AWS Private Dev VMs - Azure VFTD Egress
About This Architecture
Hybrid multi-cloud dev environment routing AWS EC2 instances through Azure Virtual Firewall for centralized egress control and internet access. Developer teams connect via corporate VPN/Transit Gateway to five t3.medium EC2 instances in a private subnet (10.40.15.64/27) within AWS VPC (10.40.0.0/16), with all outbound traffic funneled through Azure VFTD for inspection and policy enforcement. Security groups restrict inbound SSH to corporate LAN (172.24.18.0/24) only, eliminating public IPs and NAT gateways while maintaining zero-trust access via IAM and CloudWatch monitoring. Fork this diagram on Diagrams.so to customize VPC CIDR ranges, add additional availability zones, or integrate with your own firewall policies. This architecture demonstrates best practices for organizations requiring centralized security posture across distributed cloud providers.
People also ask
How do I route AWS EC2 instances through Azure Virtual Firewall for centralized egress control in a hybrid multi-cloud setup?
This diagram shows a hybrid architecture where AWS EC2 dev instances (Dev-01 through Dev-05) in a private subnet connect via Transit Gateway/VPN Gateway to Azure Virtual Firewall (VFTD) for all outbound internet traffic. Security groups restrict inbound SSH to corporate LAN only, IAM controls access, and CloudWatch monitors activity—eliminating public IPs while enforcing centralized egress policie
- Domain:
- Cloud Multi
- Audience:
- Cloud architects designing hybrid multi-cloud network topologies with secure egress controls
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.