Skip to content

AWS Technologies Blog

Menu
  • Home
  • KB
  • Services
  • Resources
  • Posts
  • Find
    • Categories
    • Tags
  • About
Menu

AWS PrivateLink Endpoints

Posted on January 29, 2025January 29, 2025 by wpadmin

AWS PrivateLink enables private connectivity between Virtual Private Clouds (VPCs) and AWS services, third-party SaaS applications, or on-premises environments without exposing traffic to the public internet.

AWS provides the following types of VPC endpoints under PrivateLink:


1. Interface Endpoint

An Interface Endpoint allows you to send TCP or UDP traffic to an endpoint service using private IPs within your VPC. It resolves traffic using DNS and does not require an internet gateway, NAT gateway, or VPN connection.

Use Cases:

  • Private access to AWS services (e.g., S3, DynamoDB, Secrets Manager).
  • Secure communication with third-party SaaS applications.
  • Connecting to internal applications across AWS accounts and VPCs.

2. Gateway Load Balancer Endpoint

A Gateway Load Balancer Endpoint forwards traffic to a fleet of virtual appliances using private IP addresses. It is used for security and network inspection services. Traffic is routed through the endpoint using VPC route tables, and the Gateway Load Balancer distributes the traffic across virtual appliances.

Use Cases:

  • Deploying firewalls, intrusion detection systems (IDS), or security appliances.
  • Load balancing traffic to security appliances.
  • Scaling security services with demand.

3. Resource Endpoint

A Resource Endpoint provides private access to a resource shared from another VPC. This allows secure communication with services such as databases, EC2 instances, application endpoints, or private IP addresses in another VPC or an on-premises environment.

Use Cases:

  • Securely accessing a database or application in another VPC.
  • Private communication between on-premises environments and AWS.
  • Direct connectivity to private resources without requiring a load balancer.

4. Service Network Endpoint

A Service Network Endpoint provides access to a service network that was either created by you or shared with you. It allows private access to multiple resources and services associated with a service network using a single endpoint.

Use Cases:

  • Private and secure access to multiple services via a single endpoint.
  • Consolidated access to applications, databases, and microservices in a shared network.
  • Secure multi-account and multi-VPC service access.

Summary of AWS PrivateLink VPC Endpoint Types

Endpoint TypePurposeHow It WorksKey Use Cases
Interface EndpointPrivate access to AWS services & third-party applicationsUses private IPs and DNS resolutionAccess AWS services like S3, DynamoDB, and SaaS applications
Gateway Load Balancer EndpointLoad balancing & security traffic inspectionRoutes traffic to security appliances via VPC route tablesDeploy firewalls, intrusion detection systems, and network monitoring
Resource EndpointPrivate access to shared VPC resourcesDirectly connects to shared resources across VPCs or on-premisesAccess databases, EC2 instances, and applications in another VPC
Service Network EndpointCentralized access to a service networkSingle endpoint for multiple resourcesSecure, consolidated access to shared applications and services

  • Product List
  • Documentation

billing ciem containers cost cspm ebs ec2 ecs edge eks elb event Firewall fsx hybrid iam lambda NACL outpostd policies pop princing rds route53 s3 security serverless services SG siem storage vpc

  • Amazon FSx
  • aws
  • aws notes
  • billing
  • cloud
  • compute
  • containers
  • core
  • databases
  • development
  • ebs
  • ec2
  • ecs
  • edge
  • efs
  • eks
  • hybrid
  • iam
  • lambda
  • network
  • outposts
  • pricing
  • rds
  • route53
  • s3
  • security
  • serverless
  • services
  • storage
  • support
  • vpc
©2025 AWS Technologies Blog | Built using WordPress and Responsive Blogily theme by Superb