AWS Outposts connectivity to AWS Regions
AWS Outposts supports wide area network (WAN) connectivity through the service link connection.
Note
You can't use private connectivity for your service link connection that connects your Outposts server to your AWS Region or AWS Outposts home Region.
Connectivity through service link
During AWS Outposts provisioning, you or AWS creates a service link connection that connects your Outposts server to your chosen AWS Region or home Region. The service link is an encrypted set of VPN connections that are used whenever the Outpost communicates with your chosen home Region. You use a virtual LAN (VLAN) to segment traffic on the service link. The service link VLAN enables communication between the Outpost and the AWS Region for both management of the Outpost and intra-VPC traffic between the AWS Region and Outpost.
The Outpost is able to create the service link VPN back to the AWS Region through public Region connectivity. To do so, the Outpost needs connectivity to the AWS Region's public IP ranges, either through the public internet or AWS Direct Connect public virtual interface. This connectivity can be through specific routes in the service link VLAN, or through a default route of 0.0.0.0/0. For more information about the public ranges for AWS, see AWS IP Address Ranges.
After the service link is established, the Outpost is in service and managed by AWS. The service link is used for the following traffic:
-
Management traffic to the Outpost through the service link, including internal control plane traffic, internal resource monitoring, and updates to firmware and software.
-
Traffic between the Outpost and any associated VPCs, including customer data plane traffic.
Service link maximum transmission unit (MTU) requirements
The maximum transmission unit (MTU) of a network connection is the size, in bytes, of the largest permissible packet that can be passed over the connection. The network must support 1500-bytes MTU between the Outpost and the service link endpoints in the parent AWS Region. For information on the required MTU between an instance in the Outpost and an instance in the AWS Region through the service link, see Network maximum transmission unit (MTU) for your Amazon EC2 instance in the Amazon EC2 User Guide.
Service link bandwidth recommendations
For an optimal experience and resiliency, AWS requires that you use redundant connectivity of at least 500 Mbps and a maximum of 175 ms round trip latency for the service link connection to the AWS Region. The maximum utilization for each Outposts server is 500 Mbps. To increase the connection speed, use multiple Outposts servers. For example, if you have three AWS Outposts servers, the maximum connection speed increases to 1.5 Gbps (1,500 Mbps). For more information, see Service link traffic for servers.
Your AWS Outposts service link bandwidth requirements vary depending on workload characteristics, such as AMI size, application elasticity, burst speed needs, and Amazon VPC traffic to the Region. Note that AWS Outposts servers do not cache AMIs. AMIs are downloaded from the Region with every instance launch.
To receive a custom recommendation about the service link bandwidth required for your needs, contact your AWS sales representative or APN partner.
Firewalls and the service link
This section discusses firewall configurations and the service link connection.
In the following diagram, the configuration extends the Amazon VPC from the AWS Region to the Outpost. An AWS Direct Connect public virtual interface is the service link connection. The following traffic goes over the service link and the AWS Direct Connect connection:
-
Management traffic to the Outpost through the service link
-
Traffic between the Outpost and any associated VPCs
If you are using a stateful firewall with your internet connection to limit connectivity from the public internet to the service link VLAN, you can block all inbound connections that initiate from the internet. This is because the service link VPN initiates only from the Outpost to the Region, not from the Region to the Outpost.
If you use a firewall to limit the connectivity from the service link VLAN, you can block all inbound connections. You must allow outbound connections back to the Outpost from the AWS Region as per the following table. If the firewall is stateful, outbound connections from the Outpost that are allowed, meaning that they were initiated from the Outpost, should be allowed back inbound.
Protocol | Source Port | Source Address | Destination Port | Destination Address |
---|---|---|---|---|
UDP |
1024-65535 |
Service Link IP |
53 |
DHCP provided DNS server |
UDP |
443, 1024-65535 |
Service Link IP |
443 |
AWS Outposts Service Link endpoints |
TCP |
1024-65535 |
Service Link IP |
443 |
AWS Outposts Registration endpoints |
Note
Instances in an Outpost can't use the service link to communicate with instances in another Outposts. Leverage routing through the local gateway or local network interface to communicate between Outposts.
Updates and the service link
AWS maintains a secure network connection between your Outposts server and its parent AWS
Region. This network connection, called the service link, is essential in managing the Outpost
by providing intra-VPC traffic between the Outpost and AWS Region. AWS Well-Architected
The service link is regularly updated to maintain operational quality and performance.
During maintenance, you might observe brief periods of latency and packet loss on this network
resulting in impact on workloads that are dependent on VPC connectivity to resources hosted
in-region. However, traffic traversing the Local Network Interfaces
(LNI) will not be impacted. You can avoid impact to your application by following
AWS
Well-Architected
Redundant internet connections
When you build connectivity from your Outpost to the AWS Region, we recommend that you
create multiple connections for higher availability and resiliency. For more information, see
AWS Direct Connect Resiliency
Recommendations
If you need connectivity to the public internet, you can use redundant internet connections and diverse internet providers, just as you would with your existing on-premises workloads.