Sunday, November 16, 2025

AWS Transit Gateway (TGW) | Overview.


An Overview of AWS Transit Gateway (TGW).

Intro:

  •        AWS Transit Gateway is a regional, managed Layer-3 routing hub that enables twtech to scalable connectivity across thousands of VPCs, VPNs, Direct Connect gateways, and on-prem networks.
  •        Think of AWS Transit Gateway as AWS’s cloud-grade replacement for SDN routers/VRFs, designed for multi-VPC and multi-account network topologies.

Scope:

  •     What a Transit Gateway Actually Is,
  •     TGW Attachments – Deep Mechanics,
  •      Route Tables: The Heart of TGW,
  •      Performance & Scaling Deep Dive,
  •      Inter-Region Connectivity,
  •      Security Architecture,
  •      Common Architectures,
  •      Advanced – TGW Connect (for SD-WAN),
  •      Comparison Matrix,
  •      When to Use Transit Gateway.

1. What a Transit Gateway Actually Is

TGW is a distributed virtual router inside an AWS Region:

 Internal Architecture

  •         TGW has edge nodes in every Availability Zone (AZ).
  •         Each attachment (VPC, VPN, DXGW, peering) is associated with a TGW ENI inside each AZ where a subnet is specified, making it horizontally distributed.
  •         TGW doesn’t centralize packets in a single node — each AZ has a dataplane endpoint for local attachments.

Control Plane vs Data Plane

  •         Control Plane: TGW stores routing tables, association/propagation rules, and attachment info.
  •         Data Plane: Packets are routed between attachments through TGW’s high-bandwidth distributed fabric.

TGW provides hyperscale routing capacity:

  •         Supports 50 Gbps per VPC attachment (burst).
  •         Supports 20,000 routes per table (hard limit).
  •         Supports 5,000 attachments per TGW.

2. TGW Attachments – Deep Mechanics

There are multiple attachment types, each with different behaviors:

A. VPC Attachment

  •         TGW creates ENIs in VPC subnets you specify.
  •         Supports UDP, TCP, ICMP, all IP traffic (unlike VPC peering which has protocol limits).
  •         Routes from VPC TGW are configured using the VPC route table.
  •         VPCs can forward traffic to TGW using static routes only.

B. VPN Attachment

  •         Uses an AWS VPN endpoint connected to TGW.
  •         Supports BGP route exchange.
  •         Supports equal-cost multi-path (ECMP).

C. Direct Connect Gateway (DXGW) Attachment

  •         TGW DXGW uses BGP.
  •         Allows on-prem to reach multiple region VPCs through one DX connection (with constraints).

D. TGW Peering Attachment

  •         Connects TGWs in different regions.
  •         Not transitive: A → B → C doesn’t work.
  •         Supports cross-region traffic but not multicast.

E. Multicast Attachment

  •         Uses IGMPv2.
  •         Requires dedicated subnets.
  •         Typically used for finance/messaging/market data workloads.

3. Route Tables: The Heart of TGW

TGW routing is like VRF-lite on steroids.

TGW has:

  •         One or more routing tables
  •         Attachments:
    •    Associate: Which table the attachment reads
    •    Propagate: Which table the attachment writes to

Sample:

Attachment

Associate

Propagate

VPC-A

Core-RT

Core-RT

VPC-B

Core-RT

Core-RT

VPN

Core-RT

Core-RT

Shared Services

Shared-RT

Shared-RT

This enables VPC segmentation:

  •         Hub/spoke
  •         Multi-tier environments
  •         Network isolation

Routing Behavior

  •         TGW route evaluation is longest-prefix match (LPM).
  •         Static routes for VPC/DX peering.
  •         BGP-learned routes for VPN/DX.

Important: TGW Is NOT a NAT device

  •         It won’t rewrite IPs.
  •         Source/destination IPs must be directly routable across attachments.
  •         Overlapping CIDRs require additional constructs (Transit Gateway Connect + SD-WAN or NAT appliances).

