Direct Connect And VPN Setup: Advanced Networking On AWS

In “Direct Connect And VPN Setup: Advanced Networking On AWS,” you will gain a comprehensive understanding of advanced networking concepts on the Amazon Web Services (AWS) platform. Through depth and practicality, this article ensures that you delve deeply into each topic, providing you with the knowledge and skills needed to architect complex solutions on AWS. By focusing on real-world scenarios and case studies, you will develop problem-solving abilities to design solutions using AWS services. With interactive and engaging content, including multimedia resources and practical assignments, you will have hands-on experiences in implementing architectures and troubleshooting scenarios in a simulated AWS environment. Additionally, this article aligns its lessons with the AWS Certified Solutions Architect – Professional exam blueprint, covering key topics such as high availability, security, scalability, cost optimization, networking, and advanced AWS services. Are you ready to enhance your networking capabilities on AWS? Let’s explore Direct Connect and VPN Setup for advanced networking on AWS.

Direct Connect And VPN Setup: Advanced Networking On AWS

Discover more about the Direct Connect And VPN Setup: Advanced Networking On AWS.

Direct Connect

What is Direct Connect?

Direct Connect is a network service offered by AWS that provides a dedicated and private connection between an organization’s on-premises data center or office and the AWS cloud. It allows you to establish a high-bandwidth, low-latency connection that bypasses the public internet, providing more reliable and consistent network performance.

Benefits of Direct Connect

Direct Connect offers several benefits for organizations using AWS. Firstly, it provides a more secure and reliable connection compared to using the public internet. This is achieved through dedicated network connections that are not shared with other users, ensuring greater privacy and reducing the risk of data breaches.

Secondly, Direct Connect offers improved network performance by providing consistent and low-latency connectivity to AWS services. It allows for faster data transfer rates and reduced network congestion, resulting in better application performance and user experience.

Additionally, Direct Connect allows organizations to extend their on-premises networks into the AWS cloud, enabling hybrid cloud architectures. This enables seamless integration between on-premises resources and AWS services, facilitating easier migration of workloads and providing a more flexible and scalable infrastructure.

Setting up Direct Connect on AWS

To set up Direct Connect on AWS, you need to choose a Direct Connect provider that meets your requirements. AWS partners with various providers worldwide to offer Direct Connect services. Once you have selected a provider, you can create a Virtual Private Gateway, which acts as a gateway for the Direct Connect connection.

Next, you need to create a Direct Connect Gateway, which is a logical entity that represents the entry point for your Direct Connect connections. You can associate your Virtual Private Gateway with the Direct Connect Gateway and configure it to allow traffic to flow between your on-premises network and the AWS cloud.

After the gateways are set up, you need to configure Border Gateway Protocol (BGP) on your on-premises network and on the Direct Connect connection. This enables the exchange of routing information between your network and AWS. Finally, you can configure route tables to direct traffic between your on-premises network and AWS resources.

Setting up Direct Connect requires careful planning and coordination with your chosen provider. It is recommended to follow AWS documentation and best practices to ensure a successful implementation.

VPN Setup

What is a VPN?

A virtual private network (VPN) is a network technology that enables secure and encrypted communication between different networks or devices over a public network such as the internet. It creates a private and secure “tunnel” through which data can be transmitted securely, protecting it from unauthorized access.

Benefits of VPN on AWS

Using a VPN on AWS offers several benefits for organizations. Firstly, it provides a secure connection for remote access to AWS resources. This allows employees or partners to securely connect to the AWS cloud from remote locations and access resources as if they were connected directly to the network.

Secondly, a VPN on AWS enables secure communication between different VPCs or on-premises networks. It allows organizations to connect multiple networks together and securely transfer data between them, creating a unified and interconnected network infrastructure.

Additionally, VPNs offer encryption and data privacy, ensuring that sensitive information is protected from interception or unauthorized access. This is particularly important for organizations that deal with sensitive data or need to comply with regulatory requirements.

Setting up a VPN on AWS

To set up a VPN on AWS, you need to choose a VPN solution that best fits your requirements. AWS provides various options for VPN connectivity, including AWS Site-to-Site VPN and AWS Client VPN.

