AWS Client VPN over Direct Connect

0

IHAC who is looking to implement below architecture -

Customer Office ---(Connected via their own network)———> Customer Data Center ——(Connected via Direct Connect)——> AWS

Customer have some applications in their office which use legacy protocols. They want to connect these applications securely with AWS and would like to leverage AWS Client VPN for end-to-end encryption.

Is this a right architecture pattern or customer should consider other solution?

AWS
已提问 8 个月前317 查看次数
1 回答
0

Hello.

There is a way to encrypt DirectConnect communication using Site to Site VPN.
With this setting, no settings are required on the client application side.
https://aws.amazon.com/jp/blogs/networking-and-content-delivery/introducing-aws-site-to-site-vpn-private-ip-vpns/
https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/aws-direct-connect-site-to-site-vpn.html

This solution combines the benefits of the end-to-end secure IPsec connection with low latency and increased bandwidth of the AWS Direct Connect to provide a more consistent network experience than internet-based VPN connections. A BGP connection session is established between AWS Direct Connect and your router on the public VIF. Another BGP session or a static route will be established between the virtual private gateway and your router on the IPsec VPN tunnels.

profile picture
专家
已回答 8 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则