My AWS Notebook
VPC Endpoints allow access to public AWS services, or service provided by 3rd parties, without requiring an Internet Gateway to be attached to the VPC, or any NAT instance/gateway. It means your network communications no longer have to flow over the public internet to reach the public interfaces of AWS services such as S3, API Gateways, etc.
Destination=pl-1a2b3c4d, Target=vpce-11bb22cc (VPCE-ID)
"Resource": ["arn:aws:s3:::sharedpics", "arn:aws:s3:::sharedpics/*"]
aws:SourceIp
condition, use aws:sourceVpce
instead.
"Principal": "*",
"Action": "s3:*",
"Effect": "Deny",
"Resource": ["arn:aws:s3:::sharedpics", "arn:aws:s3:::sharedpics/*"],
"Condition": {
"StringNotEquals": { "aws:sourceVpce": "vpce-1a2b3c4d" }
}
Destination=0.0.0.0/0, Target=nat-1111222233334444 (NAT-ID)
With IPv4, all AWS resources have a private IP. Some can be provided with a public IP and connectivity, using an Internet Gateway (IGW). With IPv4 a NAT Instance/Gateway can be utilized to provide egress-only access.
IPv6 addressing is globally unique and publicly routable. Supported resources in AWS are all publicly addressable, so a NAT Gateway isn’t an option.
An Egress-Only Internet Gateway (EIGW) provides a feature-limited Internet Gateway, specifically for IPv6, and only allowing outbound connections and return traffic (stateful). No incoming IPv6 connections can be initiated to VPC resources using Egress-Only Gateway.
Destination= ::/0, Target= eigw-1111222233334444 (EIGW-ID)
::/0
), IPv4 format: (0.0.0.0/0
)