Understand traffic mirror source and target connectivity options - Amazon Virtual Private Cloud

Understand traffic mirror source and target connectivity options

Connecting traffic mirror sources and targets in different VPCs can be useful for monitoring and analyzing network traffic across multiple environments. This allows you to centralize your network monitoring and security analysis, even if your application infrastructure is spread across different VPCs or AWS accounts.

The traffic mirror source and the traffic mirror target (monitoring appliance) can be in the same VPC or different VPCs and can be connected using the following resources:

  • An intra-Region VPC peering connection.

  • A transit gateway.

  • A Gateway Load Balancer endpoint.

The traffic mirror target can be owned by an AWS account that is different from the traffic mirror source.

The mirrored traffic is sent to the traffic mirror target using the source VPC route table. Before you configure Traffic Mirroring, make sure that the traffic mirror source can route to the traffic mirror target.

The following table describes the available resource configurations.

Source owner Source VPC Target owner Target VPC Connectivity option
Account A VPC 1 Account A VPC1 No additional configuration
Account A VPC 1 Account A VPC 2 Intra-Region peering or a transit gateway or Gateway Load Balancer endpoint
Account A VPC 1 Account B VPC 2 Cross-account intra-Region peering connection, a transit gateway, or a Gateway Load Balancer endpoint
Account A VPC 1 Account B VPC 1 VPC sharing