Introduction

Cornell AWS customers now have two new options for easy access to the private Cornell network in AWS. 

Resources deployed to subnets in either offering have network access to other Cornell network resources, specifically:

In the past, each Cornell AWS customer that required access to the private Cornell network in AWS received their own Cornell Standard VPC that provided an AWS VPC for their exclusive use. In contrast, the Multitenant Subnets option described in this document provides similar network connectivity in a set of AWS subnets shared among many Cornell AWS customers. The Exclusive Use Subnets option offers the same network connectivity but sharing is amongst a set of Cornell AWS customers that you specify.

The initial options of the Shared VPC deployment supplies only private subnets to opted-in Cornell AWS accounts. This means that neither option can be used to host a public web site or public APIs, for example. Please contact Cloud Support with feedback about your needs to access to public subnets in the Shared VPC.

Features and Benefits

See also Shared AWS VPC FAQs.


The following table compares the new Shared VPC options with the traditional Cornell Standard VPC.

BenefitFeatureDescription
Cornell Standard VPC
Shared VPC
Multitenant SubnetsExclusive Use Subnets
Ease of useAWS Account integrationSubnets are visible directly from your AWS account, via the web console or API.(tick)(tick)(tick)
No VPC management

Customers do not have to worry about managing a VPC. Subnet, route table, NAT gateway, endpoint, and network ACL management is performed by the CIT Cloud Team. 

(error)(tick)(tick)
Fault-tolerance and FlexibilityAZ flexibilityUse subnets in any us-east-1 Availability Zone.not by default(tick)(tick)
Fault-tolerant internet access

Each subnet uses a NAT Gateway in the same Availability Zone as the subnet to route outgoing traffic to the public internet. A NAT Gateway failure in one zone won't affect subnets in other zones.

not by default(tick)(tick)
Privileged network accessPrivate Cornell addressingResources are assigned IP addresses from the private Cornell network. As such, they reside on the Cornell network and can reach other resources on the Cornell network.(tick)(tick)(tick)
Public subnetsAbility to deploy resources to public subnets, directly accessible from the internet.(tick)(error)(error)
Access to on-campus Cornell networksSubnets have private network connectivity to the on-campus Cornell network. (tick)(tick)(tick)
Access to Cornell networks in AzureSubnet have private network connectivity to private Cornell networks (VNETs) in Azure.(tick)(tick)(tick)
Access to on-campus Cornell networksSubnets have private network connectivity to the on-campus Cornell network.(tick)(tick)(tick)
S3 and DynamoDB gateway endpointsGateway endpoints for S3 and Dynamo DB in the VPC make communication with those services quick and private.not by default(tick)(tick)
VPC PeeringPeer to arbitrary AWS VPCs(tick)(error)(error)
SecurityBaseline network securitySubnets use the Cornell Baseline AWS Network ACL, managed by the CIT Cloud Team.(error)(tick)(tick)
Customer-defined security groupsCustomers manage and control the Security Groups applied to their resources. Thus, they have the final say about what network connectivity is allowed.(tick)(tick)(tick)
CIDR-based access controlSubnet size allows subnet CIDR blocks to be used for meaningful network access control by your collaborators.(tick)(error)(tick)
Known peersSubnets are used only by teams you know.(tick)(error)(tick)
Cost"Free" NAT GatewaysNAT Gateways are managed and paid for by CIT. NAT Gateways run by customers typically cost at least $1/day.(error)(tick)(tick)
"Free" VPC Flow LogsVPC Flow Logs are managed and paid for by CIT.(error)(tick)(tick)
Pay for what you use

Customers pay for resources deployed to the Shared VPC as if they were using their own VPC. There are no additional charges for opting into either Shared VPC option.

(tick)(tick)(tick)

Use Cases

Both the Multitenant Subnets and the Exclusive Use Subnets options of the Shared VPC offering support many, many use cases. A few of those are:

Misuse Cases

Misuse cases are situations where the Multitenant Subnets and the Exclusive Use Subnets option should not or cannot be used. Some of those are:

Requesting Access to Shared VPC Offerings

By requesting and using any Shared VPC offering, you are consenting to follow the Guidelines for Use.

Multitenant Subnets

Send a note to Cloud Support with the following information:

Exclusive Use Subnets

Before provisioning Exclusive Use Subnets we will probably need a short meeting to discuss details. But, get the process started by sending a note to Cloud Support with the following information:

Guidelines

Customers using the Shared VPC offerings must agree to abide by the following guidelines:

See also Best Practices.

Roadmap — Potential Features for Future Releases

These features are being considered for the future. Weigh in on them or suggest others by sending a note to Cloud Support.

Appendix

Architecture

Usable IP Addresses in Subnets

AWS reserves 5 addresses in each subnet for its own use. See Subnet Sizing.

CIDR NotationSubnet BitsTotal AddressesUseable Addresses
/28281611
/27273227
/26266459
/2525128123
/2424256251

References