1 Answers
To close this out, here’s Mohamed’s answer:
This link answer your question I think https://d0.awsstatic.com/aws-answers/Accessing_VPC_Endpoints_from_Remote_Networks.pdf
Yes, it answers most of it. Could you clarify for me the last point of the question, please? When using a public VIF, isn’t SSL for encryption in transit enough in terms of security? The public VIF doesn’t use the ISP provider as far as I understand as it uses the AWS backbone network. What’s the reason behind deciding to create all the complexity described in the document to access S3 through the VPC instead of just using a public VIF?
@Juan I assume the question is more related to cost wise
Can someone please answer this question? The link in the Mohamed’s answer isn’t working anymore
Hi Juan, routing from on-premise to vpc then s3 is not possible because of transitive limitation.
This link answer your question I think https://d0.awsstatic.com/aws-answers/Accessing_VPC_Endpoints_from_Remote_Networks.pdf
Thanks for the link, that cleared up my confusion
Yes, that was my understanding. That’s what I meant by creating a proxy within the VPC, some kind of farm of NGINX servers to forward requests to the VPC endpoint. Thanks for the link, I read sometime ago about this solution but the link to the document describing it was broken.