This page guides you through deploying a Terraform plan to add AI Runtime Security: Network intercept protection for GCP cloud
resources.
On this page, you will configure an AI Runtime Security: Network
intercept in Strata Cloud Manager, download the corresponding Terraform template,
and deploy it in your cloud environment. This setup will integrate the firewall in
your cloud network architecture, enabling comprehensive monitoring and protection of
your assets.
After onboarding the cloud account, the Strata Cloud Manager command
center dashboard will show asset discovery with no AI Runtime Security protection deployed. Unprotected traffic paths to and from applications, AI
models, and the internet are marked in red until you add firewall protection. For
more details, see Discover Your Cloud Resources.
Select Network from the AI Runtime Security drop-down
list at the top.
Select Add Protections ("+" icon).
Select Cloud Service Provider as Google Cloud and select Next.
In Firewall Placement, select one or more traffic flows to
inspect.
The following table shows the network traffic type the AI Runtime Security: Network intercept or the VM-Series firewall
can support:
Traffic Type
AI Runtime Security: Network
intercept
VM-Series
AI Traffic - Traffic between your applications
and AI Models
✅
Non-AI Traffic and namespaces (example,
kube-system)
✅
Cluster Traffic
✅
Non-AI and non-cluster traffic
✅
✅
If you select the `kube-system` namespace,
the VM-Series firewall option will be grayed out, as only an AI Runtime Security: Network intercept can protect these
namespaces.
Select Next.
In Region & Applications:
Select your cloud account to secure from the onboarded cloud
accounts list.
Select a region in which you want to protect the
applications.
In Selected applications:
Select the applications to secure from the drop-down list. This list
includes application workloads such as namespaces, or VPCs.
Set the Public IP address on the External Load Balancer (ELB)
for each application by selecting:
Auto generate: Automatically assigns an ephemeral
(temporary) IP address to your application.
Input manually: Create and assign a static IP address to
your application.
Each application is mapped to one public ELB IP address.
Protect the Undiscovered VPC(s) or add a new VPC by selecting
Add VPC and enter the VPC Name, VPC CIDRs IP
address ranges, K8s pod CIDRs (Optional) IP address ranges, and
K8s service CIDRs (Optional).
Select Submit.
Select Next.
In Protection Settings:
Select AI Runtime Security or VM-Series firewall type
based on the type of traffic you decided to protect under Firewall
Placement in step 5.
Enter the Service account attached to security VM.
Flex authentication code (Copy AUTH CODE
for the deployment
profile you created for AI Runtime Security: Network intercept
in Customer Support Portal).
Enter a unique Terraform template name. (Use only lowercase
letters, numbers, and hyphens. Don't use a hyphen at the beginning or
end, and limit the name under 19 characters).
Create terraform template.
Save and Download Terraform Template.
Close the deployment workflow to exit.
Unzip the downloaded file. Navigate to <unzipped-folder>
with 2 directories: `architecture` and `modules`. Deploy the Terraform templates
in your cloud environment following the `README.md` file in the `architecture`
folder.
Initialize and apply the Terraform for the security_project.
The `security_project` contains the Terraform plan to create an AI network
intercept (AI firewall) architecture. The Terraform plan creates the
required resources to deploy AI network intercept with in-line prevention
mode, including the managed instance groups, load balancers, and health
checks.
cd architecture //Change directory to architecture/security_project
cd security_project
terraform init
terraform plan
terraform apply
The security Terraform generates the following output, record the IP addresses
within the lbs_external_ips &
lbs_internal_ips
outputs.
Configure Strata Cloud Manager or Panorama to secure VM workloads and
Kubernetes clusters and deploy pods. Configure interfaces, zones, NAT policy,
routers, and security policy rules.
Select Workflows → NGFW Setup → Device Management. The AI Runtime Security: Network intercept appears under Cloud
Managed Devices.
Switch to the Cloud Managed Devices tab to view and
manage the connected state, the configuration sync state, and the licenses of
the deployed AI network intercept (AI firewall).
It takes a while before the Device Status shows as
connected.
The AI network intercept deployment Terraform also creates an IP-tag collector
service, enabling you to retrieve IP-tag information from clusters. These tags
are used to populate dynamic address groups (DAGs) for automated security
enforcement. Refer harvesting IP-tags for
details.