To set up a Site-to-Site VPN, you need to create a Virtual Private Gateway, which serves as the VPN connection endpoint in AWS. You also need to configure a Customer Gateway, which represents the customer side of the VPN connection. Once the gateways are set up, you can establish VPN connections between them and configure VPN tunnels to enable secure communication.

For AWS Client VPN, you can set up a VPN endpoint that allows users to connect securely to the AWS cloud using VPN client software. You can configure authentication and authorization settings to ensure only authorized users can access the resources.

Setting up a VPN on AWS requires configuring routing policies and security settings to ensure secure communication between networks. AWS provides detailed documentation and guides to assist you in setting up and configuring the VPN solution of your choice.

Direct Connect And VPN Setup: Advanced Networking On AWS

See the Direct Connect And VPN Setup: Advanced Networking On AWS in detail.

Advanced Networking Features

VPC Peering

VPC Peering is a feature of Amazon Virtual Private Cloud (Amazon VPC) that allows direct connectivity between different VPCs within the same AWS Region. It enables resources in different VPCs to communicate with each other using private IP addresses, without the need for gateways, VPNs, or direct connect connections.

VPC Peering provides several benefits, including simplified network architecture, reduced network costs, and improved data transfer speeds. It allows organizations to create a common network architecture across multiple VPCs, facilitating resource sharing and integration.

Transit Gateway

Transit Gateway is a networking service provided by AWS that allows organizations to connect multiple VPCs and on-premises networks together in a hub-and-spoke model. It simplifies network connectivity and management by acting as a central hub for routing traffic between networks.

With Transit Gateway, organizations can create a scalable and highly available network architecture that supports the interconnection of thousands of VPCs and on-premises networks. It provides advanced features such as route propagation, route filtering, and network segmentation, allowing fine-grained control over network traffic.

Transit Gateway offers benefits such as simplified network management, reduced network complexity, and improved network performance. It enables organizations to centrally manage network connectivity and security policies, streamlining operations and reducing administrative overhead.

Elastic Load Balancer

Elastic Load Balancer (ELB) is a service provided by AWS that distributes incoming traffic across multiple EC2 instances or other resources within a specified region. It helps improve application availability and scalability by evenly distributing traffic and evens out the load on resources.

ELB offers several benefits for organizations using AWS. It automatically scales with the traffic load, ensuring that resources are efficiently utilized and preventing overload or performance degradation. It also provides fault tolerance by continuously monitoring the health of resources and redirecting traffic away from unhealthy instances.

ELB supports different load balancing techniques, including application load balancing, network load balancing, and classic load balancing. It allows organizations to choose the most suitable load balancing approach based on their application requirements and network architecture.

Auto Scaling

Auto Scaling is a service offered by AWS that automatically adjusts the number of EC2 instances in a fleet based on predefined scaling policies. It helps organizations optimize resource utilization, maintain performance, and reduce costs by dynamically scaling resources based on demand.

Auto Scaling monitors resource utilization metrics, such as CPU utilization or network traffic, and adjusts the number of instances accordingly. It allows organizations to define scaling policies that specify the conditions under which resources should be added or removed. This ensures that the application can handle varying traffic loads efficiently without manual intervention.

Auto Scaling offers benefits such as improved application availability, reduced infrastructure costs, and increased operational efficiency. It allows organizations to scale their resources elastically based on demand, ensuring that the application can handle fluctuating workloads without any downtime or performance issues.

Direct Connect vs VPN

Comparison of Direct Connect and VPN

Direct Connect and VPN are both networking solutions provided by AWS, but they serve different purposes and have distinct characteristics.

Direct Connect is a dedicated and private connection between an on-premises network and AWS, bypassing the public internet. It provides high-bandwidth and low-latency connectivity, making it suitable for organizations that require reliable and consistent network performance. Direct Connect is often used for large data transfers, real-time applications, or workloads that require stringent network requirements.

On the other hand, VPN uses encrypted tunnels over the public internet to establish secure connections between networks. It provides remote access and secure communication between different networks, making it suitable for organizations with multiple locations or remote employees. VPN is often used for site-to-site connectivity, remote access, or hybrid cloud architectures.

When to use Direct Connect

Direct Connect is recommended for organizations that require high-performance, secure, and reliable network connectivity to AWS. It is suitable for scenarios that involve large data transfers, real-time applications, or workloads that have stringent network requirements.

Organizations that have significant data transfer needs, such as data backups, database replication, or big data analytics, can benefit from Direct Connect. It provides faster and more efficient data transfer rates compared to using the public internet, reducing transfer times and improving overall performance.

Direct Connect is also recommended for organizations with mission-critical applications or real-time workloads that require consistent and low-latency network connectivity. It eliminates the variability and unpredictability of the public internet, providing a more stable and reliable connection for these types of applications.

When to use VPN

VPN is recommended for organizations that require secure and encrypted communication between different networks or need remote access to AWS resources. It is suitable for scenarios that involve remote employees, multiple locations, or hybrid cloud architectures.

Organizations with remote employees or partners who need secure access to the AWS cloud can benefit from VPN. It provides a secure connection through which users can access resources as if they were connected directly to the network, ensuring data privacy and protecting against unauthorized access.

VPN is also useful for organizations with multiple locations that need to establish secure connections between their networks. It allows organizations to create a unified and interconnected network infrastructure, facilitating resource sharing, collaboration, and centralized management.

In hybrid cloud architectures, VPN enables secure communication between on-premises resources and AWS services. It allows organizations to extend their network into the AWS cloud and integrate their on-premises infrastructure with cloud resources, enabling seamless migration of workloads and ensuring a consistent network architecture.

Direct Connect And VPN Setup: Advanced Networking On AWS

Direct Connect Configuration

Choosing a Direct Connect provider

To set up Direct Connect on AWS, you need to choose a Direct Connect provider that meets your requirements. AWS partners with various providers worldwide to offer Direct Connect services.

When choosing a provider, consider factors such as geographic coverage, network performance, service reliability, and cost. Evaluate the provider’s network reach to ensure they have a presence in the locations where you require Direct Connect connectivity. Assess their network performance metrics, such as latency and bandwidth, to ensure it meets your performance needs.

Additionally, consider the provider’s service reliability and availability. They should have redundant infrastructure and robust network connections to ensure high availability and minimal downtime. Lastly, compare the costs of different providers and evaluate their pricing models to choose the most cost-effective option for your organization.

Creating a Virtual Private Gateway

To set up Direct Connect, you need to create a Virtual Private Gateway, which acts as a gateway for the Direct Connect connection. The gateway provides a target IP address, which allows your on-premises network to communicate with the AWS infrastructure.

You can create a Virtual Private Gateway through the AWS Management Console or by using the AWS Command Line Interface (CLI). When creating a Virtual Private Gateway, you need to provide a unique name and select the appropriate Amazon VPC to associate it with.

After creating the Virtual Private Gateway, you can attach it to the relevant Amazon VPCs. This enables the gateway to establish connectivity between the VPCs and your on-premises network.

Creating a Direct Connect Gateway

Once you have created a Virtual Private Gateway, you can create a Direct Connect Gateway. A Direct Connect Gateway is a logical entity that represents the entry point for your Direct Connect connections. It allows you to connect multiple Virtual Private Gateways to the Direct Connect connection.

To create a Direct Connect Gateway, you need to specify a unique name and associate it with the appropriate AWS account. You can also choose whether to associate the Direct Connect Gateway with one or more Virtual Private Gateways.

After creating the Direct Connect Gateway, you can attach it to the Direct Connect connection. This establishes the connectivity between your on-premises network and the AWS cloud.

Configuring BGP

Border Gateway Protocol (BGP) is a routing protocol that enables the exchange of routing information between your network and AWS. To configure BGP, you need to establish BGP session(s) between the Direct Connect device in your data center and the AWS Direct Connect router.

During the BGP configuration, you need to specify the BGP AS number for your network and the BGP MD5 authentication password. This ensures the security of the BGP communication between your network and AWS.

BGP allows for the exchange of routing information, including network prefixes and metrics, between your network and the AWS cloud. This enables efficient routing of traffic and ensures that data is sent and received through the appropriate paths.

Configuring route tables

Route tables are used to control the traffic flow between your on-premises network and AWS resources. You need to configure route tables to direct traffic between your on-premises network and the associated Virtual Private Gateway.

To configure route tables, you need to define the appropriate routes that specify the IP ranges and the destination of the traffic. This ensures that traffic is routed correctly between your network and AWS.

You can configure route tables through the AWS Management Console, AWS CLI, or API. It is important to carefully plan and configure route tables to ensure efficient and secure traffic routing.

