Saturday, November 1, 2025

AWS Default VPC | Deep Dive & Hands-On.

A deep dive into AWS Default VPC.

Focus:

  •        Default VPC architecture,
  •        Default VPC behavior,
  •        Default VPC compared to custom VPCs — especially from a DevOps / Cloud Engineering perspective.

Breakdown:

  •        The Concept: Default VPC,
  •        Default VPC Overview,
  •        Default VPC Architecture,
  •        Default VPC Components Explained,
  •        Default VPC Behavior,
  •        Security Implications,
  •        Best Practices,
  •        Sample AWS Default VPC Flow,
  •        Visual Summary,
  •        Key Takeaways.

1. The Concept: Default VPC

  •        When twtech creates an AWS account, AWS automatically provisions a default Virtual Private Cloud (VPC) in each region.
  •        Default VPC is designed to give users a ready-to-use networking environment so twtech can launch EC2 instances immediately.

·       Therefore, twtech doesn’t need custom network setup in the  Default VPC.

 2. Default VPC Overview

Attribute

Description

Created Automatically

One per AWS Region

CIDR Block

172.31.0.0/16 (by default)

Subnets

One subnet in each Availability Zone (AZ)

Internet Connectivity

Public by default (Internet Gateway attached)

DNS Resolution

Enabled

Route Tables

Default route table includes route to Internet Gateway

Security Groups & NACLs

Pre-created with open rules (allow outbound, restricted inbound)

DHCP Options Set

Configured for AmazonProvidedDNS

Tenancy

Default tenancy (shared hardware)

 3. Default VPC Architecture

4. Default VPC Components Explained

a. CIDR Block

  • Uses 172.31.0.0/16 by default.
  • Provides ~65,536 private IP addresses.

b. Subnets

  • Each Availability Zone (AZ) in a region gets one public subnet.
  • AWS automatically assigns /20 subnets (4096 IPs each).

c. Route Tables

  • Default route table includes:
    •         172.31.0.0/16 → local
    •         0.0.0.0/0 → igw-xxxxxxxx  (Internet Gateway)
  • Means all subnets are public and have outbound internet access.

d. Internet Gateway (IGW)

  • Attached by default → enables public internet access.

e. Security Groups

  • Default SG allows:
    • Inbound: from itself (intra-group communication)
    • Outbound: all traffic (0.0.0.0/0)

f. Network ACLs

  • Default NACL allows all inbound and outbound traffic.

g. DHCP Options Set

  • Configured to provide:
    • AmazonProvidedDNS
    • Default domain name (e.g., ec2.internal or region.compute.internal)

 5. Default VPC Behavior

Feature

Default VPC

Custom VPC

Internet Gateway.

Attached automatically

Must be attached manually

Public Subnets.

One per AZ

Must be created manually

Default Routes.

Pre-configured to IGW

Must be defined

DNS.

Enabled

Optional

EC2 Auto-Assign Public IP.

Enabled by default

Disabled unless configured

NAT Gateway.

❌ Not included

Must be added manually

Security.

Open outbound, restrictive inbound

Customizable

6. Security Implications

  • Pros: Quick testing, public access enabled.
  • Cons: Everything is publicnot ideal for production.
  • For secure environments, twtech needs to:
    • Create custom VPCs.
    • Use private subnets for backend systems.
    • Add NAT Gateways or PrivateLink for outbound access.

 7. Best Practices

Use Default VPC for:

  • Quick demos, testing, learning environments.

 Avoid Default VPC for:

  • Production workloads, sensitive data, compliance-required workloads.

 For production:

  • Build custom VPCs with:
    • Public and private subnets
    • NAT Gateway
    • Bastion host or SSM Session Manager
    • Custom route tables and tighter SG/NACL rules

 8. Sample AWS Default VPC Flow

  1. Launch EC2 in default VPCgets private IP (172.31.x.x) & public IP (auto-assigned).
  2. EC2’s traffic Route Table Internet Gateway Internet.
  3. Return traffic routed back to EC2 via IGW.

1.     Visual Summary

Key Takeaways

  • Each AWS region comes with one default VPC.
  • The default VPC provides immediate internet-ready networking.
  • All subnets are public by default.
  • Great for development/testing, not production.
  • Replace default VPC with custom VPCs for secure and scalable production architectures.

Project: Hands-On

How twtech uses Default VPC(created by aws) within its Environment.

Search for aws service: VPC

VPC Dashboard:

Your VPCs

Details of Default VPC:


VPC Subnets: Available IPv4 address per AZ

VPC  Route Table

VPC Security: Network Access Control Lists (NACLs)

All traffic is allowed for in the subnet for connectivity: inbound and outbound

 VPC Internet Gateway: Provides internet access the EC2 instances


No comments:

Post a Comment

Amazon EventBridge | Overview.

Amazon EventBridge - Overview. Scope: Intro, Core Concepts, Key Benefits, Link to official documentation, Insights. Intro: Amazon EventBridg...