Requirements and implementation options for outbound and inbound endpoints

Task Statement 2.3: Implement complex hybrid and multi-account DNS architectures.

📘AWS Certified Advanced Networking – Specialty


1. What Are Route 53 Resolver Endpoints?

In AWS, DNS resolution inside a VPC is handled by Route 53 Resolver.

However, by default:

  • VPCs can resolve public domains
  • VPCs can resolve private hosted zones (PHZs) attached to them

But they cannot directly communicate with external DNS systems (such as on-premises DNS servers or DNS in other environments).

👉 To solve this, AWS provides Resolver Endpoints:

  • Inbound Endpoints
  • Outbound Endpoints

These endpoints allow DNS queries to flow between AWS and external networks.


2. Inbound vs Outbound Endpoints (Core Concept)

Inbound Endpoint

  • Allows external systems → query DNS inside AWS
  • Example: On-premises → Route 53 Private Hosted Zone

Outbound Endpoint

  • Allows AWS resources → query external DNS
  • Example: EC2 → On-premises DNS server

3. Inbound Resolver Endpoint (Detailed)

3.1 Purpose

Inbound endpoints allow DNS queries coming from outside AWS to be resolved by Route 53.

👉 Used when:

  • External systems need to resolve AWS private domain names
  • Accessing private hosted zones from outside AWS

3.2 How It Works

  1. You create an Inbound Endpoint in a VPC
  2. AWS assigns private IP addresses (ENIs in subnets)
  3. External DNS servers send queries to these IPs
  4. Route 53 Resolver answers using:
    • Private Hosted Zones
    • VPC DNS

3.3 Key Requirements

1. Network Connectivity

  • Required:
    • VPN (Site-to-Site VPN)
    • AWS Direct Connect

👉 Without connectivity, inbound queries cannot reach AWS


2. Security Groups

  • Must allow:
    • UDP 53 (DNS)
    • TCP 53 (DNS fallback)

3. IP Address Planning

  • You must specify:
    • At least 2 IP addresses
    • In different Availability Zones

👉 Ensures high availability


4. DNS Configuration (External Side)

  • On-prem DNS must:
    • Use conditional forwarding
    • Forward specific domains to inbound endpoint IPs

3.4 Common Use Case (IT Example)

  • A company has:
    • Internal DNS server in data center
    • AWS private hosted zone: internal.aws.local

👉 Configuration:

  • On-prem DNS forwards internal.aws.local → inbound endpoint
  • Route 53 resolves and returns private IPs

3.5 Exam Tips (Inbound)

  • Used for external → AWS DNS resolution
  • Requires:
    • Hybrid connectivity (VPN/Direct Connect)
    • Security group rules for port 53
  • Uses Private Hosted Zones
  • Needs multi-AZ IPs

4. Outbound Resolver Endpoint (Detailed)

4.1 Purpose

Outbound endpoints allow AWS resources to resolve DNS names outside AWS.

👉 Used when:

  • AWS needs to resolve:
    • On-premises domain names
    • External private DNS systems

4.2 How It Works

  1. Create Outbound Endpoint in a VPC
  2. Define Resolver Rules
  3. Route 53 forwards queries to:
    • External DNS servers

4.3 Key Requirements

1. Network Connectivity

  • Required:
    • VPN or Direct Connect

2. Resolver Rules (Very Important)

You must define:

  • Domain name to forward
  • Target DNS server IPs

👉 Types of rules:

  • Forwarding rules
  • System rules (default AWS)

4.4 Rule Types

a) Forwarding Rule

  • Sends DNS queries for a domain to external DNS

Example:

  • Domain: corp.local
  • Forward to: on-prem DNS

b) System Rule

  • Default AWS DNS resolution
  • No forwarding required

4.5 Rule Sharing (Multi-Account)

  • Rules can be shared using AWS RAM
  • Allows centralized DNS architecture

4.6 Security Requirements

  • Security group must allow:
    • Outbound UDP/TCP 53

4.7 High Availability

  • Deploy endpoints in:
    • Multiple subnets
    • Different AZs

4.8 Common Use Case (IT Example)

  • EC2 instance needs to resolve:
    • db.corp.local (on-prem database)

👉 Flow:

  1. EC2 sends query
  2. Route 53 checks rules
  3. Forward rule matches
  4. Query sent via outbound endpoint to on-prem DNS
  5. Response returned

4.9 Exam Tips (Outbound)

  • Used for AWS → external DNS resolution
  • Requires:
    • Resolver rules
    • Target DNS IPs
  • Supports:
    • Conditional forwarding
  • Can be shared across accounts

5. Key Differences (Very Important for Exam)

FeatureInbound EndpointOutbound Endpoint
DirectionExternal → AWSAWS → External
PurposeResolve AWS private domains externallyResolve external domains from AWS
Requires RulesNoYes (forwarding rules)
Uses PHZYesNo (for forwarding)
DNS FlowExternal DNS → Route 53Route 53 → External DNS

6. Architecture Patterns (Exam Critical)

6.1 Hybrid DNS Architecture

Both endpoints used together:

  • Inbound → resolve AWS domains from on-prem
  • Outbound → resolve on-prem domains from AWS

👉 This enables bi-directional DNS resolution


6.2 Centralized DNS (Multi-Account)

  • One VPC hosts:
    • Inbound endpoint
    • Outbound endpoint
  • Shared via:
    • AWS RAM

👉 Other accounts:

  • Use shared rules/endpoints

6.3 Split-Horizon DNS

  • Same domain name:
    • Different answers inside/outside AWS

7. Limitations and Considerations

7.1 Cost

  • Charged per:
    • Endpoint hour
    • IP address

7.2 Scaling

  • Each endpoint has:
    • Query per second (QPS) limits

7.3 No Internet Access

  • Endpoints are:
    • Private only
  • Not exposed publicly

7.4 Logging

  • Use:
    • Route 53 Resolver query logging

7.5 Failover

  • Use:
    • Multiple IPs across AZs
  • External DNS should:
    • Retry queries

8. Step-by-Step Implementation (Simplified)

8.1 Inbound Endpoint

  1. Create endpoint in VPC
  2. Choose subnets (multi-AZ)
  3. Assign IP addresses
  4. Configure security group (port 53)
  5. Update on-prem DNS:
    • Add conditional forwarder

8.2 Outbound Endpoint

  1. Create outbound endpoint
  2. Select subnets and IPs
  3. Configure security group
  4. Create resolver rule:
    • Domain name
    • Target DNS IP
  5. Associate rule with VPC

9. Common Exam Scenarios

Scenario 1

  • On-prem needs to resolve AWS private domain
    ✅ Use Inbound Endpoint

Scenario 2

  • EC2 needs to resolve on-prem domain
    ✅ Use Outbound Endpoint + Forwarding Rule

Scenario 3

  • Multi-account DNS centralization
    ✅ Use:
  • Shared outbound rules (AWS RAM)
  • Central DNS VPC

Scenario 4

  • Full hybrid DNS
    ✅ Use:
  • Both inbound and outbound endpoints

10. Final Exam Summary (Must Remember)

  • Inbound endpoint
    → External systems resolve AWS private DNS
  • Outbound endpoint
    → AWS resolves external DNS
  • Forwarding rules
    → Required for outbound only
  • Connectivity (VPN/DC)
    → Required for both
  • High availability
    → Multi-AZ endpoints required
  • Security
    → Allow TCP/UDP port 53
Buy Me a Coffee