Networking & Content Delivery
Category: *Post Types
Securing your web applications and optimizing their performance with AWS Application Load Balancer
Are you interested in securing your web applications and optimizing their performance to maintain a seamless user experience and safeguard against cyber threats? Application Load Balancers (ALBs) provide a powerful feature for modifying request and response headers, allowing you to fine-tune your application’s behavior in numerous ways. From bolstering security with essential headers such as […]
Building Resilient IPv6 Network with SD-WANs and AWS Cloud WAN Connect with GRE
In this post we explore how you can use AWS Cloud WAN Connect with Generic Routing Encapsulation (GRE) Tunnels and Multi-protocol BGP (MP-BGP) for Equal Cost Multi-Path (ECMP) routing of IPv6 networks. We also cover route verification and failover testing best practices. Many Amazon Web Services (AWS) users are increasingly adopting IPv6 and Software-Defined Wide […]
How to use AWS WAF Bot Control for Targeted Bots signals and mitigate evasive bots with adaptive user experience
Introduction The AWS WAF Bot Control rule group includes rules for detecting and managing bot threats. These threats range from easily identified common bots through to coordinated targeted bots that evade detection by operating across multiple hosts. Like any other security controls, Amazon Web Services (AWS) WAF Bot Control for Targeted Bots rules can also […]
Enhancing Security with AWS Verified Access and Microsoft Entra ID Integration
Introduction Unlike traditional VPN-based approaches, AWS Verified Access evaluates multiple dimensions of access, including user identity, device posture, and application-specific policies. This means organizations can ensure that only fully authenticated and authorized users can access sensitive resources, regardless of their physical network location. The result is a more flexible, secure, and manageable approach to enterprise […]
Enhance your Security Posture and Reduce False Positives using Client JA3 Fingerprint and HTTP Header Order
Information security practitioners use internet protocol (IP) address-based security controls such as block lists and rate-based rules to block malicious traffic. However, blocking malicious traffic solely based on an IP address can unintentionally block legitimate users, resulting in false positives. This is because many users share an IP address behind a network address translation (NAT) […]
Exploring new subnet management capabilities of Network Load Balancer
Introduction Today Amazon Web Services (AWS) is enhancing subnet management capabilities of Network Load Balancer (NLB). NLBs were previously restricted to only adding subnets in new Availability Zones (AZs), and they now support full subnet management, including removal of subnets, matching the capabilities of Application Load Balancer (ALB). This enhancement offers organizations greater control over […]
Using Load Balancer Capacity Unit Reservation to prepare for sharp increases in traffic
Learn when and why LCU Reservation should be used and how to get started
Load Balancer Migration to AWS: Recommended Strategies and Best Practices
In today’s world, organizations are increasingly looking to migrate their on-premises infrastructure to the cloud to take advantage of scalability, cost-effectiveness, and agility offered by cloud. One critical component of many enterprise architectures is the load balancer, which distributes incoming traffic across multiple servers. If you’re considering migrating your on-premise hardware load balancers to AWS, it’s […]
Network latency concepts and best practices for a resilient architecture
Network incidents can occur at times that may impact latency in AWS Regions , Availability Zones (AZs), and individual infrastructure components, such as server hardware. Users can also experience more latency because of the introduction of network appliances in their traffic path. This post explains some of the best practices that allow you to identify […]
Enabling end-to-end encryption with Amazon VPC Lattice TLS Passthrough
Introduction In this post, we discuss VPC Lattice Transport Layer Security (TLS) Passthrough feature. We walk through how users designed workloads prior to this feature, what this feature provides, and best practices for implementing TLS passthrough communication using VPC Lattice. AWS announced the general availability of TLS Passthrough for VPC Lattice, which allows users to […]