4. Performance & Scaling Deep Dive

This is where TGW outclasses legacy VPC Peering:

Bandwidth

·        VPC attachment → TGW supports up to 50 Gbps burst.

·        Traffic is optimally routed per AZ (no inter-AZ hairpin).

Horizontal scaling

Because TGW uses ENIs in each AZ:

  •         If twtech places attachments in multiple AZs, throughput scales per-AZ.
  •         Failure of one AZ does not cause regional failure — TGW is fault-isolated per AZ.

Latency

  •         Adds ~1–2 ms depending on region.
  •         Less than many SD-WAN/centralized firewalls.

Multicast Performance

  •         High fanout, low-latency distribution of multicast frames.
  •         Avoids needing physical multicast infrastructure.

5. Inter-Region Connectivity

TGW supports:

  •         Inter-region peering (data-plane encrypted)
  •         DXGW (global-scale on-prem)

But:

TGW Peering Is Not Transitive

If TGW-A peers to TGW-B, and TGW-B peers to TGW-C:

  •         A cannot reach C.

Why?

  •         AWS retains clear boundaries for routing policies.
  •         No automatic large-scale route reflection.

6. Security Architecture

TGW provides several security primitives:

1. Segmentation via Route Tables

  •         Route associations/propagations define allowed communication.
  •         Similar to VRF but simpler.

2. Appliance Mode

Used for firewalls:

  •         TGW attachment → dedicated appliance subnet.
  •         Symmetric routing ensures return traffic always flows through firewall.

3. AWS Network Firewall via GWLB

TGW GWLB Inspection VPC TGW

This provides:

  •         Centralized firewalling
  •         Automatic failover/load balancing
  •         No throughput bottleneck on single appliance

7. Common Architectures

 A. Hub-and-Spoke

Most common:

  •         Spokes = application VPCs
  •         Hub = TGW
  •         Shared-services VPC + on-prem attached

 B. Multi-Region Mesh with TGW Peering

Each region has:

  •         One TGW
  •         All VPCs attach locally
  •         TGWs peer for global traffic

 C. Security VPC with GWLB

Traffic sent through:

  •         TGW GWLB Security Appliances TGW

 D. Multi-account with AWS Organizations

Every account in the org can attach its VPCs using:

  •         RAM resource sharing
  •         IAM permissions

8. Advanced – TGW Connect (for SD-WAN)

TGW Connect uses:

  •         GRE tunnels
  •         BGP routing

This allows:

  •         SD-WAN integration (VeloCloud, Cisco SD-WAN, etc.)
  •         Overlapping CIDRs with NAT in SD-WAN
  •         High-scale route distribution

Essential for large enterprise migration use cases.

9. Comparison Matrix

Feature

TGW

VPC Peering

VPC Lattice

Cloud WAN

Transitive Routing

✔ (L7)

Multi-VPC

Limited

On-prem

VPN only

Segmentation

✔ (L3)

Minimal

✔(L7)

SD-WAN

✔ (TGW Connect)

Partial

Multicast

NB:

·       TGW = L3 router

·       Lattice = Application-level router

·       Cloud WAN = Global network manager for many TGWs

10. When to Use Transit Gateway

Use TGW when you need:

  •         Large-scale multi-VPC routing
  •         Hybrid connectivity with on-prem
  •         Centralized firewalling
  •         Segmentation and routing policies
  •         SD-WAN integration
  •         High bandwidth / low latency inter-VPC traffic

NB:

Transit Gateway (TGW) is Not ideal when:

  •         twtech needs Layer-7 (L7)-based service routing (use  instead VPC Lattice).
  •         twtech requires cross-region transitivity across many regions (use instead Cloud WAN).

No comments:

Post a Comment

Amazon EventBridge | Overview.

Amazon EventBridge - Overview. Scope: Intro, Core Concepts, Key Benefits, Link to official documentation, Insights. Intro: Amazon EventBridg...