Cloud NGFW for AWS Combined Deployment
Learn about combined deployments for your Cloud NGFW for AWS resource.
| Where Can I Use This? | What Do I Need? |
|
|
- Cloud NGFW subscription
- Palo Alto Networks Customer Support Account (CSP)
- AWS Marketplace account
- User role (either tenant or administrator)
|
In a combined deployment model:
- the combination of cross-account NGFW endpoints exist with hub-and-spoke VPC
connectivity.
- the hub of the topology, or transit gateway, is the central point of
connectivity between VPCs for east-west and outbound traffic security.
- cross account NGFW endpoints in the application VPCs provide the inbound traffic
security.
Combined Deployment for Ingress/Egress Traffic Inspection
In this deployment model:
- Traffic initiated from a client on the internet and destined to the public
IP of the application load balancer arrives at the internet gateway (IGW).
The IGW forwards the traffic to the application load balancer.
- As per the Application load balancer subnet, any traffic going to the target
group (workloads on EC2) are forwarded to the NGFW endpoint.
- The endpoint transparently sends the traffic to the firewall resource for
inspection.
- If the traffic is allowed, the firewall resource sends the traffic back to
the endpoint after inspection.
- As per the firewall subnet route table, traffic is forwarded to the workload
servers.
- Traffic from a workload running in spoke VPC A is destined for the
internet.
- The transit gateway (TGW) spoke route table forwards all the traffic
to the centralized security VPC.
- The TGW subnet route table of the security VPC attachment sends all
the traffic to the NGFW endpoint.
- The NGFW endpoint automatically sends traffic to the Cloud NGFW
resource for inspection.
- If traffic is allowed, then the NGFW resource sends traffic back to
the endpoint.
- The firewall subnet route table forwards all the traffic to the NAT
gateway.
- The NAT gateway forwards the traffic to the destination through the
IGW.
Combined Deployment for Ingress/Egress (Egress NAT) Traffic Inspection
In this deployment model:
- Traffic initiated from a client on the internet and destined to the public
IP of the application load balancer arrives at the internet gateway (IGW).
The IGW forwards the traffic to the application load balancer.
- As per the Application load balancer subnet, any traffic going to the target
group (workloads on EC2) are forwarded to the NGFW endpoint.
- The endpoint transparently sends the traffic to the firewall resource for
inspection.
- If the traffic is allowed, the firewall resource sends the traffic back to
the endpoint after inspection.
- As per the firewall subnet route table, traffic is forwarded to workload
servers.
- Traffic from a workload running in spoke VPC A is destined for the
internet.
- Traffic from the source instance is forwarded to the transit gateway
(TGW) through the attachment.
- The TGW spoke route table forwards all the traffic to the
centralized security VPC.
- The TGW subnet route table of the security VPC attachment sends all
the traffic to the NGFW endpoint.
- The NGFW endpoint automatically sends traffic to the Cloud NGFW
resource for inspection.
- The NAT gateway forwards the traffic to the destination through the
IGW.