

# SALZ network architecture
<a name="salz-net-arch-section"></a>

The following diagram depicts the AWS Managed Services (AMS) single-account landing zone (SALZ) VPC network layout and is an example of the highly available setup.

![\[AWS Managed Services network layout with VPC, subnets, and availability zones for high availability.\]](http://docs.aws.amazon.com/managedservices/latest/onboardingguide/images/AMS_VPC_No_Controllers_diagram.png)


![\[Network diagram showing ingress paths for different user types to AMS account resources via VPC and subnets.\]](http://docs.aws.amazon.com/managedservices/latest/onboardingguide/images/AMS_VPC_No_Controllers_legend.png)


AMS configures all aspects of networking for you based on our standard templates and your selected options provided during onboarding. A standard AWS network design is applied to your AWS account, and a virtual private cloud (VPC) is created for you and connected to AMS by either VPN or Direct Connect. Learn more about Direct Connect at [AWS Direct Connect](https://aws.amazon.com/directconnect/). Standard VPCs include the DMZ, shared services, and an application subnet. During the onboarding process, additional VPCs might be requested and created to match your needs (for example, customer divisions, partners). After onboarding, you're provided with a network diagram. an environment document that explains how your network has been set up.

**Note**  
To learn about default service limits and constraints for all active services, see the [AWS Service Limits](https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html) documentation.

Our network design is built around the Amazon ["Principle of Least Privilege"](https://en.wikipedia.org/wiki/Principle_of_least_privilege). In order to accomplish this, we route all traffic, inbound and outbound, through gateways, except traffic coming from a trusted network. The only trusted network is the one configured between your on-premises environment and the VPC through the use of a VPN and/or an AWS Direct Connect (DX). Access is granted through the use of bastion instances, thereby preventing direct access to any production resources. All of your applications and resources reside inside private subnets that are reachable through public load balancers. Public egress traffic flows through our forward proxies to the Internet Gateway and then to the Internet. Alternatively, the traffic can flow over your VPN or Direct Connect to your on-premises environment. 

# AMS Single-account landing zone shared services
<a name="salz-shared-services"></a>

Shared services subnets contain AMS Directory Services, the Management Host that automates provisioning and common tasks, antivirus (TrendMicro) management server, and internal bastion hosts:
+ AMS Directory Services = AD Domain Controller

  Creates an Active Directory in AMS accounts, creates the AMS domain, joins managed stacks to the domain on launch.
+ Management hosts = AMS Management Host (automate provisioning and common tasks)

  Act as an API endpoint to modify Directory Service, interact with Directory Service domain controllers.
+ Security services: Antivirus (TrendMicro) management server = EPS DSM \$1 EPS Relay

  Leverages Trend Micro™ Deep Security software (DSM), operates in a client-server model and has a back-end database, includes Deep Security managers, agents, and relays.
+ Internal bastion hosts = Customer bastions

  Special purpose servers designed to be the primary access point from the Internet and act as a proxy to your other Amazon EC2 instances.

![\[The Shared Services Subnet includes an active directory, an internal bastion, a management host, an EPS DSM, an EPS relay, and a controller.\]](http://docs.aws.amazon.com/managedservices/latest/onboardingguide/images/AMS_VPC_Shared_Services_diagram.png)