VPN Configuration

Choosing a VPN solution on AWS

When setting up a VPN on AWS, you need to choose a VPN solution that best fits your requirements. AWS provides different options for VPN connectivity, including AWS Site-to-Site VPN and AWS Client VPN.

For Site-to-Site VPN, you can choose between IPsec VPN or AWS Transit Gateway. IPsec VPN is a traditional VPN solution that allows you to establish secure tunnels between your on-premises network and AWS. AWS Transit Gateway is a more scalable and centralized solution that allows you to connect multiple VPCs and on-premises networks together.

For Client VPN, you can use AWS Client VPN, which enables secure remote access to AWS resources for your employees or partners. AWS Client VPN supports various authentication methods, including mutual authentication, federated authentication, and certificate-based authentication.

When choosing a VPN solution, consider factors such as scalability, performance, ease of management, and security requirements. Evaluate the features and capabilities of different VPN solutions to determine the most suitable option for your organization.

Setting up a Virtual Private Gateway

To set up a VPN on AWS, you need to create a Virtual Private Gateway, which serves as the VPN connection endpoint in AWS. The gateway provides a target IP address, which allows your on-premises network to communicate with the AWS infrastructure.

You can create a Virtual Private Gateway through the AWS Management Console or by using the AWS CLI. When creating a Virtual Private Gateway, you need to provide a unique name and select the appropriate Amazon VPC to associate it with.

After creating the Virtual Private Gateway, you can attach it to the relevant Amazon VPCs. This enables the gateway to establish connectivity between the VPCs and your on-premises network.

Configuring VPN connections

To configure a VPN on AWS, you need to establish VPN connections between the Virtual Private Gateway and your on-premises VPN device or software client.

For Site-to-Site VPN, you need to configure the Customer Gateway, which represents the customer side of the VPN connection. You need to provide the IP address of your on-premises VPN device, the BGP ASN, and the pre-shared key for the VPN connection.

For Client VPN, you need to configure the VPN endpoint that allows users to connect securely to the AWS cloud using VPN client software. You can specify the authentication method, such as mutual authentication or certificate-based authentication, and configure authorization settings to control access to AWS resources.

After configuring the VPN connections, you can establish the tunnels and initiate the VPN connection. This allows secure communication between your network and AWS resources.

Creating VPN tunnels

To create VPN tunnels, you need to establish the tunnels between the Virtual Private Gateway and your on-premises VPN device or software client. This involves configuring the necessary parameters, such as the encryption algorithm, hashing algorithm, and Diffie-Hellman group.

You can configure the VPN tunnels through the AWS Management Console or by using the AWS CLI. Specify the encryption and authentication parameters that meet your security requirements.

After the VPN tunnels are established, data can be securely transmitted between your network and AWS resources through the tunnels.

Configuring routing

To ensure secure and efficient communication between your network and AWS resources, you need to configure routing settings for the VPN connections.

For Site-to-Site VPN, you need to configure the routing settings on the Customer Gateway and the Virtual Private Gateway. This involves specifying the IP ranges and the appropriate routing table entries to direct traffic between your on-premises network and the associated Amazon VPC.

For Client VPN, you can configure the routing settings on the VPN endpoint to control the flow of traffic between the VPN clients and AWS resources.

By configuring routing, you can ensure that traffic is routed correctly and securely between your network and AWS.

Optimizing Network Performance

Traffic Engineering

Traffic engineering involves optimizing the flow of network traffic to ensure efficient resource utilization and minimize congestion. It focuses on managing network resources and traffic patterns to improve network performance and reliability.

On AWS, you can optimize network performance through various techniques, such as load balancing and traffic shaping. Load balancing distributes network traffic across multiple resources, ensuring that the traffic load is evenly distributed and no single resource is overloaded. Traffic shaping prioritizes and controls the flow of traffic, allowing you to allocate network resources based on application requirements and network priorities.

By employing traffic engineering techniques, you can optimize network performance, improve application response times, and reduce network congestion.

Quality of Service (QoS)

Quality of Service (QoS) is a set of techniques used to prioritize and manage network traffic to ensure certain performance characteristics. It involves assigning different levels of priority to different types of network traffic and applying network policies to enforce those priorities.

