Networking & Content Delivery

Integrating AWS Client VPN with AWS Network Firewall

Organizations use remote access solutions for secure remote user access to resources hosted on their internal networks. This post shows various deployment models to integrate AWS Network Firewall with AWS Client VPN. AWS Client VPN is a managed client-based VPN service that secures access to your AWS resources, and resources in your on-premises network, over […]

Fever: Building a VPN-less secure network for corporate access

Fever is the leading global live-entertainment discovery platform, and it has helped millions of people discover the best experiences in their cities since 2014. With a mission to democratize access to culture and entertainment in real life through its platform, Fever inspires users to enjoy unique local experiences and events, from immersive exhibitions, interactive theatrical […]

Active Directory Domain Services integration with Amazon Route 53

Anyone who has worked with Microsoft Active Directory Domain Services (AD DS) and domain-joined workloads in the past likely knows how critical proper DNS resolution is to healthy operations. Even if you haven’t worked with AD DS workloads, if you are reading this post, you have likely heard of some outage that was caused by […]

How to achieve DNS high availability with Route 53 Resolver endpoints

This post assumes a certain level of technical knowledge, including familiarity with DNS terminology, Wireshark, and Amazon Route 53 Resolver endpoints. Introduction The Domain Name System (DNS) is a critical service underpinning nearly the entire internet. As nearly every application begins with DNS resolution, a highly available and performant DNS architecture is crucial for application […]

DNS best practices for Amazon Route 53

Most web services rely on DNS to resolve names to IP addresses and sometimes other pieces of information. Amazon Route 53 provides highly available and scalable recursive DNS resolution, domain registration, and authoritative DNS-hosted zones that include health check capabilities and a broad array of routing capabilities. When using Amazon Route 53, you can scale […]

Automating the admission of virtual private clouds to AWS Cloud WAN networks

In this blog post, we present an augmented approach of managing AWS Cloud WAN segments in a secure, scalable, and on-demand way. When your organization increases the number of AWS accounts and AWS Regions in use, operational and security complexities related with admitting new user-created virtual private clouds (Amazon VPCs) to the network also increase—from […]

Preserving client IP address with Proxy protocol v2 and Network Load Balancer

When a load balancer or proxy cannot preserve the client’s original IP address, it may rewrite the IP address or use its own IP address for routing purposes. In this scenario, common practices such as inserting the original IP address into the request headers (for example, X-Forwarded-For) or utilizing Proxy protocol are widely used to […]

Private network for data movement in generative AI

Private network for data movement in generative AI In this post, we cover the architecture patterns for building secure, private network connectivity for data movement in generative artificial intelligence (generative AI) using Amazon Web Services (AWS) and AWS Partner Network (APN) services. Data privacy and security are top of mind for customers exploring generative AI […]

How to identify website performance bottlenecks by measuring time to first byte latency and using Server-Timing header

While website performance issues are a common occurrence, pinpointing their root causes can be a challenging task. In this post, you will learn how to simplify the performance troubleshooting process by unlocking the potential of the Server-Timing header. This header allows backend components to communicate timing metrics and other insights relevant to performance monitoring in […]

Protect against bots with AWS WAF Challenge and CAPTCHA actions

Protecting against bot threats requires insights into the client environment beyond what is available through network-level characteristics of a request, such as TCP or HTTP payload signatures. AWS WAF uses CAPTCHA and Challenge actions to undertake a client-side interaction, whether on a mobile device or browser, to understand this client environment before they can be […]