The public internet is a best-effort, unpredictable mesh. For enterprise workloads—high-frequency trading, real-time database replication, or AI model training—jitter is the enemy of efficiency. AWS Direct Connect (DX) provides a private, physical path into the AWS global backbone, reducing hop counts and ensuring consistent latency profiles.

1. Layer 1: The Colocation Physical Hand-off.

Direct Connect begins at a **Direct Connect Location** (a carrier-neutral data center like Equinix, Digital Realty, or CoreSite). AWS maintains a fleet of routers inside these facilities.

The Physical Connection Chain

A. The Cross-Connect

A literal Single-Mode Fiber (SMF) patch cable running from your rack in the DC to the AWS patch panel. Usually LC/UPC termination.

B. The Port Speed

AWS offers 1G, 10G, and 100G native ports. LAG (Link Aggregation) allows bonding up to 4 ports for a 400G aggregate pipe.

C. The Demarcation

The physical point where responsibility shifts from the DC operator (Cross-Connect) to AWS (The DX Device).

The "Last Mile" is often handled by a **Direct Connect Partner**. In this model, the partner owns the physical connection to AWS and carves out **Hosted Connections** for users. While simpler, Hosted Connections lack the ability to use native LAG or MACsec encryption.

2. Layer 2: 802.1q VLAN Segmentation.

Once the physical light is green, the single fiber is partitioned into multiple logical pipes called **Virtual Interfaces (VIFs)**. Each VIF is assigned a unique VLAN ID (IEEE 802.1q).

Private VIF

Direct access to a single VPC via a VGW (Virtual Private Gateway). Limited to local region resources.

Transit VIF

The "Pro" choice. Connects to an AWS Transit Gateway (TGW), enabling a single DX connection to reach thousands of VPCs globally.

Public VIF

Access to public AWS services (S3, DynamoDB, Glacier) without crossing the internet. Requires public AS numbers.

3. Layer 3: BGP Peering & BFD Optimization.

Routing is handled via **eBGP (External Border Gateway Protocol)**. AWS advertises its VPC cidrs, and the enterprise router advertises on-prem prefixes.

Scaling with BGP Communities

AWS uses specific BGP communities to give customers control over traffic origination. This is critical for "Hot Potato" vs "Cold Potato" routing.

  • 7224:9100 / 9200 / 9300

    Local Region / Home Continent / Global scope. Allows you to limit how far AWS distributes your prefixes.

  • AS_PATH Prepending

    The primary mechanism for active/passive failover. AWS honors up to 10 prepends to determine the primary path.

BFD: Sub-Second Failover

BGP is slow. By default, it takes 90 seconds to detect a link failure. **Bidirectional Forwarding Detection (BFD)** sends ultra-fast heartbeats between the on-prem router and the AWS Direct Connect chassis.

Tfailure=IntervalMultiplierT_{\text{failure}} = \text{Interval} \cdot \text{Multiplier}

BFD detection time (AWS supports 300ms intervals)

Note: Direct Connect LAG interfaces do not support BFD. Instead, they rely on LACP (802.3ad) timeouts which are notoriously slower (approx 3-30s).

Forensics: The BGP Flap

If your Direct Connect logs show "BGP Notification Received (Cease: Peer Unreachable)", check your BGP Local-AS vs Remote-AS. AWS expects 64512-65534 for private AS numbers. If you use a public AS that you don't own, AWS will drop the session at the border.

show ip bgp neighbors 169.254.x.x
BGP state = Established, up for 24:02:11
Hold time is 90, keepalive interval is 30 seconds

4. MACsec (802.1AE): Line-Rate Encryption.

For years, the trade-off for Direct Connect was performance vs security. IPsec VPNs could encrypt traffic but capped at ~1.25 Gbps per tunnel. **MACsec** provides Layer-2 encryption at the hardware level, maintaining 100 Gbps line-rate throughput.

Hardware-Assisted Security

Unlike IPsec, which adds complex headers and requires CPU cycles for ESP encapsulation, MACsec is handled by the PHY/SFP+ chip. It encrypts the payload while keeping the ethernet header intact (mostly).

  • Cipher AES-GCM-256
  • Integrity ICV (Integrity Check Value)
  • Latency Penalty < 50ns
  • Throughput Up to 400 Gbps

5. Architecture: The DX Gateway (DXGW).

In the early days, a DX connection was tied to a single VPC. This didn't scale. The **Direct Connect Gateway (DXGW)** acts as a global hub.

By associating a Private VIF with a DXGW, you can reach VPCs in any region (excluding China) over the AWS backbone. This simplifies BGP dramatically, as you only peer once with the DXGW rather than managing hundreds of BGP sessions for each VPC.

Exascale Routing Logic
// Traffic flow through DXGW
On-Prem Router -> Fiber -> DX Location -> DXGW -> [VPC-US-East-1, VPC-EU-West-1, VPC-AP-South-1]

// Propagation Strategy
Prefixes from On-Prem are automatically redistributed into the route tables of all associated VPCs.

The Verdict: Professional Connectivity

AWS Direct Connect is the ultimate bridge between the physical and virtual worlds. By mastering its L1/L2/L3 nuances, architects can build hybrid infrastructures that rival the performance of unified data centers. In the age of AI, where data movement is the new bottleneck, DX isn't just a network—it's a competitive advantage.

Frequently Asked Questions

Related Engineering Resources

Partner in Accuracy

"You are our partner in accuracy. If you spot a discrepancy in calculations, a technical typo, or have a field insight to share, don't hesitate to reach out. Your expertise helps us maintain the highest standards of reliability."

Contributors are acknowledged in our technical updates.

Share Article

Technical Standards & References

REF [aws-dx-docs]
AWS Infrastructure Group (2024)
AWS Direct Connect User Guide
Published: AWS Technical Documentation
VIEW OFFICIAL SOURCE
REF [direct-connect-gateway-scaling]
A. Madhavan (2023)
Scaling Hybrid Connectivity with Direct Connect Gateway
Published: AWS Architecture Blog
VIEW OFFICIAL SOURCE
REF [macsec-ieee-802-1ae]
IEEE Standard Association (2018)
IEEE 802.1AE MAC Security Standard
Published: IEEE
VIEW OFFICIAL SOURCE
Mathematical models derived from standard engineering protocols. Not for human safety critical systems without redundant validation.