AWS provides various tools and services that allow you to implement QoS controls and policies. For example, you can use Amazon CloudWatch to monitor network performance metrics and set alarms for network performance thresholds. You can also use AWS Elastic Load Balancer to prioritize different types of traffic based on application requirements.

By implementing QoS, you can ensure that network resources are allocated efficiently, critical applications receive the necessary bandwidth, and network performance is optimized for different types of traffic.

Network Monitoring and Troubleshooting

Effective network monitoring and troubleshooting are essential for optimizing network performance and ensuring reliable network connectivity.

AWS provides various monitoring and troubleshooting tools that allow you to monitor network performance, analyze network traffic, and identify and resolve network issues. For example, you can use Amazon CloudWatch to monitor network metrics, such as network throughput, latency, and packet loss. You can also use VPC Flow Logs to capture information about the IP traffic going to and from network interfaces in your VPC.

In addition to AWS-provided tools, you can also use third-party network monitoring and troubleshooting tools that integrate with AWS services.

By regularly monitoring network performance and troubleshooting network issues, you can identify and resolve bottlenecks, optimize network resources, and ensure reliable network connectivity.

Security Considerations

Encryption

Encryption is a crucial aspect of network security that involves encoding data to prevent unauthorized access. It ensures that data transmitted between your network and AWS resources is protected from interception or tampering.

AWS provides various encryption options to secure network communication. For example, you can use SSL/TLS certificates to encrypt data transmitted over HTTPS protocols. You can also use Virtual Private Gateways with IPsec VPN to establish secure tunnels between your network and AWS.

Additionally, AWS offers services such as AWS Key Management Service (KMS) that allow you to manage encryption keys and control access to encrypted data.

By implementing encryption, you can safeguard sensitive data and ensure the privacy and integrity of network communication.

Authentication

Authentication is the process of verifying the identity of users, devices, or systems to ensure that only authorized entities can access network resources.

AWS provides various authentication mechanisms to secure network communication. For example, you can use Identity and Access Management (IAM) to manage user credentials and control access to AWS resources. You can also use multi-factor authentication (MFA) to add an extra layer of security to user authentication.

Additionally, you can integrate AWS services with external authentication providers, such as Active Directory, to leverage existing authentication infrastructure.

By implementing authentication mechanisms, you can prevent unauthorized access to network resources and ensure the integrity of your network infrastructure.

Firewalls and Security Groups

Firewalls and security groups are essential network security mechanisms that control inbound and outbound network traffic and enforce security policies.

AWS provides Security Groups, which act as virtual firewalls, allowing you to control inbound and outbound traffic at the instance level. You can define security group rules that specify the source and destination of the traffic, the protocol and port numbers, and the action to be taken, such as allowing or denying the traffic.

Additionally, you can use AWS Network Access Control Lists (ACLs) to control traffic at the subnet level. ACLs allow you to define rules that control inbound and outbound traffic based on the IP addresses, protocols, and port numbers.

By configuring firewalls and security groups, you can enforce network security policies, restrict access to network resources, and protect against malicious or unauthorized network traffic.

Network Access Control Lists (ACLs)

Network Access Control Lists (ACLs) help secure your VPCs by controlling inbound and outbound traffic at the subnet level. They are stateless and allow you to define rules that control traffic based on IP addresses, protocols, and port numbers.

ACLs provide a layer of defense against unauthorized access by blocking or allowing traffic based on the defined rules. They can be used to restrict access to specific ports, protocols, or IP ranges, ensuring that only authorized traffic is allowed into or out of your network.

By carefully configuring ACLs and regularly reviewing and updating the rules, you can enhance network security and protect your network resources from unauthorized access or malicious traffic.

Cost Optimization

Calculating Direct Connect costs

To calculate Direct Connect costs, you need to consider various factors, including the port speed, the data transfer volume, and the geographical location.

Direct Connect charges are based on the port speed, which determines the maximum bandwidth available for the connection. AWS offers different port speed options, such as 1 Gbps and 10 Gbps.

Additionally, Direct Connect charges include data transfer fees, which are based on the volume of data transferred over the connection. These fees can vary depending on the data transfer region or the destination AWS services.

For optimal cost optimization, organizations should carefully assess their connectivity requirements and choose the port speed and data transfer option that best suits their needs. Regular monitoring of data transfer volumes can also help identify opportunities for cost optimization.

