Example Deployment

This section demonstrates an example of NNM running on a virtual machine functioning as a NAT gateway instance within an Amazon Web Services Virtual Private Cloud (VPC).

In the examples used in the instructions for setting up a NAT gateway, the VPC NNM-Deployment-VPC was created, which has the network range 10.240.0.0/16. Additionally, the virtual machine instance NNM-Deployment-NAT was created in the NNM-Deployment-Public subnet to function as the NAT gateway. In this example, three other virtual machine instances were created within the NNM-Deployment-Private subnet. None of the virtual machine instances in NNM-Deployment-Private are assigned an external IP address and all outgoing traffic is routed through NNM-Deployment-NAT.

In this example, there are four virtual machine instances within NNM-Deployment-VPC:

VM Instance Name Internal IP Has External IP?
NNM-Deployment-NAT 10.240.0.248 Yes
example-instance 10.240.1.33 No
example-instance2 10.240.1.67 No
example-instance3 10.240.1.31 No

NNM is running on NNM-Deployment-NAT and has the following configuration:

Configuration Parameter Value
Monitored Network Interfaces eth0
Monitored Network IP Addresses and Ranges 10.240.0.0/16

With this configuration, NNM will monitor traffic

  • from the internal virtual machine instances to the Internet,
  • between NNM-Deployment-NAT and the internal virtual machine instances,
  • from the Internet to internal virtual machine instances if you have enabled port forwarding on the NAT gateway to make them Internet accessible,
  • and between NNM-Deployment-NAT and the Internet.

    Note: Due to the design of the hypervisor used by Amazon for running all virtual instances, traffic not addressed to a virtual instance can't be sniffed by the virtual instance. As a result, NNM can't monitor traffic between other virtual instances.