Cloud NGFW for AWS Isolated Deployment
Focus
Cloud NGFW for AWS

Cloud NGFW for AWS Isolated Deployment

Table of Contents

Cloud NGFW for AWS Isolated Deployment

Learn about isolated deployments for your Cloud NGFW for AWS resource.
Where Can I Use This?What Do I Need?
  • Cloud NGFW for AWS
  • Cloud NGFW subscription
  • Palo Alto Networks Customer Support Account (CSP)
  • AWS Marketplace account
  • User role (either tenant or administrator)
In an isolated deployment:
  • You enable Cloud NGFW to secure traffic in multiple AWS VPCs.
  • You share the Cloud NGFW resource across multiple VPCs in different AWS accounts.

Isolated Deployment for Ingress/Egress Traffic Inspection

In this deployment model:
  1. The internet gateway forwards the traffic destined to the public IP of the Application Load Balancer (ALB).
  2. As per the ALB subnet, any traffic going to the target group (workloads on EC2) are forwarded to the NGFW endpoint.
  3. The endpoint transparently sends the traffic to the firewall resource for inspection.
  4. If the traffic is allowed, the firewall resource sends the traffic back to the endpoint after inspection.
  5. As per the firewall subnet route table, traffic is forwarded to the workload servers.
    1. Traffic initiated from a EC2 instance and destined to the internet is first forward to the NGFW endpoint.
    2. The endpoint transparently sends the traffic to the Cloud NGFW resource for inspection.
    3. If the traffic is allowed, the firewall resource sends the traffic back to endpoint after inspection.
    4. As per the firewall subnet route table, traffic is forwarded to the NAT gateway.
    5. Traffic is forwarded to the internet gateway in accordance with the NAT gateway route table.