- It is a network transit hub which connects VPCs to each other and to on-premise networks using Site-to-Site VPNs and Direct Connects
- It is designed to reduce the network architecture complexity in AWS
- It is a network gateway object, it is HA and scalable
- Attachments: we create attachments in order for the TGW to connect to VPCs and on-premise networks. Valid attachments are:
- VPC attachments
- Site-to-Site VPN attachments
- Direct Connect Gateway attachments
- Attachments are configured in each subnet of the connected VPCs
- We can also peer transit gateways across cross regions and/or cross accounts
- We can also attach transit gateways to the DX connections
- Transit Gateway Considerations:
- Supports transitive routing: single transit gateway with multiple attachments using route tables
- Can be used to create global networks with peering
- We can share transit gateways using AWS RAM
- Transit Gateways offer less complex architectures compared to VPC peering solutions
- Transit gateway is a hub-and-spoke architecture, it can connect to various types of networking objects within AWS
- Integration with Direct Connect:
- A Transit VIF is required which goes through a DX Gateway
- The DX Gateway can be attached to the Transit Gateway with a Transit Gateway Attachment
- 1 DX Gateway can be attached to 3 Transit Gateways
- Transit Gateway has a default route table which is populated from the attachments:
- For the VPCs we have the CIDR ranges of these VPCs
- For VPNs we have the routes learned via BGP
- For DX Gateways with the Transit Gateway Attachment we define the networks within the attachment configured at the DX Gateway side
- We can peer TGWs with other TGWs between regions. We can peer a TGW with up to 50 other TGWs, and these TGWs can also peer with other TGWs
- A TGW by default has one route table
- All attachments use this RT for routing decisions, by default all attachments propagate routes to this route table, exception peering attachments
- All attachments can route to all other attachments by default
- In case of peering attachments routes are not shared, we need to use static routes, similar to VPC peering (AWS recommends using unique ASNs for future enhancements for route advertisements)
- Resolution of public DNS to private addressing is not supported over inter-region peers
- Data transfer over peering connection is encrypted and is sent over AWS network
- We can peer up to 50 peering attachments per TGW, these can be in different regions, different AWS accounts
- By default:
- All attachments are associated with the same route table
- All attachments propagate to the same route table, all attachments are aware of any other attachments
- Attachments can only be associated with 1 route table, route tables can be associated to many attachments
- Attachments can propagate to many RTs, event to those they are not associated with
- If we would want to isolate networks:
- We create a route table and we configure all attachments to propagate to the route table
- We associate the route table with only the attachments we would want to communicate with each other
- We create another route and associate it to the attachment we don't want to communicate with each other. We configure other attachments to propagate to this route table