Search Pass4Sure

AWS Advanced Networking Specialty Study Guide: VPC, Direct Connect, and Transit Gateway

Deep-dive ANS-C01 study guide covering VPC architecture, Transit Gateway segmentation, Direct Connect BGP, Site-to-Site VPN, Route 53 advanced routing, PrivateLink, and network security for the AWS Advanced Networking Specialty exam.

AWS Advanced Networking Specialty Study Guide: VPC, Direct Connect, and Transit Gateway

The AWS Certified Advanced Networking - Specialty (ANS-C01) is one of the most technically demanding AWS certifications. It requires deep knowledge of networking fundamentals — routing protocols, BGP, TCP/IP, DNS, and load balancing — applied to AWS infrastructure. Passing this exam requires more than AWS knowledge; you must understand how networks actually work.

This guide covers all exam domains with depth on the topics that require the most technical precision.

Exam Overview

The ANS-C01 exam contains 65 questions (50 scored, 15 unscored) with a 170-minute time limit. The passing score is 750 out of 1000.

Domain Weights

Domain Weight
Domain 1: Network Design 30%
Domain 2: Network Implementation 26%
Domain 3: Network Management and Operations 20%
Domain 4: Network Security, Compliance, and Governance 24%

Domain 1: Network Design (30%)

VPC Architecture Deep Dive

A VPC is a logically isolated network in AWS. Every design decision has cost and capability implications.

CIDR block selection:

  • VPC CIDR must be between /16 and /28
  • Subnets must be within the VPC CIDR range
  • AWS reserves 5 IP addresses per subnet: network address (.0), VPC router (.1), DNS server (.2), future use (.3), broadcast (.255)
  • Plan for peering: peering VPCs cannot have overlapping CIDR ranges
  • Reserve address space for future growth; expanding a VPC CIDR is possible by adding secondary CIDRs

Subnet design:

Subnet Type Route Table Destination
Public 0.0.0.0/0 → Internet Gateway
Private (with internet access) 0.0.0.0/0 → NAT Gateway (in public subnet)
Private (isolated) No default route; routes only to VPC CIDR

Highly available NAT Gateway: Deploy one NAT Gateway per Availability Zone. Each private subnet's route table points to the NAT Gateway in the same AZ. This prevents a single AZ failure from blocking outbound internet access for all private subnets.

Transit Gateway Architecture

Transit Gateway (TGW) is a network transit hub connecting VPCs and on-premises networks through a hub-and-spoke model.

TGW route tables:

A single TGW can have multiple route tables. Attachments (VPCs, VPNs, Direct Connect gateways) are associated with one route table and can propagate routes to one or more route tables.

Segmentation use case:

TGW Route Table: Production
  - Routes to: Production VPCs only

TGW Route Table: Shared Services
  - Routes to: Production + Non-production + Shared Services VPCs

TGW Route Table: Non-Production
  - Routes to: Non-production VPCs + Shared Services only

This prevents direct connectivity between production and non-production while allowing both to access shared services (DNS, monitoring).

TGW inter-region peering: Connect TGWs in different regions. Traffic routes over the AWS backbone. Routing is static (no route propagation across peering connections).

TGW Connect: Supports GRE tunnels over TGW for connecting SD-WAN appliances. Uses BGP over the GRE tunnel for dynamic routing.

AWS Direct Connect

Direct Connect provides dedicated private connectivity from on-premises to AWS.

Connection types:

Type Speed Provider
Dedicated connection 1 Gbps, 10 Gbps, 100 Gbps Customer connects directly to AWS Direct Connect location
Hosted connection 50 Mbps to 10 Gbps AWS Direct Connect Partner provides the connection

Virtual interfaces (VIFs):

VIF Type Connects To
Private VIF VPC via Virtual Private Gateway or Direct Connect Gateway
Public VIF AWS public services (S3, DynamoDB, EC2 public IPs) over private network
Transit VIF Transit Gateway via Direct Connect Gateway

Direct Connect Gateway: Connects one Direct Connect connection to VPCs across multiple regions and accounts. A single DXGW can connect to up to 20 VGWs.

BGP configuration:

Private VIFs use BGP to exchange routes:

  • Customer advertises on-premises prefixes to AWS
  • AWS advertises VPC CIDR blocks to the customer router
  • Use BGP community tags to control which routes are preferred over Direct Connect vs. VPN

Resiliency models:

Model Configuration Use Case
Non-redundant Single connection Development, testing
High resiliency Two connections at separate locations Production workloads
Maximum resiliency Two connections at each of two locations (4 total) Mission-critical workloads

Site-to-Site VPN

AWS Site-to-Site VPN creates IPsec tunnels over the internet to a VPC.

