we see sometimes is more about like,
2512.95 -> okay, so all of the stuff we own
2514.51 -> is out of the data center now.
2515.38 -> But what about all those business partners we connected to,
2517.635 -> and the extranet, and the VPNs?
2519.22 -> How does that work with Cloud WAN?
2521.8 -> And I've gotten this question
2522.633 -> actually pretty regularly since we launched.
2525.79 -> And every customer approaches me being like,
2528.07 -> are we allowed to do this?
2529.06 -> Is this something that can work?
2530.47 -> Is this something you guys wanna do?
2531.937 -> And the answer is, yeah.
2532.87 -> I think we actually have a pretty good model for it.
2535.75 -> You know, I think one of the interesting things
2537.37 -> about these networks is you can't control
2539.95 -> how other companies want to contact you.
2542.5 -> They have their own HQs, and their own resources,
2545.11 -> and their own locations.
2547.63 -> They may be all over the world.
2548.92 -> You can't force them into the regions
2550.45 -> that just you operate in.
2552.16 -> And so, you can use Cloud WAN to sort of
2554.41 -> extend these networks to wherever they wanna be.
2556.9 -> But you still get one management
2557.944 -> and sort of control plane.
2560.56 -> And so, yeah, it's kind of the same case
2563.5 -> as we just talked about with the branch offices.
2565.33 -> They wanna come over on our VPN?
2566.83 -> Great, that's easy.
2568.51 -> Direct connect, SD WAN also.
2571.69 -> Well, we've also seen some customers that go,
2573.76 -> hey, we're using this as our data provider.
2575.65 -> And they used to be in a data center,
2577.03 -> but they migrated to AWS.
2578.59 -> And so now they're in a VPC.
2580.21 -> So how would I basically connect
2581.83 -> my corporate network to this third party network,
2584.47 -> but they're in a VPC now, not a VPN,
2586.24 -> and not some physical thing.
2588.61 -> And so this tends to be kind of a case where,
2591.94 -> there's a couple different designs you could do here.
2593.71 -> The one I chose for this slide
2595.48 -> was to create a separate core network.
2597.43 -> Just because people like to treat these
2599.17 -> external networks as a separate thing
2600.88 -> with separate change control and separate everything.
2604.78 -> And so, yeah, you could put, you know,
2605.89 -> vendor one, vendor two, vendor three,
2607.48 -> et cetera into separate segments.
2609.49 -> Or you could put the acquisition into it over here.
2613.21 -> You wanna connect to other clouds.
2614.62 -> You can connect this into this.
2616.3 -> And then any VPC that needs accessed
2618.4 -> in any sort of special networks,
2620.08 -> you can connect it twice, essentially.
2622.33 -> Connect it to the corporate network,
2623.44 -> as well as to this sort of external network.
2625.66 -> And you could do this all within the same Cloud WAN.
2628.93 -> Absolutely, you could.
2630.37 -> But some people just, again, like that
2631.597 -> sort of pure separation here.
2635.74 -> It's interesting.
2636.573 -> Even if they have a VPC or their own Transit Gateway,
2639.49 -> this model still works.
2641.32 -> And so it's kind of like connect
2642.46 -> how you want when you want to these models.
2645.67 -> Because remember, I did say you can share
2648.1 -> a core network out via the account ID
2650.65 -> and not just within your AWS organization.
2652.99 -> And you can do that, I don't know, couple hundred times.
2654.76 -> So this is gonna scale pretty well.
2658.9 -> And yeah, so one thing people don't understand
2660.483 -> is you can connect on VPC to multiple could WANs,
2663.07 -> or to TGW and Cloud WAN at the same time, right?
2665.11 -> So there's no limitations there.
2667.03 -> Well, we have a limitation of a soft limit of five.
2669.22 -> Mostly 'cause if you're connecting
2670.12 -> more than five Cloud WANs to a single VPC,
2672.67 -> I think we should talk.
2674.59 -> Not that it's necessarily a bad idea,
2675.94 -> but I can't draw a good idea of
2678.07 -> what that would look like quite yet.
2679.75 -> I have a couple ideas, but--
2681.1 -> So if you need to do that, let us know.
2685.75 -> And so yeah, some of the FAQs here that we get.
2688.9 -> So now, yeah, we've built a really cool network.
2691.33 -> It's multi-region, it's secure,
2693.58 -> it's doing all of our internet firewall stuff.
