Create and Configure a New VPC
This topic describes how to use the VPC wizard to create a VPC with a public subnet and one private subnet. As part of this process, the wizard creates an internet gateway and a NAT gateway. It also creates a custom route table associated with the public subnet and updates the main route table associated with the private subnet. The NAT gateway is automatically created in the public subnet of your VPC.
After you use the wizard to create the initial VPC configuration, you'll add a second private subnet. For more information about this configuration, see VPC with Public and Private Subnets (NAT) in the Amazon VPC User Guide.
Note
If you already have a VPC, complete the steps in Add a NAT Gateway to an Existing VPC instead.
Contents
Step 1: Allocate an Elastic IP Address
Before you create your VPC, you must allocate an Elastic IP address in your WorkSpaces Region. You must first allocate an Elastic IP address for use in your VPC, and then associate it with your NAT gateway. For more information, see Elastic IP Addresses in the Amazon VPC User Guide.
Note
Charges may apply to Elastic IP addresses that you use. For more information, see Elastic IP Addresses on the Amazon EC2 pricing page.
Complete the following steps if you don't already have an Elastic IP address. If you want to use an existing Elastic IP address, verify that it's not currently associated with another instance or network interface.
To allocate an Elastic IP address
-
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
. -
In the navigation pane, under Network & Security, choose Elastic IPs.
-
Choose Allocate New Address, and then choose Allocate.
-
Note the Elastic IP address.
-
In the upper right of the Elastic IPs pane, click the X icon to close the pane.
Step 2: Create a New VPC
Complete the following steps to create a new VPC with a public subnet and one private subnet.
To create a new VPC
-
Open the Amazon VPC console at https://console.aws.amazon.com/vpc/.
-
In the navigation pane, choose VPC Dashboard.
-
Choose Launch VPC Wizard.
-
In Step 1: Select a VPC Configuration, choose VPC with Public and Private Subnets, and then choose Select.
-
In Step 2: VPC with Public and Private Subnets, configure the VPC as follows:
-
For IPv4 CIDR block, specify an IPv4 CIDR block for the VPC.
-
For IPv6 CIDR block, keep the default value, No IPv6 CIDR Block.
-
For VPC name, type a unique name for the VPC.
-
-
Configure the public subnet as follows:
-
For Public subnet's IPv4 CIDR, specify the CIDR block for the subnet.
-
For Availability Zone, keep the default value, No Preference.
-
For Public subnet name, type a name for the subnet; for example,
WorkSpaces Public Subnet
.
-
-
Configure the first private subnet as follows:
-
For Private subnet's IPv4 CIDR, specify the CIDR block for the subnet. Make a note of the value that you specify.
-
For Availability Zone, select a specific zone and make a note of the zone that you select.
-
For Private subnet name, type a name for the subnet; for example,
WorkSpaces Private Subnet1
. -
For the remaining fields, where applicable, keep the default values.
-
-
For Elastic IP Allocation ID, click in the text box and select the value that corresponds to the Elastic IP address that you created. This address is assigned to the NAT gateway. If you don't have an Elastic IP address, create one by using the Amazon VPC console at https://console.aws.amazon.com/vpc/.
-
For Service endpoints, if an Amazon S3 endpoint is required for your environment, specify one. An S3 endpoint is required to provide users with access to home folders or to enable application settings persistence for your users in a private network.
To specify an Amazon S3 endpoint, do the following:
-
Choose Add Endpoint.
-
For Service, select the entry in the list that ends with "s3" (the
com.amazonaws.
region
.s3
entry that corresponds to the Region in which the VPC is being created). -
For Subnet, choose Private subnet.
-
For Policy, keep the default value, Full Access.
-
-
For Enable DNS hostnames, keep the default value, Yes.
-
For Hardware tenancy, keep the default value, Default.
-
Choose Create VPC.
-
Note that it takes several minutes to set up your VPC. After the VPC is created, choose OK.
