Solved

intra transit peering between transit gateway at same region of any csp and manage allocate ip[public ip]

  • 8 April 2024
  • 8 replies
  • 43 views

Userlevel 1
Badge +4

         for single cloud / single region   with this design lab

  1. can be do intra transit peering between transit gateway at same region and  within  transit vpc
  2. how to manage allocate public ip [static ip ] that each csp has  lock limit 
  3. which best practice  recommended for  spoke gateway  related to  public ip  
  4.  does require to use public ip for spoke  gateway or let only transit gateway have public ip  and  be  egress routing for all spoke gateway to  internet and enable SNAT
icon

Best answer by Nico 12 April 2024, 13:25

View original

8 replies

Userlevel 2
Badge +1

Hi @MohammedBanabila 

I appreciate your query about setting up connectivity between transit gateways. To ensure that I fully understand your requirements and provide the most accurate information, could you kindly provide an example scenario of what you're aiming to achieve?

For instance, if you're referring to peering two transit gateways within the same region, could you specify if these gateways are part of a common networking strategy? Any additional context you can provide will greatly assist in offering a precise and helpful response.

Best practices suggest that each VPC should be connected to a central transit gateway to facilitate streamlined network management, rather than having multiple transit gateways within a single VPC. 

To maintain the efficiency and manageability of your network architecture, it's advisable to use a singular Aviatrix Transit Gateway per VPC and leverage transit peering to connect multiple regions.  This avoids the complexity and potential routing issues that could arise from having more than one transit gateway in the same VPC. (please, refer to Use AWS Transit Gateway to Access Multiple VPCs in One RegionSingle-Region Multicloud Transit Network Workflow and Building a Single-Region Transit Network.

 

Regarding question (2), are you inquiring about how to manage and allocate public IP addresses within the strict, unchangeable maximum limits set by each Cloud Service Provider (CSP), or are you referring to the initial soft limits that can be increased upon request? 

In addition to the previous question, are you referring to a specific Cloud Service Provider (CSP)? If so, could you please provide the name of the CSP you are referring to?

 

When designing your network and strategizing around the allocation and management of public IP addresses (question 3), it's crucial to recognize that each Cloud Service Provider has distinct constraints and limits on these resources. According to insights from the Aviatrix community, it is recommended to approach IP management with meticulous planning to avoid depleting your available quota, considering the differing limitations set by each provider. Network designs and IP allocation strategies should be customized on a case-by-case basis to account for these variances and to ensure optimal usage within the given constraints.

Could you please clarify if the core of your question (4) is to determine whether it's necessary or mandatory to assign a public IP address to each spoke gateway?

It should be noted that SNAT for managing and securing outbound Internet traffic from VPCs/VNets is implemented at the Aviatrix Gateway, either at the Transit or Spoke Gateways level. The specific deployment of SNAT will, however, depend on the scenario you are planning for.
 

Cheers,

Nico

 

 

 

 

 

 

Userlevel 1
Badge +4

my aiming  goal  was  manage and segment  spoke on their network domain and policy  at  same region.

less use  for public ip   at spoke   for example aws  eip  that has quota limit per account.  let transit vpc has contains  two transit gateway that pass traffic to their segment spoke .   those two transit  gateway are in same vpc  pass communication  between spoke gateway by peering those two transit gateway. 

to be accurate on this part  if  mandatory  for deploy  public ip   with spoke gateway 

use those transit gateway be only way out to internet  using nat and implement firewall rule 

 

 

Userlevel 2
Badge +1

Hi @MohammedBanabila 

regarding your first message line “my aiming  goal  was  manage and segment  spoke on their network domain and policy  at  same region.”, ow about considering a dive into Implementing Network Segmentation in an Aviatrix-Managed Network?

Have you had the opportunity to review my previous message and the Aviatrix Best Practices document that I shared? Are we considering deploying two Aviatrix Transit Gateways in the same VPC for a specific reason, or are we discussing implementing an Aviatrix Transit Gateway in High Availability (HA) mode?
 

Cheers,

Nico

 

 

Userlevel 1
Badge +4

yes i  check  it   and  two aviatrix transit gateway at same vpc  and HA  both  

Userlevel 2
Badge +1

Apologies for repeating the question @MohammedBanabila but could you clarify why there's a need to deploy two Aviatrix Transit Gateways in the same VPC (considering both of them are in High Availability mode)?

Userlevel 1
Badge +4

each  aviatrix transit gateway  are in  different availability zone so  each transit gateway attached to their spoke gateways that are segment it of multiple spoke vpc as lab diagram  in same region .    for    fault tolerance   to  keep  connection available without interruption   and  failover  scenario

Userlevel 2
Badge +1

To summarize:

The Transit VPC hosts an Aviatrix Transit Gateway set up for High Availability (HA), consisting of 2 EC2 Instances located in two separate Availability Zones.

Each of the 2 Spoke VPCs contains an Aviatrix Spoke Gateway also configured for High Availability, with 2 EC2 Instances across two different Availability Zones for each VPC.

 

Have I understood correctly? If so, do you have any additional questions regarding this network setup?

 

Cheers,

Nico

Userlevel 1
Badge +4

yes  as  you mentioned .   , no , its clear

Reply