AWS VPC Multi-AZ Network with VPN

aws · network diagram.

About This Architecture

Multi-AZ VPC architecture spanning us-east-1a and us-east-1b with Internet Gateway, Transit Gateway, and VPN Gateway for hybrid connectivity. Traffic flows from Internet/WAN through WAF and Internet Gateway to Transit Gateway, then to Application Load Balancers in public subnets, distributing requests to EC2 t3.medium instances across private app subnets in both AZs. Application servers connect to RDS Primary in AZ-1 and RDS Standby in AZ-2 for read replicas, with NAT Gateways enabling outbound internet access and VPN Gateway bridging Corporate HQ connectivity. This architecture demonstrates AWS best practices for high availability, fault isolation, and secure hybrid network design. Fork and customize this diagram on Diagrams.so to adapt CIDR blocks, instance types, or add additional services like Auto Scaling Groups or VPC endpoints. Consider adding Network ACLs or additional security groups for granular traffic control between layers.

People also ask

How do I design a multi-AZ AWS VPC with VPN connectivity to on-premises and RDS failover?

This diagram shows a production AWS VPC spanning two availability zones (us-east-1a and us-east-1b) with Internet Gateway for public traffic, Transit Gateway for hybrid connectivity via VPN to Corporate HQ, and Application Load Balancers distributing traffic to EC2 instances. RDS Primary in AZ-1 replicates to RDS Standby in AZ-2 for automatic failover, while NAT Gateways enable secure outbound int

AWS VPC Multi-AZ Network with VPN

AWSadvancedVPCmulti-AZVPNTransit GatewayRDS replication
Domain: Cloud AwsAudience: AWS solutions architects designing multi-AZ production networks
0 views0 favoritesPublic

Created by

March 3, 2026

Updated

March 3, 2026 at 11:28 AM

Type

network

Need a custom architecture diagram?

Describe your architecture in plain English and get a production-ready Draw.io diagram in seconds. Works for AWS, Azure, GCP, Kubernetes, and more.

Generate with AI