
Citadel Cloud Management
Hybrid Cloud VPN Architecture Blueprint
Architecture BlueprintsCreated by Kenny Ogunlowo
Product Description
The Problem This Blueprint Solves
Your organization runs workloads both on-premises and in AWS, but the connection between them is a single IPsec VPN tunnel that drops during peak traffic, routes all inter-VPC traffic through on-premises firewalls adding 40ms latency, and has no redundancy — a tunnel failure means on-premises applications cannot reach cloud databases for 15-30 minutes until the tunnel re-establishes. Network engineers manage 47 individual VPC peering connections manually.
This blueprint is the hybrid network architecture I built for a manufacturing company connecting 6 on-premises data centers to 23 AWS VPCs, handling 12Gbps of sustained cross-environment traffic with automatic failover in under 60 seconds.
What You Get
- Architecture diagrams — Transit Gateway topology, Direct Connect with VPN backup, route propagation model, DNS resolution flow (Route 53 Resolver), and segmentation with route tables (Draw.io)
- Terraform modules — Transit Gateway with multiple route tables, VPN attachments with BGP, Direct Connect Gateway association, Route 53 Resolver endpoints (inbound + outbound), and Network Firewall for east-west inspection
- IP address management plan — CIDR allocation strategy across on-premises and cloud, supernet design for route summarization, and IP conflict detection methodology
- Failover runbook — Direct Connect failure detection, VPN failover procedure, BGP route convergence timing, and DNS failover for hybrid workloads
Key Architecture Decisions
- Transit Gateway over VPC Peering mesh — 23 VPCs require 253 peering connections for full mesh. Transit Gateway provides hub-and-spoke connectivity where every VPC connects once. Adding a new VPC takes one attachment instead of 22 peering connections. Route table segmentation replaces security group sprawl for inter-VPC traffic control.
- Direct Connect with VPN backup over dual VPN — Direct Connect provides consistent latency (5-10ms to the nearest PoP) and 1-10Gbps dedicated bandwidth. VPN over the internet has variable latency and throughput. The VPN backup activates automatically via BGP failover when Direct Connect health checks fail, providing resilience without the cost of a second Direct Connect circuit.
- Route 53 Resolver over custom DNS forwarders — Hybrid DNS resolution (cloud resources resolving on-premises names and vice versa) traditionally requires running BIND or Unbound instances. Route 53 Resolver endpoints handle conditional forwarding natively, scaling automatically and eliminating DNS server management overhead.
- Network Firewall for east-west traffic inspection — Transit Gateway route tables can segment traffic, but they cannot inspect it. AWS Network Firewall with Suricata-compatible rules inspects inter-VPC and VPC-to-on-premises traffic for threat detection and compliance logging without deploying third-party virtual appliances.
Who This Blueprint Is For
- Network Engineers designing hybrid connectivity between on-premises and AWS for the first time
- Cloud Architects consolidating ad-hoc VPN connections into a structured network architecture
- Security Engineers who need traffic inspection and segmentation across hybrid environments
- IT Directors managing network costs across multiple data centers and cloud regions
Your First 48 Hours
Deploy the Transit Gateway with two VPC attachments and one VPN attachment using the Terraform modules. Verify that instances in VPC-A can reach instances in VPC-B through Transit Gateway. Test the VPN connection from a simulated on-premises environment (use a second VPC acting as on-premises). On day two, configure Route 53 Resolver endpoints and set up conditional forwarding for your on-premises DNS domain. Verify that cloud instances can resolve on-premises hostnames and vice versa.
Limitations and Trade-offs
Transit Gateway data processing charges ($0.02/GB) apply to all traffic flowing through it — at 10TB/month inter-VPC, this adds $200/month on top of VPC peering's free inter-VPC transfer. Direct Connect lead time is 2-8 weeks for new circuits; plan provisioning well ahead of need. Network Firewall costs $0.395/hour per endpoint plus $0.065/GB processed — deploy in inspection VPCs, not every VPC, to control costs. BGP convergence during Direct Connect failover to VPN takes 30-90 seconds depending on BGP timer configuration; the blueprint tunes timers for sub-60-second failover.