AWS PrivateLink

Use AWS PrivateLink to establish private, direct connectivity between VGS and your service providers or internal services. AWS PrivateLink is used in place of VPN or VPC connections to and from AWS-enabled services.

Overview

Using AWS PrivateLink connectivity offers many benefits, including:

  • Private Connectivity: AWS PrivateLink provides secure, private connectivity between VPCs, AWS services, and on-premises networks without exposing traffic to the public internet.

  • Reduced Attack Surface: By keeping traffic within the AWS network, PrivateLink minimizes exposure to potential threats and vulnerabilities associated with the public internet.

  • Low Latency: Since the data does not traverse the public internet, it experiences lower latency and potentially higher throughput.

  • Easier VPC Peering: Establishing connectivity with services in different VPCs becomes straightforward without the complexity of VPC peering configurations.

  • Simplified Management: Customers can manage and monitor their private connections easily using VGS Management Console, CLI, or APIs.

AWS PrivateLink connectivity is available in the following Availability Zones

Environment
Region
Availability Zones

prod/vault/live

US

use1-az2, use1-az4, use1-az6

prod/vault/live-eu-1

EU

euc1-az1, euc1-az2, euc-az3

prod/vault/live-ap-1

AP

apse1-az1, apse1-az2, apse1-az3

With VGS, AWS PrivateLink connections come in two flavors

  • Service Provider - Inbound Connections to VGS - Establish PrivateLink connectivity into VGS services

  • Service Consumer - Outbound Connections from VGS - Establish PrivateLink connections from VGS into your services

Service Provider - Inbound Connections from Third Party to VGS

In order to establish a PrivateLink connection to VGS, the customer must provide the following information to VGS

Field
Input Type

Customer AWS Account ID

Any valid AWS account ID

Customer AWS Region

Either us-east-1 or eu-central-1 or ap-southeast-1

Ports + Service(s)

forward-http-proxy - 4433 reverse-http-proxy - 443 sftp-proxy - 8022 tcp-proxy, ports 9000-9900 These ports are which each VGS service protocol will be exposed on via the PrivateLink NLB

Service Consumer - Outbound Connections from VGS to Third Party

In order to establish a PrivateLink connection from VGS, the customer must provide the following information to VGS

Field
Input Type

Customer AWS Account ID

Any valid AWS account ID

Customer AWS Region

Either us-east-1 or eu-central-1 or ap-southeast-1

PrivateLink Service Name

e.g. com.amazonaws.vpce.us-east-1.vpce-svc-0e123abc123198abc

PrivateLink Service Endpoint

e.g. vpce-svc-03d5ebb7d9579a2b3.us-east-1.vpce.amazonaws.com

Ports + Service(s)

List of Ports + Service(s)

Last updated