2695.65 -> It's doing our business partners.
2697.66 -> It's acting as our WAN.
2700.96 -> And yeah, we're network heroes here.
2703.69 -> So some of the questions I get.
2706.84 -> So the BGP, for example, is pretty simple.
2709.3 -> So if you're used to banging on a Cisco or Juniper device
2712.48 -> and having a million policy tables,
2714.31 -> and you know, all these things.
2715.9 -> Like, we don't have that yet.
2717.94 -> So essentially, there's no filter in community support.
2720.97 -> It's just from route table to route table,
2723.16 -> it's gonna copy everything.
2724.963 -> All the routes it learns from attachments
2728.26 -> is gonna basically redistribute.
2729.85 -> The static routes don't get redistributed.
2731.95 -> You have to do that manually.
2733.63 -> So if you need the static route in multiple places,
2735.64 -> just do it in multiple places, essentially.
2740.38 -> In terms of limits and quotas,
2742.6 -> it's 5,000 attachments.
2747.43 -> I think that actually should say 10,000 routes.
2749.41 -> It's 5,000 attachments, but 10,000 routes.
2752.195 -> And then 20 segments.
2754.3 -> Oh, that's again, 20 segments is a fairly soft number.
2757.63 -> Just talk to us if you wanna do more than that.
2759.07 -> But most of the time I do these designs with customers,
2762.4 -> by the time you get to 20, more than 20,
2764.86 -> it's usually like, oh, well,
2766.45 -> you could get rid of 100 segments
2767.283 -> if you just used isolated attachments mode.
2770.23 -> And some of these kinds of things.
2771.85 -> We're in 17 regions.
2773.47 -> So right now we're everywhere except for
2776.95 -> Korea, Hong Kong, and Sao Paulo.
2781.03 -> Pretty much all the other regions we're operating in.
2783.76 -> Oh, except for gov cloud in China.
2785.5 -> The purchasing regions.
2788.32 -> Because this service has the word WAN in it,
2790.36 -> we get a lot of very traditional WAN questions like,
2792.7 -> hey, can I support, you know, DACPEF on QOS?
2796.03 -> You know, the answer we have is not no.
2799.39 -> It's just that we do things differently.
2800.92 -> So we do capacity management across our backbone
2803.98 -> and we aim for 0% packet loss.
2805.36 -> And we do a pretty good job at that.
2807.67 -> We just don't have like prioritized queuing
2809.71 -> for any given thing over the backbone.
2811.9 -> And as well as the SLAs are, you know,
2814.9 -> for a VPC within the region,
2816.76 -> there's not SLAs from, for example,
2818.47 -> from Ireland to New York or something like that.
2823.33 -> So there's not like hard SLAs
2824.89 -> that you might get from a typical service provider.
2828.85 -> We do have full automation support.
2830.47 -> So we have Terraform support, Terraform,
2833.11 -> CloudFormation, CDK support even.
2836.29 -> So that's all out there and ready for people.
2838.69 -> We've already got people building with that stuff,
2840.82 -> even though we went GA two weeks ago.
2843.25 -> And so, the other question I get,
2845.95 -> 'cause I've been presenting on this for like six years,
2848.26 -> is like, all right, so what's the difference
2849.273 -> between Transit Gateway and this?
2850.99 -> When do I use one or the other?
2852.91 -> And so, I can break that down a little bit real quick.
2856.69 -> So one, Transit Gateway's not going anywhere.
2859.48 -> Still love Transit Gateway.
2860.74 -> It's an awesome product.
2862.75 -> You know, we've got everyone from the smallest companies
2865.18 -> to the largest companies, you know,
2866.71 -> the last four years building on that.
2868.3 -> So it's not going anywhere.
2869.86 -> We're building roadmap on both.
2872.2 -> And so, the way to think about it is,
2874.03 -> you know, Transit Gateway is really,
2876.73 -> it's still the work course for a lot of things.
2878.71 -> I recognize that like, you know,
2880.42 -> customers are skittish,
2881.5 -> and networking juniors are skittish
2882.52 -> about new services, right?
2884.23 -> So if you want something that's got
2885.4 -> a million references and a lot of customers using,
2887.65 -> Transit Gateway.
2889.51 -> Cloud WAN is built under the hood with something very,
2891.58 -> very, very, very similar to Transit Gateway.
