Site To Cloud Connection

Site-to-Cloud Connection

  • Site-to-cloud connectivity enables organizations to extend their on-premises networks to cloud service providers (CSPs) like AWS, Azure, or Google Cloud
  • Creates hybrid cloud architectures where workloads can span both physical data centers and cloud environments
  • Provides consistent network policies, security, and management across hybrid infrastructure

Connection Types

VPN-Based Connections:

  • IPSec VPN tunnels establish encrypted connections over public internet
  • Site-to-Site VPN connects entire networks (not individual users)
  • Cost-effective but dependent on internet quality and bandwidth
  • Typical throughput: 10 Mbps to 1 Gbps depending on internet connection

Dedicated Private Connections:

  • Direct physical circuits bypass public internet entirely
  • AWS Direct Connect, Azure ExpressRoute, Google Cloud Interconnect
  • Provides predictable bandwidth, lower latency, and enhanced security
  • Typical speeds: 50 Mbps to 100 Gbps with SLA guarantees

Software-Defined WAN (SD-WAN):

  • Orchestrates multiple connection types (MPLS, broadband, LTE)
  • Application-aware routing optimizes traffic paths based on requirements
  • Centralized policy management across all sites and cloud connections

Architecture Components

Component Purpose Example Technologies
Edge Router/Firewall On-premises termination point Cisco ASR, Fortinet, Palo Alto
Cloud Gateway CSP-side connection endpoint AWS VGW, Azure VPN Gateway
Transit Networks Interconnect multiple VPCs/VNets AWS Transit Gateway, Azure vWAN
Routing Protocols Dynamic route exchange BGP (preferred), OSPF, EIGRP

BGP in Cloud Connectivity

  • Border Gateway Protocol (BGP) is the standard for cloud connections
  • Enables dynamic route advertisement between on-premises and cloud networks
  • AS Numbers (ASN) identify routing domains - CSPs have public ASNs, enterprises typically use private ASNs (64512-65534)
  • Route filtering prevents unwanted route advertisements (security concern)

BGP Configuration Example:

  • Customer ASN: 65001 (private)
  • AWS ASN: 7224 (public)
  • Advertised prefixes: 192.168.0.0/16 (on-premises) ↔ 10.0.0.0/16 (AWS VPC)

Security Considerations

  • Encryption in transit protects data crossing public networks (IPsec, TLS)
  • Network segmentation isolates different workload types (DMZ, internal, management)
  • Identity federation extends on-premises authentication to cloud resources
  • Firewall rules must account for cloud-specific traffic patterns (east-west traffic)

Common Security Zones:

  • Public subnet: Internet-facing resources (load balancers, NAT gateways)
  • Private subnet: Application servers, databases
  • Management subnet: Administrative access, monitoring tools

Quality of Service (QoS)

  • Traffic classification ensures critical applications receive priority
  • Voice/video typically requires <150ms latency, <1% packet loss
  • Cloud backup traffic can use lower priority classes
  • DSCP markings preserve QoS across network boundaries when supported
Traffic Type DSCP Marking Bandwidth Allocation
Voice EF (46) Guaranteed 64 Kbps per call
Video AF41 (34) Up to 50% of link capacity
Business Critical AF31 (26) 30% minimum guarantee
Best Effort Default (0) Remaining bandwidth

Notes

  • Bandwidth planning should account for 20-30% overhead for protocol encapsulation and burst traffic
  • Multiple connection types provide redundancy - primary direct connect with VPN backup is common
  • Cloud egress charges can be significant - design data flows to minimize unnecessary cloud-to-internet traffic
  • Consider latency requirements: direct connections typically provide 10-50ms lower latency than VPN over internet
  • Route summarization reduces routing table size and improves convergence times
  • Test failover scenarios regularly - cloud connections may fail differently than traditional WAN links
  • Monitor connection utilization - cloud providers often charge for committed bandwidth whether used or not
  • DNS resolution strategy impacts performance - consider split-brain DNS or cloud-hosted DNS for hybrid environments