AWS Client VPN over Direct Connect

0

IHAC who is looking to implement below architecture -

Customer Office ---(Connected via their own network)———> Customer Data Center ——(Connected via Direct Connect)——> AWS

Customer have some applications in their office which use legacy protocols. They want to connect these applications securely with AWS and would like to leverage AWS Client VPN for end-to-end encryption.

Is this a right architecture pattern or customer should consider other solution?

AWS
已提問 1 年前檢視次數 1193 次
1 個回答
0

Hello.

There is a way to encrypt DirectConnect communication using Site to Site VPN.
With this setting, no settings are required on the client application side.
https://aws.amazon.com/jp/blogs/networking-and-content-delivery/introducing-aws-site-to-site-vpn-private-ip-vpns/
https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/aws-direct-connect-site-to-site-vpn.html

This solution combines the benefits of the end-to-end secure IPsec connection with low latency and increased bandwidth of the AWS Direct Connect to provide a more consistent network experience than internet-based VPN connections. A BGP connection session is established between AWS Direct Connect and your router on the public VIF. Another BGP session or a static route will be established between the virtual private gateway and your router on the IPsec VPN tunnels.

profile picture
專家
已回答 1 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南