2893.14 -> So we haven't like gone and built
2895.48 -> new data plane mechanisms or anything.
2898.15 -> So you're still getting
2898.983 -> that reliability from those services,
2900.07 -> but the front end APIs
2901.387 -> and the management is gonna be different.
2903.16 -> And importantly, you know, for example,
2906.01 -> AWS does that stuff for you, right?
2908.08 -> If you're running a four region Transit Gateway deployment
2910.93 -> and you wanna add a fifth region,
2912.58 -> you're talking about like 30
2914.293 -> to 40 APIs to add a fifth region.
2916.81 -> It's one line of, you know, configuration in Cloud WAN.
2920.59 -> And so, depending upon your use cases,
2922.78 -> like it could be a lot simpler in Cloud WAN.
2924.85 -> But if you've already built that automation
2927.13 -> and you like it,
2928.39 -> you can just keep using it with Transit Gateway.
2931.78 -> That's the case for a lot of customers.
2933.52 -> I've also just talked to some customers that go,
2935.44 -> yeah, we run our own automation
2936.58 -> and we're terrified of it.
2937.72 -> We don't wanna run it anymore.
2939.28 -> And so, if that's you,
2940.927 -> you might wanna take a look at Cloud WAN as well.
2944.17 -> One of the things that is a little bit different
2945.76 -> on Cloud WAN is the ability to segment.
2948.07 -> So if you wanna keep segmentation
2950.32 -> and sort of route table access across,
2953.2 -> you know, multiple TGWs or regions,
2955.87 -> that's one of the unique cases
2957.22 -> for Cloud WAN for you to do that with.
2962.47 -> But you don't have to choose one or the other, right?
2965.11 -> You can say like, hey, you know what,
2966.37 -> Cloud WAN is our corporate IT standard,
2968.11 -> but like the cowboys can use Transit Gateway.
2970.69 -> Or, you know what,
2971.86 -> actually Transit Gateway is our corporate standard,
2973.63 -> but like for the self-service developer sandbox,
2976.3 -> we really wanna use that built-in automation stuff
2978.52 -> and we'll have a spoke of Cloud WAN there.
2981.24 -> And so you don't have to choose one or the other.
2983.725 -> And you don't get double dinged on the data transfer.
2985.78 -> So if traffic goes from Transit Gateway
2987.57 -> to Cloud WAN or vice versa,
2989.32 -> you only pay one data processing charge.
2991.512 -> And so you don't get billed for both of them.
2994.18 -> Which means that you can kind of run that stuff for awhile
2996.19 -> without paying like longterm costs on it.
3001.17 -> And then, yeah, there's a couple things
3002.97 -> on Transit Gateway that aren't on Cloud WAN.
3005.7 -> Some of those are, they're not on there yet,
3007.8 -> and some of those are, they probably just won't come.
3010.23 -> So for example, like multi-cast.
3012.66 -> It gets really, really hairy whenever
3014.31 -> you try to develop in a global manner.
3016.14 -> So Transit Gateway gonna probably
3018 -> have multi-cast locally for much longer
3020.34 -> than you'd ever see on Cloud WAN, for example.
3022.38 -> And that could change.
3023.22 -> But that's a good example of something
3024.6 -> that you would use Transit Gateway for.
3026.73 -> And direct connect isn't currently
3028.08 -> supported on Cloud WAN yet.
3029.4 -> So if you need to do a lot of direct connects,
3032.85 -> you can either, again,
3033.81 -> transitively bring it through Transit Gateway,
3036.15 -> or just use Transit Gateway for it.
3039.352 -> So, yeah, some of the interaction models we see
3043.35 -> between Transit Gateway and Cloud WAN look like this.
3045.9 -> One is this sort of Brownfield thing.
3048.42 -> We often see customers kind of
3049.56 -> choose their phases of architecture.
3052.11 -> Like they were in VPC peering,
3053.97 -> and then they did Transit VPC,
3055.47 -> and then they did Transit Gateway,
3056.76 -> and now they're looking at like,
3058.23 -> what is version four of their architecture look like?
3061.47 -> And so, version three might be Transit Gateway.
3063.99 -> And so in between version three and version four,
3066.96 -> you might just keep this peering connection up
3069.12 -> and keep both running.
3070.14 -> You may keep Transit Gateway alive
3072 -> until those applications die off.
3074.31 -> Totally valid.
