This project demonstrates a complete AWS infrastructure setup using Amazon VPC, EC2, RDS (MySQL), Internet Gateway, NAT Gateway, Route Tables, and Security Groups.
The goal was to deploy a secure, scalable web application architecture following AWS best practices.
- Custom VPC with public and private subnets
- Internet Gateway for public access
- NAT Gateway for private subnet outbound access
- EC2 instance hosting a web application
- Amazon RDS (MySQL) in private subnet
- Secure networking using route tables and security groups
- Amazon VPC
- Amazon EC2
- Amazon RDS (MySQL)
- Internet Gateway
- NAT Gateway
- Route Tables
- Security Groups
- AWS CloudShell
Created a custom VPC with CIDR block 10.0.0.0/16.
Enabled DNS resolution and DNS hostnames to support public resources.
Created four subnets across two Availability Zones.
- Public-1A →
10.0.1.0/24 - Public-1B →
10.0.2.0/24 - Private-1A →
10.0.3.0/24 - Private-1B →
10.0.4.0/24
Confirmed all subnets were created successfully.
Created a custom route table for private subnets.
Added routes for internal traffic and internet access.
Verified main and private route tables.
Associated private subnets with the private route table.
Created an Internet Gateway and attached it to the VPC.
Created NAT Gateway in public subnet for outbound internet access from private subnets.
Updated private route table to route traffic through NAT Gateway.
Configured inbound and outbound rules for EC2 access.
Launched an EC2 instance using Amazon Linux AMI.
Configured RDS MySQL database with free-tier eligible settings.
Connected to EC2 securely using SSH.
Downloaded application files and configured MySQL database.
Successfully accessed the deployed web application.
- Secure AWS network architecture implemented
- EC2 connected to RDS using private networking
- Web application successfully deployed and tested
- Followed AWS best practices for security and availability
MD Naimur Rashid
University of Frontier Technology





























