AWSANS-C01

AWS Advanced Networking Specialty: Hybrid Connectivity, Routing, and Network Security

The AWS Advanced Networking Specialty (ANS-C01) is the deepest AWS networking credential. It tests routing protocol knowledge (BGP), hybrid connectivity design (Direct Connect, VPN), complex VPC architectures, DNS at enterprise scale, and network security automation. This exam requires genuine networking engineering experience — it is not passable by cloud generalists without hands-on network design background.

12 min
4 sections · 10 exam key points

VPC Advanced Architecture

Advanced VPC design for ANS-C01. Shared VPC: centralise networking in a host account — service accounts attach subnets from the host VPC. Eliminates per-account VPC sprawl, centralises security group and routing management. VPC peering constraints: non-transitive, no overlapping CIDRs, no edge-to-edge routing (cannot use a peered VPC as a gateway to the internet, Direct Connect, or VPN). Transit Gateway (TGW): hub-and-spoke model — each VPC or VPN attaches as a TGW attachment, TGW route tables control inter-attachment routing. Route table isolation: segment prod VPCs from dev VPCs by using separate TGW route tables with selective route propagation. TGW Network Manager: global view of TGW topology including on-premises SD-WAN connections. AWS PrivateLink (VPC Endpoint Services): expose your service to other VPCs or accounts without VPC peering — service provider deploys NLB, creates endpoint service, consumers create interface VPC endpoints. Traffic stays on AWS backbone, never crosses internet. Gateway Load Balancer (GWLB): transparent insertion of network virtual appliances (firewalls, IDS) into traffic path — GWLB distributes traffic to appliance fleet, traffic is returned to original path after inspection. GENEVE protocol encapsulation preserves source/destination for stateful inspection.

BGP and Hybrid Connectivity

BGP is the routing protocol for all AWS hybrid connectivity — the ANS exam tests it at depth. BGP attributes for path selection (in order of preference): Weight (Cisco-proprietary, local to router, highest preferred), LOCAL_PREF (within AS, highest preferred — control outbound path from on-premises), AS_PATH (series of AS numbers, shorter preferred — control inbound to on-premises), MED (Multi-Exit Discriminator, hint to neighbour, lower preferred). Direct Connect (DX): private connection — Public VIF (access AWS public endpoints: S3, SQS), Private VIF (access VPC via VGW), Transit VIF (access TGW). DX Gateway: associate one DX with multiple VGWs in different regions. Resilient DX: two DX connections from different DX locations (different physical paths to AWS), add VPN as last-resort backup. Site-to-Site VPN: IKEv2 preferred, BGP routing via VGW or TGW (dynamic — routes exchanged automatically), static routing (no BGP — specify prefixes manually). VPN ECMP on TGW: multiple VPN tunnels with ECMP (Equal Cost Multi-Path) — aggregate bandwidth across tunnels. Accelerated VPN: uses Global Accelerator to route VPN traffic through AWS global network instead of public internet — lower latency for geographically distant sites.

Route 53 Advanced and DNS Architecture

Enterprise DNS with Route 53 for ANS-C01. Routing policies: Simple (one record, one or more values), Weighted (A/B testing, blue/green — split by percentage), Latency (route to lowest latency region — based on AWS latency data), Failover (primary/secondary with health check), Geolocation (route by country/continent — compliance, localisation), Geoproximity (route based on geographic distance with bias dial — Traffic Flow required), Multi-value (up to 8 healthy records returned — basic load distribution with health checks). Health checks: endpoint health checks (HTTP/HTTPS/TCP, interval 10-30 seconds, evaluated by Route 53 health checkers globally), calculated health checks (AND/OR logic across multiple health checks), CloudWatch alarm health checks (alarm state determines health). Route 53 Resolver: hybrid DNS resolution — Resolver Inbound Endpoint (on-premises DNS forwards to Route 53 — resolves private hosted zones from on-premises), Resolver Outbound Endpoint (VPC DNS forwards to on-premises DNS servers — resolves corporate domains from VPC). DNS Firewall: block or allow queries to specific domains — protects against DNS tunnelling and C2 domain queries.

Network Security and Automation

ANS-C01 network security at depth. Security groups vs NACLs: security groups are stateful (return traffic automatically allowed), instance-attached, allow-only (no explicit deny); NACLs are stateless (must explicitly allow both directions), subnet-attached, both allow and deny. AWS Network Firewall: stateful managed firewall within the VPC using Suricata-compatible IPS rules — deploy in a dedicated inspection VPC, route traffic through Gateway Load Balancer or direct route to firewall endpoint. Traffic Mirroring: copy network traffic from ENI to monitoring appliance — packet-level visibility for forensics and IDS. AWS Firewall Manager: centrally manage WAF, Shield Advanced, Security Groups, and Network Firewall policies across accounts in AWS Organizations — enforce minimum security rules organisation-wide. Network automation: VPC Flow Logs analysis with Athena (query terabytes of flow data with SQL), Route 53 resolver query logs (visibility into all DNS queries from VPC), CloudWatch Network Monitor (active/passive monitoring of hybrid network latency and packet loss — BGP prefix monitoring).

Key exam facts — ANS-C01

  • TGW route table isolation: separate prod and dev VPC routes — attachments propagate to specific route tables only
  • GWLB + GENEVE: transparent insertion of network appliances into traffic path — stateful inspection preserved
  • BGP path selection order: Weight > LOCAL_PREF > AS_PATH length > MED
  • DX Public VIF: access AWS public endpoints; Private VIF: access VPC resources; Transit VIF: access TGW
  • DX Gateway: connect one DX to multiple VPCs across different regions from a single connection
  • Route 53 Geoproximity: bias dial adjusts routing toward/away from a region — Traffic Flow required
  • Resolver Inbound Endpoint: on-premises DNS can forward queries into Route 53 private hosted zones
  • VPN ECMP on TGW: multiple VPN tunnels aggregate bandwidth — active/active, not active/passive
  • AWS Network Firewall uses Suricata-compatible rules — stateful IPS within the VPC
  • Accelerated VPN: routes VPN traffic via AWS Global Accelerator network — lower latency for distant sites

Common exam traps

VPC peering is sufficient for large multi-account network architectures

VPC peering is non-transitive and does not scale — connecting N VPCs requires N(N-1)/2 peering connections. Transit Gateway provides a hub-and-spoke model that scales to thousands of VPCs with centralised routing control. Use TGW for anything beyond a handful of VPC connections.

NACLs provide stronger security than security groups

Neither is strictly stronger — they are complementary layers. Security groups are stateful and evaluate all rules simultaneously; NACLs are stateless and evaluated in numbered order. Security groups are the primary control at the instance level; NACLs provide an additional subnet-level defence and allow explicit deny rules.

Practice this topic

Test yourself on AWS Networking Specialty

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics