How VPC Networking Works

Building a cloud network from scratch: Subnets, Routes, and Security.

REGION: CLOUD
INTERNET
1 / 13

The Region

Physical Location

Step Description

You start by selecting a Cloud Region (e.g., East US). This is a physical separate geographic area.

Why do we do this?

Data sovereignty and latency. Your network lives physically here.

Technical Spec

Contains multiple Data Centers (Availability Zones) connected by low-latency fiber.

Key Takeaways

Private by Default

VPCs isolate your network. Without explicit routes, nothing enters or leaves.

Subnets = Zones

Public subnets face the internet via IGW. Private subnets use NAT for outbound-only access.

Defense in Depth

Route Tables → NACLs → Security Groups. Each layer provides independent traffic filtering.

The Engineering of VPCs: Software-Defined Data Centers

Before the Cloud, building an isolated secure network required buying physical Cisco routers, meticulously splicing fiber optic cables, and configuring hardware firewalls in a frozen data center. A Virtual Private Cloud (VPC) represents one of the greatest feats of virtualization in computer science: replacing thousands of pounds of enterprise networking hardware with pure, programmable software abstraction.


Part 1: The CIDR Block Abstraction

A VPC is fundamentally defined by its CIDR Block (Classless Inter-Domain Routing). When you create a VPC with 10.0.0.0/16, you are asking the cloud provider to logically reserve exactly 65,536 private IP addresses exclusively for your use.

These IPs are non-routable on the public internet (defined by RFC 1918). They only exist as an illusion inside the hypervisors running on AWS or GCP physical hardware. If my EC2 instance (10.0.1.50) sends a TCP packet to your EC2 instance (10.0.2.100), the cloud provider intercepts the packet, wraps it in a proprietary overlay protocol (like AWS's Nitro system), fires it across their physical fiber, and unwraps it before delivering it to the destination—all while maintaining the illusion of a standard ethernet LAN.

Part 2: Subnets and Availability Zones

A VPC exists across an entire Geographic Region (e.g., us-east-1 in Virginia). However, physical hardware inevitably fails. To survive a data center catching fire, the Region is physically split into multiple isolated data centers called Availability Zones (AZs).

A Subnet is simply a smaller chunk of your VPC's IP math (e.g., 10.0.1.0/24 = 256 IPs) that is strictly bound to exactly one physical Availability Zone.

By placing your application servers in Subnet A (AZ-1) and Subnet B (AZ-2), and placing a Load Balancer in front of them, your architecture becomes instantly resilient against a complete power grid failure affecting AZ-1.

Part 3: The Public vs Private Boundary

The definition of a "Public Subnet" versus a "Private Subnet" is purely an artifact of Software Routing. There is no physical difference.

Public Subnets have an entry in their Route Table that points to the Internet Gateway (IGW) for the destination 0.0.0.0/0 (the catch-all route for the entire internet). If an EC2 instance in a public subnet tries to reach google.com, the VPC routes the packet to the IGW, which performs 1:1 Network Address Translation (NAT) to swap the instance's private IP for a Public IP, and sends it to the real internet.

Private Subnets have no route to the IGW. It is mathematically impossible for packets originating from the internet to reach instances in a Private Subnet. This is where you place your databases. If a Private instance needs to download an OS patch, it must route through a NAT Gateway positioned in the Public Subnet, allowing outbound traffic while strictly denying inbound connection attempts.

Part 4: Security Groups vs NACLs

VPCs enforce security using two distinct compute paradigms:

  • Network ACLs (NACLs): These operate at the Subnet boundary. They are Stateless. If you allow Inbound port 80, you must explicitly allow Outbound ports 1024-65535 (ephemeral ports) for the response to make it back out. They are excellent for blanket-banning malicious IP blocks.
  • Security Groups (SGs): These operate directly at the virtual Network Interface (ENI) of the instance. They are Stateful. If you allow Inbound port 443, the hypervisor automatically remembers the connection state and permits the outflowing response, regardless of outbound rules. SGs are the primary building block of microservice zero-trust security.

Mastering VPC routing and stateful firewalls is the absolute prerequisite for deploying secure, multi-tier enterprise architecture in the cloud.

Glossary & Concepts

CIDR Block

A range of IP addresses. /16 has 65k addresses (big network), /24 has 256 addresses (subnet).

Internet Gateway

The connection point that allows your VPC to talk to the internet. Only Public Subnets route to it.

Private Subnet

A subnet with NO route to the Internet Gateway. Instances here have no public IPs and are invisible to the world.

Firewalls

Safety comes in layers. Subnet Firewalls (stateless) protect the network block. Instance Firewalls (stateful) protect the server.