AWS Multi-AZ VPC with NAT Gateway and VPN
About This Architecture
Multi-AZ VPC architecture spanning us-east-1a and us-east-1b with public-facing WAF, Route 53 DNS, and dual Application Load Balancers routing traffic to t3.medium EC2 instances across availability zones. Private app and data subnets isolate compute from databases, with NAT Gateways enabling outbound internet access and VPN Gateway supporting secure remote office connectivity. RDS Primary and Standby instances provide synchronous replication and automatic failover for zero-downtime disaster recovery. This design demonstrates AWS best practices for fault tolerance, security segmentation, and operational resilience. Fork and customize this diagram on Diagrams.so to match your CIDR ranges, instance types, and regional requirements.
People also ask
How do I design a multi-AZ AWS VPC with NAT Gateway, VPN access, and RDS failover for production workloads?
This diagram shows a two-AZ VPC (10.0.0.0/16) with public subnets hosting ALBs and NAT Gateways, private subnets isolating t3.medium EC2 instances, and RDS Primary/Standby for synchronous replication. WAF and Route 53 protect inbound traffic, while VPN Gateway enables secure remote office access to private resources.
- Domain:
- Cloud Aws
- Audience:
- AWS solutions architects designing highly available, multi-AZ production workloads
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.