Calculating VPN costs

To calculate VPN costs, you need to consider various factors, including the number of connections, the data transfer volume, and the geographical location.

VPN charges are typically based on the number of active VPN connections. AWS offers different pricing tiers based on the number of active tunnels, ranging from a few tunnels to thousands of tunnels.

Additionally, VPN charges include data transfer fees, which are based on the volume of data transferred over the VPN connection. These fees can vary depending on the data transfer region or the destination AWS services.

Organizations should carefully assess their VPN requirements and choose the pricing tier that best fits their needs. Regular monitoring of data transfer volumes can help identify opportunities for cost optimization.

Optimizing network costs

To optimize network costs on AWS, organizations can consider various strategies and best practices.

One approach is to analyze network traffic patterns and optimize resource allocation based on demand. By understanding the network traffic patterns and resource utilization, organizations can adjust their resource allocation and scaling policies to optimize cost and ensure efficient resource utilization.

Another approach is to leverage AWS services and features that provide cost optimization benefits. For example, organizations can use AWS Elastic Load Balancer to distribute traffic and ensure efficient resource utilization. They can also utilize AWS Auto Scaling to automatically adjust resource capacity based on demand, reducing costs and improving performance.

Additionally, organizations can regularly monitor and analyze network performance metrics to identify opportunities for cost optimization. By identifying bottlenecks, network congestion, or inefficient resource utilization, organizations can make adjustments and optimize their network infrastructure.

Best Practices

Designing highly available network architectures

When designing highly available network architectures on AWS, organizations should consider implementing redundancy and failover strategies.

Redundancy involves duplicating critical network components, such as routers, switches, or firewalls, to provide backup in case of failures. It ensures that even if one component fails, there is another component that can take over and maintain network availability.

Failover strategies involve designing the network architecture in a way that allows for automatic switching to backup components or resources in case of failures. This ensures minimal downtime and uninterrupted network connectivity in the event of a failure.

Additionally, organizations should consider implementing load balancing and traffic engineering techniques to distribute network traffic and ensure efficient resource utilization. These techniques help improve network performance, reduce congestion, and minimize the risk of single points of failure.

Redundancy and failover strategies

Implementing redundancy and failover strategies is crucial to ensure high availability and minimize downtime.

Organizations can achieve redundancy by duplicating critical components, such as routers, switches, or firewalls, and establishing backup connections. This ensures that even if one component or connection fails, there is another component or connection that can take over and maintain network availability.

Failover strategies involve designing the network architecture in a way that allows for automatic switching to backup components or resources in case of failures. This ensures minimal downtime and uninterrupted network connectivity in the event of a failure.

By implementing redundancy and failover strategies, organizations can ensure high availability, improve the reliability of their network infrastructure, and minimize the impact of failures.

Scaling network capacity

To scale network capacity on AWS, organizations can leverage services such as Amazon VPC, Elastic Load Balancer, and Auto Scaling.

Amazon VPC allows organizations to scale their network capacity horizontally by creating additional subnets and adding resources to the VPC. This enables organizations to handle increased network traffic and accommodate more resources.

Elastic Load Balancer helps organizations scale their applications and services by evenly distributing network traffic across multiple resources. It allows organizations to add or remove resources based on demand, ensuring efficient resource utilization and preventing overload or performance degradation.

Auto Scaling enables organizations to automatically adjust network capacity based on demand. It monitors resource utilization metrics and scales resources up or down to meet the demand, ensuring optimal performance and cost efficiency.

By leveraging these services and implementing scaling policies, organizations can scale their network capacity to meet changing business needs and efficiently handle increased network traffic.

Implementing network security best practices

Implementing network security best practices is crucial to protect network resources and ensure the confidentiality, integrity, and availability of data.

Organizations should follow industry-standard security practices, such as using strong and unique passwords, implementing multi-factor authentication, and regularly patching and updating network components.

They should also implement network segmentation and use firewalls or security groups to restrict access to network resources. This ensures that only authorized users or systems can access sensitive data or resources.

Additionally, organizations should regularly monitor network traffic and use intrusion detection and prevention systems to detect and prevent unauthorized access or malicious activities.

By implementing network security best practices, organizations can protect their network resources, prevent data breaches, and ensure the integrity of their network infrastructure.

Get your own Direct Connect And VPN Setup: Advanced Networking On AWS today.