AWS VPC Setup Guide for Public and Private Subnets in Mumbai Region (ap-south-1)
This guide will walk you through the process of setting up a Virtual Private Cloud (VPC) in the Mumbai (ap-south-1) region of AWS. The setup includes 3 Public Subnets, 3 Private Subnets across three Availability Zones (AZs), Internet Gateway (IGW), NAT Gateway, and Route Tables.1. Create a VPC
In AWS, VPC (Virtual Private Cloud) is the primary resource that defines your network.Steps:
- Go to VPC Dashboard in the AWS Management Console.
-
Click Create VPC:
- Name:
prod-vpc - IPv4 CIDR Block:
10.0.0.0/16(adjust the CIDR as needed). - Tenancy: Default (for shared tenancy).
- Name:
- Create VPC.
2. Create Subnets (Public and Private)
We will create 3 Public Subnets and 3 Private Subnets, each located in a different Availability Zone (AZ).Public Subnets:
- Subnet-1 (prod-public-subnet-1):
- CIDR Block:
10.0.0.0/20 - Availability Zone:
ap-south-1a
- CIDR Block:
- Subnet-2 (prod-public-subnet-2):
- CIDR Block:
10.0.16.0/20 - Availability Zone:
ap-south-1b
- CIDR Block:
- Subnet-3 (prod-public-subnet-3):
- CIDR Block:
10.0.32.0/20 - Availability Zone:
ap-south-1c
- CIDR Block:
Private Subnets:
- Subnet-1 (prod-private-subnet-1):
- CIDR Block:
10.0.48.0/20 - Availability Zone:
ap-south-1a
- CIDR Block:
- Subnet-2 (prod-private-subnet-2):
- CIDR Block:
10.0.64.0/20 - Availability Zone:
ap-south-1b
- CIDR Block:
- Subnet-3 (prod-private-subnet-3):
- CIDR Block:
10.0.80.0/20 - Availability Zone:
ap-south-1c
- CIDR Block:
Steps to Create Subnets:
- Go to the VPC Dashboard and click Subnets.
- Click Create Subnet and provide the following details:
- VPC: Select the
prod-vpc. - Subnet CIDR Block: Use the CIDR blocks mentioned above.
- Availability Zone: Choose the respective AZ for each subnet.
- VPC: Select the
3. Create Internet Gateway (IGW)
The Internet Gateway (IGW) allows communication between instances in your public subnets and the internet.Steps:
- Go to the VPC Dashboard and select Internet Gateways.
- Click Create Internet Gateway.
- Name:
prod-IGW
- Name:
- After creation, Attach the Internet Gateway to the VPC (
prod-vpc).
4. Create NAT Gateway
The NAT Gateway allows instances in private subnets to access the internet for updates, downloads, etc., while maintaining security.Steps:
-
Create an Elastic IP:
- Go to EC2 Dashboard → Elastic IPs → Allocate New Address.
- Allocate the IP and note it down.
-
Create the NAT Gateway:
- Go to VPC Dashboard → NAT Gateways → Create NAT Gateway.
- Select one of the public subnets.
- Assign the previously allocated Elastic IP.
- Route: Add the route for private subnets to use the NAT Gateway.
5. Create Route Tables
Public Route Table:
-
Go to VPC Dashboard → Route Tables → Create Route Table.
- Name:
prod-public-route-table - VPC: Select
prod-vpc. - Click Create.
- Name:
-
Add Route:
- Destination:
0.0.0.0/0 - Target: Select Internet Gateway (prod-IGW).
- Destination:
-
Associate Subnets:
- Associate the prod-public-subnet-1, prod-public-subnet-2, and prod-public-subnet-3 with the
prod-public-route-table.
- Associate the prod-public-subnet-1, prod-public-subnet-2, and prod-public-subnet-3 with the
Private Route Table:
-
Go to VPC Dashboard → Route Tables → Create Route Table.
- Name:
prod-private-route-table - VPC: Select
prod-vpc. - Click Create.
- Name:
-
Add Route:
- Destination:
0.0.0.0/0 - Target: Select NAT Gateway.
- Destination:
-
Associate Subnets:
- Associate the prod-private-subnet-1, prod-private-subnet-2, and prod-private-subnet-3 with the
prod-private-route-table.
- Associate the prod-private-subnet-1, prod-private-subnet-2, and prod-private-subnet-3 with the
6. Create Network Access Control Lists (ACLs)
A Network ACL is a stateless firewall for controlling traffic entering and leaving your subnets.Steps:
-
Go to VPC Dashboard → Network ACLs → Create Network ACL.
- Name:
prod-acl - VPC: Select
prod-vpc.
- Name:
- Inbound Rules: Allow HTTP, HTTPS, and other required ports.
- Outbound Rules: Allow outbound internet traffic.
-
Associate with Subnets:
- Associate prod-public-subnet-1, prod-public-subnet-2, and prod-public-subnet-3 for the public subnets.
- Associate prod-private-subnet-1, prod-private-subnet-2, and prod-private-subnet-3 for the private subnets.
7. Security Groups
Public Security Group (SG):
- Allow inbound traffic on HTTP (80), HTTPS (443), and SSH (22).
- Allow all outbound traffic.
Private Security Group (SG):
- Allow inbound traffic from the VPC or specific public subnets.
- Allow outbound traffic to the internet via NAT Gateway.
8. Architecture Diagram
This guide walks you through the process of replicating your AWS infrastructure setup in the Mumbai region (ap-south-1), including the setup of public and private subnets, Internet Gateway, NAT Gateway, and Route Tables.
