Complete Guide to AWS VPC (Virtual Private Cloud)

1. What is a VPC?
Definition:
Amazon Virtual Private Cloud (VPC) is a logically isolated network within AWS that allows you to launch AWS resources in a private, customizable environment. It functions like a traditional on-premises network but is hosted in the cloud.
Key Features of VPC:
Fully customizable IP address range (CIDR block).
Subnets for organizing resources across Availability Zones.
Security using NACLs (Network ACLs) and Security Groups.
Internet Gateway (IGW) & NAT Gateway for internet access control.
Route Tables to control network traffic.
Real-Life Example:
Imagine a company hosting its e-commerce website on AWS. It uses a VPC to securely separate its customer-facing web servers from its private database.
2. Why Use Subnets in VPC?
A subnet is a segment within a VPC that allows you to divide the network into smaller sections. Each subnet exists in one Availability Zone.
Types of Subnets:
Public Subnet → Connected to the internet via Internet Gateway (IGW).
Private Subnet → No direct internet access; uses NAT Gateway for outbound traffic.
Benefits of Using Subnets:
Improves network organization.
Enhances security by isolating resources.
Allows multi-tier architectures (e.g., Web tier in Public Subnet, Database in Private Subnet).
Real-Life Example:
A fintech company separates its frontend website in a public subnet while keeping its customer transaction data in a private subnet to prevent unauthorized access.
3. CIDR Block Calculation
CIDR (Classless Inter-Domain Routing) defines the IP address range for your VPC and subnets.
Example Calculation:
VPC CIDR: 10.0.0.0/16 (65,536 IPs)
Public Subnet: 10.0.1.0/24 (256 IPs)
Private Subnet: 10.0.2.0/24 (256 IPs)
AWS reserves 5 IPs in each subnet for internal networking.
Subnet Mask Breakdown:
CIDR | Available IPs |
/16 | 65,536 |
/24 | 256 |
/28 | 16 |
4. Route Tables
A Route Table controls how network traffic is directed within a VPC.
Example Route Table:
Destination | Target |
10.0.0.0/16 | local (for internal VPC communication) |
0.0.0.0/0 | Internet Gateway (for Public Subnet) |
0.0.0.0/0 | NAT Gateway (for Private Subnet) |
Real-Life Example:
A media streaming company configures route tables so that only its public-facing web servers communicate with the internet, while its backend processing servers remain private.
5. Internet Gateway (IGW)
Definition:
An Internet Gateway (IGW) is a component in AWS that enables communication between instances in a public subnet and the internet.
How IGW Works:
Attaches to a VPC to provide internet access.
Instances in public subnets must have a public IP or Elastic IP to communicate with the internet.
Used in route tables to enable outbound and inbound internet traffic.
Real-Life Example:
A company running an online store uses IGW to allow its web servers to serve content to customers worldwide.
6. NAT Gateway (NAT)
Definition:
A NAT Gateway allows instances in a private subnet to initiate outbound internet connections while preventing inbound connections.
How NAT Works:
Used for private subnet instances that need internet access (e.g., downloading updates, accessing external APIs).
Blocks incoming traffic from the internet for security.
Requires an Elastic IP (EIP) for outbound internet communication.
Real-Life Example:
A healthcare company needs to update its internal patient database but doesn’t want it exposed to the internet. The database server accesses the internet via NAT to download security patches.
7. IGW vs. NAT Gateway (Comparison Table)
Feature | Internet Gateway (IGW) | NAT Gateway |
Purpose | Enables public internet access | Allows outbound internet for private subnets |
Inbound Traffic | Yes | No |
Works With | Public Subnets | Private Subnets |
Needs Public IP? | Yes | No |
8. VPC Peering
VPC Peering allows private communication between two VPCs using AWS’s internal network.
How VPC Peering Works:
Create a Peering Connection from VPC A to VPC B.
Accept the Peering request in VPC B.
Update Route Tables in both VPCs to enable traffic.
Ensure Security Groups & NACLs allow traffic between VPCs.
Real-Life Example:
A SaaS company connects its customer-facing VPC with its analytics VPC to allow secure data transfer between applications.
9. Network ACLs (NACLs) vs. Security Groups
Feature | NACLs | Security Groups |
Works at | Subnet Level | Instance Level |
Stateful? | No | Yes |
Rules Applied | Evaluates all rules | Evaluates the most permissive rule |
Use Case | Broad subnet control | Instance-specific security |
Real-Life Example:
A bank restricts SSH access to its internal network using NACL rules while allowing only secure web traffic through Security Groups.
10. Elastic Load Balancer (ELB)
An Elastic Load Balancer (ELB) distributes incoming traffic across multiple EC2 instances to improve availability and fault tolerance.
Real-Life Example:
A ride-sharing app uses ALB to distribute user requests across multiple servers, ensuring fast and reliable service.
Final Real-Life Example (Bringing It All Together)
An e-commerce company uses AWS VPC for its cloud infrastructure:
VPC with CIDR 10.0.0.0/16 for its entire infrastructure.
Public Subnet for hosting a web application accessible via Internet Gateway (IGW).
Private Subnet for secure database storage, using NAT Gateway for updates.
Route Tables ensure secure internal and external communication.
VPC Peering connects its payment processing system with the application.
Network ACLs & Security Groups protect sensitive customer data.
Elastic Load Balancer (ELB) balances traffic between multiple servers to handle high demand.
This guide provides a comprehensive overview of AWS Virtual Private Cloud (VPC), explaining its key components and functionalities. You'll learn about VPCs as isolated cloud networks, and the purpose of subnets for network segmentation and security. The article also covers CIDR block calculations for IP allocation, the role of route tables in directing traffic, and options for internet connectivity using Internet Gateways and NAT Gateways. Differences between Internet Gateways and NAT Gateways, VPC Peering for connecting VPCs, and the use of Network ACLs and Security Groups for security management are discussed. Finally, the guide highlights how Elastic Load Balancers improve application reliability and performance, with practical examples illustrating each concept.
Subscribe to my newsletter
Read articles from Shreyash Myakal directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Shreyash Myakal
Shreyash Myakal
I’m currently learning Linux, AWS, DevOps, MySQL, and related technologies, aiming to become a Cloud Engineer. Passionate about cloud infrastructure and automation, I’m excited to apply these skills in real-world projects.