3076.74 -> But like I said, some people might go like,
3078.21 -> actually I don't want two versions of
3079.71 -> my architecture running at the same time.
3080.97 -> I wanna converge those, especially if it's quick.
3084.544 -> And so, you can migrate if you wanted to.
3087.96 -> And then you've also got kind of like,
3090.18 -> I would say, this is even right now
3092.34 -> pretty appealing for a lot of Transit Gateway customers,
3094.23 -> which is, hey, I just want dynamic routing between my TGWs.
3097.83 -> So I peer all of my Transit Gateways to Cloud WAN once,
3101.43 -> and then it gets dynamic routing
3102.42 -> from all of the other TGWs.
3104.25 -> And so, it almost looks like a bit
3105.69 -> of like an MPLS cloud almost.
3107.61 -> Peer once, get my routes from everyone.
3110.55 -> And then, you know, I think I could see
3112.02 -> that evolving over time to that like,
3114.12 -> we want our centralized internet egress
3115.86 -> and ingress on the Cloud WAN.
3117.9 -> And maybe there's no VPCs there.
3119.19 -> VPCs always stay on Transit Gateway
3120.6 -> because I don't know.
3121.433 -> We've built that automation or whatever.
3124.68 -> But it's kind of like the federation model
3126.33 -> that we see like particularly like large companies
3128.52 -> that have a lot of like sister and partial companies
3131.58 -> and ownerships and mergers and acquisitions.
3134.25 -> Like, okay, fine.
3135.57 -> All of you get your own TGWs.
3137.13 -> Don't bother us.
3138.06 -> But when you come to the corporate network,
3139.29 -> you're gonna follow the Cloud WAN rules.
3141.72 -> And sort of seeing a lot more of that model as well.
3145.667 -> And so, in terms of partners,
3146.94 -> we got a whole bunch of folks
3147.84 -> that are working with us on Cloud WAN.
3149.58 -> So you know, we've got the SD WAN folks here.
3153.36 -> So if you wanna choose your favorite SD WAN vendor,
3156.27 -> we'll work with them.
3157.92 -> We've also got the folks on the integration side of things.
3161.28 -> So one of the things we've seen is
3163.083 -> that like often like a CIO
3165.09 -> or sort of high level person will be like,
3167.25 -> yeah, I don't wanna buy contracts around the world anymore.
3169.59 -> This seems like a really great idea.
3170.73 -> But, you know, even just me
3172.59 -> walking through this presentation,
3173.7 -> that was like nine phases of
3175.44 -> what we call network transformation.
3177.21 -> And so how would I go and kick this off with my team?
3179.22 -> How would I lead that?
3181.016 -> So a lot of these SIs listed here,
3183.469 -> that's their sweet spot.
3185.07 -> We've also got professional services internally at AWS
3188.1 -> that they're up to speed on this type of stuff too.
3189.78 -> So we've found that to be pretty helpful on these.
3193.11 -> We also have some case studies
3194.4 -> from some of the analysts that show like,
3196.29 -> hey, over this many years,
3197.67 -> you save this much ROI and TCO,
3199.17 -> and it all sounds great, like all of them do.
3201.63 -> But we've got those papers if that helps you
3203.49 -> get that kicked off as well.
3206.64 -> And so, yeah, I would say, you know,
3208.74 -> closing remarks here which is like,
3210.45 -> the use cases for Cloud WAN are really
3211.86 -> sort of like this sort of self-service IT model.
3214.65 -> This multi-region networking.
3216.93 -> Branch offices and ST WAN
3218.49 -> and building your backbone with us.
3222.12 -> Any sort of like extranets
3223.44 -> and communicating outside of typical AWS type stuff.
3228.87 -> And then, yeah, together, they work better together.
3231.84 -> Transit Gateway and Cloud WAN are good friends.
3233.55 -> And so, they can be forever together,
3235.02 -> migration, or federation.
3237.66 -> So there's a lot of models there.
3240.33 -> So thanks everyone for coming.
3242.4 -> Oh, I pressed the wrong button.
3243.84 -> Thanks everyone for coming.
3245.52 -> I know you guys have a party to get to and everything.
3246.9 -> So, I'll be up here for questions if anyone--
3249.81 -> Submit your feedbacks and let me know
3250.74 -> what you wanna see next time.
3251.573 -> So, thanks, everybody.

Source: https://www.youtube.com/watch?v=T0vEq9uSHRk