03.07.2015 Views

8K Miles' Response to RFP - NCPA

8K Miles' Response to RFP - NCPA

8K Miles' Response to RFP - NCPA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A variety of connectivity options exist for users of Amazon VPC: they can connect their VPC <strong>to</strong><br />

the Internet, <strong>to</strong> their datacenter, or both, based on the AWS resources that they want <strong>to</strong> expose<br />

publicly and those that they want <strong>to</strong> keep private.<br />

• Connect directly <strong>to</strong> the Internet (public subnets) – You can launch instances in<strong>to</strong> a<br />

publicly accessible subnet where they can send and receive traffic from the Internet.<br />

• Connect <strong>to</strong> the Internet using Network Address Translation (private subnets) –<br />

Private subnets can be used for instances that Region 14 and <strong>NCPA</strong> members do not want<br />

<strong>to</strong> be directly addressable from the Internet. Instances in a private subnet can access the<br />

Internet without exposing their private IP address by routing their traffic through a<br />

Network Address Translation (NAT) instance in a public subnet.<br />

• Connect securely <strong>to</strong> a corporate datacenter – All traffic <strong>to</strong> and from instances in<br />

Region 14 and <strong>NCPA</strong> members’ VPC can be routed <strong>to</strong> their corporate datacenter over an<br />

industry standard, encrypted IPsec hardware VPN connection.<br />

• Combine connectivity methods <strong>to</strong> match the needs of your application – Region 14<br />

and <strong>NCPA</strong> members can connect a VPC <strong>to</strong> both the Internet and their corporate<br />

datacenter and configure Amazon VPC route tables <strong>to</strong> direct all traffic <strong>to</strong> its proper<br />

destination.<br />

Amazon VPC provides advanced security features such as security groups and network access<br />

control lists <strong>to</strong> enable inbound and outbound filtering at the instance level and subnet level. In

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!