Key components:

  • Virtual Private Gateway (VGW): AWS-side endpoint; attached to a VPC
  • Customer Gateway (CGW): Represents the on-premises device configuration in AWS
  • VPN Connection: Two tunnels for redundancy; each tunnel terminates in a different AZ

Routing options:

  • Static routing: Customer manually specifies on-premises CIDR ranges
  • Dynamic routing: Uses BGP to advertise routes; enables automatic failover

VPN over Direct Connect: Route VPN traffic over a Direct Connect public VIF for added security and to get Direct Connect latency without a private VIF. The VPN provides encryption that Direct Connect does not provide natively.

Domain 2: Network Implementation (26%)

Elastic Load Balancing Configuration

Application Load Balancer:

ALB operates at L7. Key features:

  • Path-based routing: /api/* routes to one target group, /* to another
  • Host-based routing: api.example.com routes differently than www.example.com
  • Weighted target groups: Distribute traffic between versions (canary deployments)
  • Authenticate users: Integrate with Cognito or OIDC providers at the load balancer
  • Fixed response: Return a static response for certain paths (maintenance mode)

Network Load Balancer:

NLB operates at L4. Key features:

  • Preserves source IP address (ALB rewrites source IP to its own; NLB preserves client IP)
  • Static IP address per AZ (useful for firewall whitelisting)
  • Ultra-low latency with TLS termination
  • PrivateLink endpoints must use NLB as the service endpoint

Connection draining / deregistration delay: When removing an instance from a target group, existing connections are allowed to complete for the configured period (default 300 seconds) before the instance is terminated.

Route 53 Advanced Routing

Routing policies:

Policy Use Case
Simple One record, one or multiple values
Weighted A/B testing, gradual traffic migration
Latency Route to region with lowest latency for the user
Failover Active/passive DR; health check required on primary
Geolocation Route by country or continent
Geoproximity Route by geographic proximity; adjustable bias
Multivalue answer Return up to 8 healthy records

Route 53 health checks:

  • Endpoint health checks: Check HTTP, HTTPS, or TCP to an IP or domain
  • Calculated health checks: Combine multiple health checks with AND/OR logic
  • CloudWatch alarm health checks: Declare a resource unhealthy based on a CloudWatch alarm

Route 53 Resolver:

Within a VPC, Route 53 Resolver handles DNS for .amazonaws.com and private hosted zones. For hybrid environments:

  • Inbound endpoints: On-premises resolvers forward AWS-domain queries to an inbound endpoint in the VPC
  • Outbound endpoints: Route 53 Resolver forwards queries for on-premises domains to on-premises DNS servers via forwarding rules

VPC Connectivity Patterns

VPC Peering:

  • Direct connection between two VPCs (same or different accounts/regions)
  • Not transitive: VPC A peers with B and C; B and C cannot communicate through A
  • No bandwidth limit or gateway device required
  • Route tables in both VPCs must be configured

AWS PrivateLink:

  • Expose a service privately without VPC peering or internet
  • Requires a Network Load Balancer in the provider VPC
  • Consumers create an interface endpoint (ENI) in their VPC
  • Traffic never traverses the public internet
  • Scales to thousands of consumers

Domain 3: Network Management and Operations (20%)

VPC Flow Logs

Flow Logs capture IP traffic metadata for VPC, subnet, or ENI:

version account-id interface-id srcaddr dstaddr srcport dstport protocol packets bytes start end action log-status
2 123456789012 eni-abc12345 10.0.1.5 172.16.0.10 34567 443 6 20 4000 1620000000 1620000060 ACCEPT OK

Filters:

  • ACCEPT: Log only accepted traffic
  • REJECT: Log only rejected traffic (security group/NACL denials)
  • ALL: Log all traffic

Flow Logs are delivered to CloudWatch Logs or S3. For network troubleshooting, use Logs Insights to query specific source/destination pairs.

AWS Network Manager

Network Manager provides a global view of Transit Gateway networks:

  • Visualizes all TGW attachments on a map
  • Monitors BGP route changes and connectivity
  • Route Analyzer: Simulates route paths between resources without sending actual traffic

Reachability Analyzer

Reachability Analyzer verifies network path connectivity between two endpoints without sending traffic:

  • Tests connectivity between EC2 instances, load balancers, ENIs
  • Identifies the blocking component if connectivity fails (security group, NACL, route table, missing peering connection)
  • Does not test application-layer connectivity; only network-layer paths

Domain 4: Network Security, Compliance, and Governance (24%)

Security Group vs. NACL Reference Summary

Feature Security Group NACL
Applies to ENI (instance level) Subnet
Stateful Yes No
Allow/Deny Allow only Allow and Deny
Rule evaluation All rules evaluated Rules evaluated by order (lowest number first)
Default behavior Deny all inbound Allow all (default NACL)

AWS Gateway Load Balancer

GWLB enables deploying, scaling, and managing third-party virtual appliances (firewalls, IDS/IPS). It uses the GENEVE protocol to encapsulate traffic.