Step 3: Add a Second Private Subnet
In the previous step (Step 2: Create a New VPC), you created a VPC with one public subnet and one private subnet. Perform the following steps to add a second private subnet. We recommend that you add a second private subnet in a different Availability Zone than your first private subnet.
-
In the navigation pane, choose Subnets.
-
Select the first private subnet that you created in the previous step. On the Description tab, below the list of subnets, make a note of the Availability Zone for this subnet.
-
On the upper left of the subnets pane, choose Create Subnet.
-
For Name tag, type a name for the private subnet; for example,
WorkSpaces Private Subnet2
. -
For VPC, select the VPC that you created in the previous step.
-
For Availability Zone, select an Availability Zone other than the one you are using for your first private subnet. Selecting a different Availability Zone increases fault tolerance and helps prevent insufficient capacity errors.
-
For IPv4 CIDR block, specify a unique CIDR block range for the new subnet. For example, if your first private subnet has an IPv4 CIDR block range of
10.0.1.0/24
, you could specify a CIDR block range of10.0.2.0/24
for the new private subnet. -
Choose Create.
-
After your subnet is created, choose Close.
Step 4: Verify and Name Your Subnet Route Tables
After you've created and configured your VPC, complete the following steps to specify a name for your route tables, and to verify that:
-
The route table associated with the subnet in which your NAT gateway resides includes a route that points internet traffic to an internet gateway. This ensures that your NAT gateway can access the internet.
-
The route tables associated with your private subnets are configured to point internet traffic to the NAT gateway. This enables the streaming instances in your private subnets to communicate with the internet.
-
In the navigation pane, choose Subnets, and select the public subnet that you created; for example,
WorkSpaces Public Subnet
.-
On the Route Table tab, choose the ID of the route table; for example,
rtb-12345678
. -
Select the route table. Under Name, choose the edit icon (the pencil), and type a name (for example,
workspaces-public-routetable
), and then select the check mark to save the name. -
With the public route table still selected, on the Routes tab, verify that there is one route for local traffic and another route that sends all other traffic to the internet gateway for the VPC. The following table describes these two routes:
Destination Target Description Public subnet IPv4 CIDR Block (for example, 10.0.0/20) Local All traffic from the resources destined for IPv4 addresses within the public subnet IPv4 CIDR block is routed locally within the VPC. Traffic destined to all other IPv4 addresses (for example, 0.0.0.0/0 Outbound ( igw-
ID
)Traffic destined for all other IPv4 addresses is routed to the internet gateway (identified by igw-
ID
) that was created by the VPC Wizard.
-
-
In the navigation pane, choose Subnets, and select the first private subnet that you created (for example,
WorkSpaces Private Subnet1
).-
On the Route Table tab, choose the ID of the route table.
-
Select the route table. Under Name, choose the edit icon (the pencil), and enter a name (for example,
workspaces-private-routetable
), and then choose the check mark to save the name. -
On the Routes tab, verify that the route table includes the following routes:
Destination Target Description Public subnet IPv4 CIDR Block (for example, 10.0.0/20) Local All traffic from the resources destined for IPv4 addresses within the public subnet IPv4 CIDR block is routed locally within the VPC. Traffic destined to all other IPv4 addresses (for example, 0.0.0.0/0 Outbound ( nat-
ID
)Traffic destined for all other IPv4 addresses is routed to the NAT gateway (identified by nat-
ID
).Traffic destined for S3 buckets (applicable if you specified an S3 endpoint)
[
pl-
ID
(com.amazonaws.
region
.s3
)]Storage ( vpce-
ID
)Traffic destined for S3 buckets is routed to the S3 endpoint (identified by vpce-
ID
).
-
-
In the navigation pane, choose Subnets, and select the second private subnet that you created (for example,
WorkSpaces Private Subnet2
). -
On the Route Table tab, verify that the route table is the private route table (for example,
workspaces-private-routetable
). If the route table is different, choose Edit and select this route table.
Next Steps
To enable your WorkSpaces in WorkSpaces Pools to access the internet, complete the steps in Enable Internet Access for WorkSpaces Pools.