

# Connecting Direct Connect and/or VPN to account VPCs


You can also directly connect your VPCs to Direct Connect or VPN. The traffic flows directly from the VPCs to Direct Connect or VPN without traversing through the transit gateway.

**Note**  
The shared services VPC and application account VPCs have to be connected to a Direct Connect or VPN connection to establish private connectivity.

# Direct Connect setup in AMS
Direct Connect setup

Set up a Direct Connect to communicate between your AMS-managed VPC and your internal network.

**Note**  
For information about using Direct Connect with AWS services, see [Getting Started at an Direct Connect Location](https://docs.aws.amazon.com/directconnect/latest/UserGuide/getstarted.html).

To set up a Direct Connect connection, complete the following steps:

1. Sign up for Amazon Web Services (AWS)

1. Submit an Direct Connect connection request.

1. Complete the Cross Connect.

1. (Optional) Configure redundant connections with Direct Connect.

1. Performed by AMS: Create a virtual interface.

1. Performed by AMS: Download router configuration.

1. Verify your virtual interface.

# VPN setup


The basic steps that AMS follows for setting up a VPN to communicate between your AMS-managed VPC and your internal network.

**Note**  
To gain overall understanding about using a VPN with AWS services, see [What is AWS Site-to-Site VPN](https://docs.aws.amazon.com/vpn/latest/s2svpn/VPC_VPN.html) and [Your Customer Gateway](https://docs.aws.amazon.com/vpc/latest/adminguide/Introduction.html) (your VPN appliance).

We follow the AWS VPN User Guide [Getting Started](https://docs.aws.amazon.com/vpn/latest/s2svpn/SetUpVPNConnections.html) and [Testing the Site-to-Site VPN Connection](https://docs.aws.amazon.com/vpn/latest/s2svpn/HowToTestEndToEnd_Linux.html) sections to complete the following steps:

1. In your AWS VPC, Create a Customer Gateway.

1. In your AWS VPC, Create a Virtual Private Gateway.

1. In your AWS VPC, Enable Route Propagation in Your Route Table.

1. In your AWS VPC, Update Your Security Group to Enable Inbound SSH, RDP, and ICMP Access.

1. In your internal Network, Create a VPN Connection and Configure the Customer Gateway.

1. Test VPN connectivity between the VPC and your internal network.