Inspection architecture:

Ingress traffic → GWLB Endpoint → GWLB → Firewall Appliance → GWLB → Application

All traffic passes through the appliance transparently. If the appliance fails, GWLB routes to a healthy appliance. Used for centralized inspection of all traffic entering or leaving a VPC.

DNS Security

DNSSEC for Route 53:

  • Enable DNSSEC signing on public hosted zones
  • Route 53 signs DNS responses with an asymmetric key pair
  • Resolvers that validate DNSSEC will reject unsigned or incorrectly signed responses

Route 53 Resolver DNS Firewall:

  • Block DNS resolution for known malicious domains
  • Use AWS managed rule groups or custom block/allow lists
  • Integrates with Route 53 Resolver for all DNS queries from VPC resources

"The ANS-C01 separates AWS professionals from AWS operators. You are not being tested on which service to click — you are being tested on whether you understand routing, BGP communities, and how packets actually move between your data center and AWS. Networking fundamentals are not optional for this exam." — Todd Lammle, author of the AWS Certified Advanced Networking Study Guide (Sybex, 2020)

Study Timeline

Recommended: 12-16 weeks. Requires networking fundamentals (BGP, TCP/IP, subnetting).

Week Focus
1-2 VPC design, subnetting, routing tables, NACLs, security groups
3-4 Transit Gateway architecture, route tables, segmentation
5-6 Direct Connect, BGP, resiliency models
7-8 Site-to-Site VPN, CloudHub, VPN over Direct Connect
9-10 ELB (ALB, NLB, GWLB), Route 53 advanced routing
11-12 PrivateLink, VPC endpoints, flow logs, Reachability Analyzer
13-14 Network security: WAF, Network Firewall, DNS Firewall
15-16 Practice exams, weak area review

See also: AWS Solutions Architect Associate (SAA-C03) Study Guide: Domains, Services, and Scenarios

References

  1. AWS. "AWS Certified Advanced Networking - Specialty Exam Guide (ANS-C01)." https://d1.awsstatic.com/training-and-certification/docs-advnetworking-spec/AWS-Certified-Advanced-Networking-Specialty_Exam-Guide.pdf
  2. AWS. "Amazon VPC User Guide." https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html
  3. AWS. "AWS Direct Connect User Guide." https://docs.aws.amazon.com/directconnect/latest/UserGuide/Welcome.html
  4. AWS. "AWS Transit Gateway Documentation." https://docs.aws.amazon.com/vpc/latest/tgw/what-is-transit-gateway.html
  5. AWS. "Amazon Route 53 Developer Guide." https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/Welcome.html
  6. Lammle, Todd. "AWS Certified Advanced Networking Study Guide." Sybex, 2020.
  7. AWS. "AWS Site-to-Site VPN User Guide." https://docs.aws.amazon.com/vpn/latest/s2svpn/VPC_VPN.html
  8. AWS. "Elastic Load Balancing Documentation." https://docs.aws.amazon.com/elasticloadbalancing/latest/userguide/what-is-load-balancing.html

Frequently Asked Questions

What networking prerequisites are required before studying for ANS-C01?

You should have solid knowledge of TCP/IP, subnetting, routing protocols (especially BGP), DNS, and load balancing fundamentals before starting ANS-C01 preparation. The exam tests networking concepts applied to AWS, not just AWS service features.

What is the difference between a Private VIF and a Transit VIF on Direct Connect?

A Private VIF connects directly to a VPC via a Virtual Private Gateway. A Transit VIF connects to a Direct Connect Gateway associated with a Transit Gateway, allowing a single Direct Connect connection to reach multiple VPCs across regions.

Why do you need one NAT Gateway per Availability Zone?

If you use a single NAT Gateway and that AZ fails, private subnets in other AZs lose outbound internet access. Deploying one NAT Gateway per AZ and pointing each AZ's private subnets to their local NAT Gateway prevents this single point of failure.

What is AWS PrivateLink and when should you use it?

PrivateLink exposes a service privately to VPC consumers without VPC peering or internet access. The provider deploys a Network Load Balancer; consumers create interface endpoints (ENIs). Use it when you need to share services across many accounts without complex VPC peering.

What does Route 53 Reachability Analyzer do?

Reachability Analyzer verifies network-layer connectivity between two endpoints without sending actual traffic. It identifies blocking components (security groups, NACLs, missing routes) when connectivity fails, making it a fast troubleshooting tool.