How Reachability Analyzer works - Amazon Virtual Private Cloud

How Reachability Analyzer works

Reachability Analyzer analyzes the path between a source and destination by building a model of the network configuration, and then checking for reachability based on the configuration. It does not send packets or analyze the data plane.

To use Reachability Analyzer, you specify the path for the traffic from a source to a destination. For example, you could specify an internet gateway as the source, an EC2 instance as the destination, 22 as the destination port, and TCP as the protocol. This would allow you to verify that you can connect to the EC2 instance through the internet gateway using SSH.

If there are multiple reachable paths between a source and a destination, Reachability Analyzer identifies and displays the shortest path. You can analyze the path again, specifying an intermediate component, to find an alternative reachable path that traverses the intermediate component.

If the path is not reachable, Reachability Analyzer displays information about the component or combination of components that is blocking the path. There might be additional components blocking the path.

Source and destination resources

The source and destination resources must be in the same Region. The source and destination resources must be in the same VPC or in VPCs that are connected through a VPC peering connection or a transit gateway. The source and destination resources can belong to different AWS accounts in the same organization from AWS Organizations.

Reachability Analyzer supports the following resource types as sources and destinations:

  • Instances

  • Internet gateways

  • Network interfaces

  • Transit gateways

  • Transit gateway attachments

  • VPC endpoint services

  • VPC endpoints

  • VPC peering connections

  • VPN gateways

In addition, Reachability Analyzer supports IP addresses as destinations.

Intermediate components

Reachability Analyzer supports the following resource types as intermediate components:

  • Load balancers

  • NAT gateways

  • Network Firewall firewall

  • Transit gateways

  • Transit gateway attachments

  • VPC peering connections

Path components

The following resource types can appear in reachable paths and in explanations when a path is not reachable:

  • EC2 instances

  • Internet gateways

  • Load balancers

  • NAT gateways

  • Network ACLs

  • Network Firewall firewall

  • Network interfaces

  • Prefix lists

  • Route tables

  • Security groups

  • Subnets

  • Target groups

  • Transit gateways

  • Transit gateway attachments

  • Transit gateway route tables

  • Virtual private gateways

  • VPC endpoint services

  • VPC endpoints

  • VPC gateway endpoints

  • VPC peering connections

  • VPCs

  • VPN connections

Considerations

Consider the following when working with Reachability Analyzer:

  • Reachability Analyzer supports only resources with an IPv4 address. If a resource has both IPv4 and IPv6 addresses, Reachability Analyzer includes only the IPv4 addresses in its analysis.

  • Reachability Analyzer supports shared resources only if they can be fully described by the calling principal. For example, if a route references a prefix list owned by another account, the owner must share the prefix list with the calling principal for the analysis to succeed.

  • If you enable trusted access, the delegated administrator account can create and delete paths that traverse owner and participant subnets within your organization from AWS Organizations. This account can also start and delete path analyses. For more information, see Cross-account analyses for Reachability Analyzer.

  • Paths are not a shareable resource.

  • Transit gateway Connect attachments are not supported. Reachability Analyzer analyzes connectivity only up to these attachments.

  • With the TCP protocol, when a network path traverses a transit gateway route table, only forward traffic is analyzed.

  • Reachability Analyzer can find paths through at most two transit gateway route tables. To analyze paths through additional transit gateway route tables, use Route Analyzer. For more information, see Route Analyzer in the Amazon VPC Transit Gateways guide.

  • Paths through a Gateway Load Balancer endpoint do not include the Gateway Load Balancer or its targets. You should verify connectivity between the Gateway Load Balancer and its targets using a separate analysis.

  • Reachability Analyzer does not consider the health of registered targets.

  • Reachability Analyzer does not support Network Firewall rule groups that reference a resource group. In this case, the analysis fails.

  • For a cross-account path through a Network Firewall firewall, the rule group must be created in the same delegated administrator account as the user running the analysis.

  • Reachability Analyzer supports all stateful and stateless 5-tuple rules in Network Firewall. It doesn't support domain lists, Suricata rules, rule options, and tag-based resource groups. When Reachability Analyzer encounters an unsupported rule in Network Firewall, it provides an informational message in the path details.

  • The packet header leaving the source and the packet header arriving at the destination can differ, due to intermediate components transforming the packets. For example, internet gateways and NAT gateways provide network address translation (NAT).

  • Reachability Analyzer does not report connectivity due to traffic mirroring.

  • Reachability Analyzer automatically deletes an analysis 120 days after its creation date.

  • Your account has quotas related to Reachability Analyzer. For more information, see Quotas for Reachability Analyzer.

Resource configuration

Use the following documentation to help you update the configuration of your network resources: