By Brian Fitzgerald
Introduction
This a cross-region Data Guard network in Amazon AWS. This article covers VPC, peering, and security groups.
VPC
We are starting with a default VPC at the primary with CIDR block 172.31.0.0/16. At the standby, in preparation for peering, we will create a new VPC with non-overlapping CIDR block 172.32.0.0/20.
Enable DNS hostnames, which is required for the Oracle grid setup.

We need to create at least one subnet.

Optionally, you may create an internet gateway and route.
Peering
At the standby VPC, setup peering to the primary VPCs:

Note the acknowledgement:

At the primary, accept the request.

Press “Yes, Accept”

Note the acknowledgement. Select “Modify my route tables now”:

At the standby, add a route to the primary VPC.

At the primary, add a route to the standby VPC.

Security Groups
Create primary, far sync, and standby EC2 instances. If you have Enterprise Manager set up already, you may consider it now. Assuming these IP addresses:
| Description | IP Address |
| primary | 172.31.86.22 |
| far sync | 172.31.28.23 |
| standby | 172.32.10.34 |
| Enterprise Manager | 172.31.82.194 |
A minimalist security group arrangement involves just the database boxes. In that case, setup security groups such as the following. At the primary EC2 instance, accept incoming Oracle connections from the far sync and the standby. At all EC2 instances, accept incoming SSH and em agent connections.

At the far sync, accept Oracle connections from the primary and the standby.

At the standby, accept Oracle connections from the primary and the far sync.

Suppose, however, that there are database application clients on subnets 172.32.0.0/20 and 172.31.80.0/20. In that case, at you could revise the primary and standby security groups as follows. At both the primary and the standby, accept Oracle connections from the primary and the standby subnets and from the far sync.


Instead of opening up incoming SSH to all hosts, you can create one or more bastion hosts, and you can restrict incoming SSH to only the bastion.
Conclusion
Using the AWS console, you can setup networking for a cross-region Data Guard network. At the VPC level, the first key point is to select non-overlapping IP address ranges with a view to establishing peering. For a smooth grid install, enable DNS hostnames. After your EC2 instances are created, you must configure security groups to accept incoming database, EM agent, and ssh connections. Security groups should be as restrictive as possible.