Hi
@Vinusan Uruththiramoorthy, I had flagged your message but didn’t have the change to reply yet. On my previous project, I’ve helped my client to migrate from their multi-region transit gateway and hybrid flat network (AWS and Cisco SDWAN) to a multi-region hybrid segmented network using AWS CloudWAN and Cisco SDWAN.
Cisco SDWAN connected the company’s on-premise locations with Direct Connects and VPN Site-to-Site tunneling a multiple regions across the globe. There was no network segmentation and Transit Gateways in those regions were peered and used to interconnect VPCs whereas some traffic was routed through on-premise firewall for inspection. The whole stack, as with many network implementations, was 80% manual effort which is why we wanted to address a few things:
• Avoid the usage of VPC peering connections (which still existed even though we had TGW too)
• Avoid backhauling traffic to on-premise firewalls
• Benefit from dynamic route propagation
• Introduce network segmentation
• Introduce clear north/south and east/west traffic inspection strategies
• ...
We ended up with setting up AWS IPAM (which we didn’t use before), allocated a new empty cloud range that could serve for net-new networking and designed a concept of global pool, zone pools, region pools and custom pools. This would allow us to re-route traffic for a given region, a given zone or a given specific range if we want to. Our 3-region implementation contains an
egress
VPC with an AWS network firewall for north/south, an
inspection
VPC with an AWS network firewall for east/west and the Global/Core network (a.k.a. CloudWAN) with 5 main segments (
nonprod
,
shared
,
prod
,
inspection
and
sdwan
) whereas VPC’s would be associated with either
nonprod
,
shared
or
prod
and on-premise networks with
sdwan
and whereas the
inspection
segment is where the post-inspected traffic would land. With the custom pool concept in IPAM and some static route provisioning we were able to seamlessly migrate existing network ranges into this. Everything from the first to the last resource is fully managed by IaC (Terraform) and at some point build up to a 1,000 resources.
A blogpost was launched by AWS about our implementation but pulled offline due to concerns from the company about exposing to much internal details. Happy to address any questions you might have for your setup !