Provision Cloud NGFW Resources to your AWS CFT
Table of Contents
Expand all | Collapse all
-
- About Cloud NGFW for AWS
- Getting Started from the AWS Marketplace
- Cloud NGFW for AWS Pricing
- Cloud NGFW for AWS Free Trial
- Cloud NGFW for AWS Limits and Quotas
- Subscribe to Cloud NGFW for AWS
- Locate Your Cloud NGFW for AWS Serial Number
- Cross-Account Role CFT Permissions for Cloud NGFW
- Invite Users to Cloud NGFW for AWS
- Manage Cloud NGFW for AWS Users
- Deploy Cloud NGFW for AWS with the AWS Firewall Manager
- Enable Programmatic Access
- Terraform Support for Cloud NGFW AWS
- Provision Cloud NGFW Resources to your AWS CFT
- Usage Explorer
- Create a Support Case
-
-
- Prepare for Panorama Integration
- Link the Cloud NGFW to Palo Alto Networks Management
- Unlink the Cloud NGFW from Palo Alto Networks Management
- Associate a Linked Panorama to the Cloud NGFW Resource
- Use Panorama for Cloud NGFW Policy Management
- View Cloud NGFW Logs and Activity in Panorama
- View Cloud NGFW Logs in Cortex Data Lake
- Tag Based Policies
-
Provision Cloud NGFW Resources to your AWS CFT
Create Cloud NGFW resources and provision them to your
AWS CloudFormation template.
The Cloud NGFW provides flexibility to
provision resources to your AWS CloudFormation template (CFT) by
allowing you to create your own resources.
Use the
You must enable Programmatic
access before using CloudFormation Registry with the Cloud NGFW.
PaloAltoNetworks::CloudNGFW::RuleStack
and PaloAltoNetworks::CloudNGFW::NGFW
schemas
to integrate the Cloud NGFW into your AWS CloudFormation template.
Use the provided syntax in this document to define Cloud NGFW firewall configuration
settings that you can integrate with AWS CloudFormation Registry.PaloAltoNetworks::CloudNGFW::RuleStack schema
- JSON{ "Type" : "PaloAltoNetworks::CloudNGFW::RuleStack", "Properties" : { "RuleStackName" : String, "RuleStack" : RuleStack, "RuleList" : [ Rule, ... ], "SecurityObjects" : SecurityObjects, "CustomSecurityProfiles":CustomSecurityProfiles, “ProgrammaticAccessToken”: String } }YAMLType:PaloAltoNetworks::CloudNGFW::RuleStack Properties: RuleStackName: String RuleStack: RuleStack RuleList: - Rule SecurityObjects: SecurityObjects CustomSecurityProfiles: CustomSecurityProfiles ProgrammaticAccessToken: StringElementDescriptionRuleStackNameEnter a descriptiveNamefor your rulestack.JSON“RuleStackName” : String,YAMLRuleStackName: StringRuleStackEnter aDescriptionfor your rulestack. The description includes:JSON{ "Scope" : String, "Profiles" : RuleStackProfiles, "Description" : String "Deploy" : String }YAMLScope: String Profiles: RuleStackProfiles Description: String Deploy: StringRuleStackProfilesIdentifyProfilesfor the specified rulestack. Profiles include:JSON{ "AntiSpywareProfile" : String, "AntiVirusProfile" : String, "VulnerabilityProfile" : String, "URLFilteringProfile" : String, "FileBlockingProfile" : String, "OutboundTrustCertificate" : String, "OutboundUntrustCertificate" : String }YAMLAntiSpywareProfile: String AntiVirusProfile: String VulnerabilityProfile: String URLFilteringProfile: String FileBlockingProfile: String OutboundTrustCertificate: String OutboundUntrustCertificate: StringRuleEstablishRulesfor the rulestack. Rules include:JSON{ "RuleName" : String, "Description" : String, "RuleListType" : String, "Priority" : Integer, "Enabled" : Boolean, "Source" : RuleSource, "NegateSource" : Boolean, "Destination" : RuleDestination, "NegateDestination" : Boolean, "Applications" : [ String, ... ], "Category" : UrlCategory, "Protocol" : String, "AuditComment" : String, "Action" : String, "Logging" : Boolean, "DecryptionRuleType" : String, "Tags" : [ Tag, ... ] }YAMLRuleName: String Description: String RuleListType: String Priority: Integer Enabled: Boolean Source: RuleSource NegateSource: Boolean Destination: RuleDestination NegateDestination: Boolean Applications: - String Category: UrlCategory Protocol: String AuditComment: String Action: String Logging: Boolean DecryptionRuleType: String Tags: - TagRuleSourceSet the collection of rules usingRuleSource. RuleSource includes:JSON{ "Cidrs" : [ String, ... ], "PrefixLists" : [ String, ... ], "Countries" : [ String, ... ], "Feeds" : [ String, ... ] // RuleStackname? }YAMLcidrs: - String PrefixLists: - String Countries: - String Feeds: - StringRuleDestinationSet theRuleDestinationfor the web service supporting the confirmation URL and one or more data collection URLs. RuleDestination includes:JSON{ "Cidrs" : [ String, ... ], "FqdnLists" : [ String, ... ], "PrefixLists" : [ String, ... ], "Countries" : [ String, ... ], "Feeds" : [ String, ... ] // RuleStackname? }YAMLCidrs: - String FqdnLists: - String PrefixLists: - String Countries: - String Feeds: - StringTagSpecify aTagfor the rulestack. A Tag includes:JSON{ "Key" : String, "Value" : String }YAMLKey: String Value: StringUrlCategoryUse theUrlCategoryto match criteria in authentication, decryption, QoS, and security policy rules. UrlCategory includes:JSON{ "URLCategoryNames" : [ String, ... ], "Feeds" : [ String, ... ] }YAMLURLCategoryNames: - String Feeds: - StringSecurityObjectsSet theSecurityObjectsfor the rulestack. SecurityObjects include:JSON{ "PrefixList" : PrefixList, "FqdnList" : FqdnList, "CustomUrlCategory" : CustomUrlCategory, "IntelligentFeed" : IntelligentFeed, "CertificateList" : CertificateList }YAMLPrefixList: PrefixList FqdnList: FqdnList CustomUrlCategory: CustomUrlCategory IntelligentFeed: IntelligentFeed CertificateList: CertificateListCustomSecurityProfilesSetCustomSecurityProfilesto minimize antivirus inspection for traffic between trusted security zones, and to maximize the inspection of traffic received from untrusted zones, such as the internet, as well as the traffic sent to highly sensitive destinations, such as server farms. CustomSecurityProfiles include:JSON{ "FileBlocking" : FileBlocking }YAMLFileBlocking: FileBlockingPrefixListUsePrefixListto filter routes based on prefixes. By defining an order number and IP prefixes, a branch or a data center ION device can permit or deny routes. The dynamic, auto-generated prefix list is based on what the ION device advertises. Prefixes can be split or non-split. A PrefixList includes:JSON{ "Name" : String, "PrefixList" : [ String, ... ], "AuditComment" : String, "Description" : String }YAMLName: String PrefixList: - String AuditComment: String Description: StringFqdnListWith theFqdnListobject, DNS provides the FQDN resolution to the IP addresses, removing the need to know the IP addresses and manually updating them every time the FQDN resolves to a new IP address. FqdnList includes:JSON{ "Name" : String, "Description" : String, "FqdnList" : [ String, ... ], "AuditComment" : String }YAMLName: String Description: String FqdnList: - String AuditComment: StringCustomUrlCategoryUseCustomURLCategoryto create a custom URL filtering object to specify exceptions to URL category enforcement, and to create a custom URL category based on multiple URL categories:
- Define exceptions to URL category enforcement—Create a custom list of URLs that you want to use as match criteria in a Security policy rule. This is a good way to specify exceptions to URL categories, where you’d like to enforce specific URLs differently than the URL category to which they belong.
- Define a custom URL category based on multiple PAN-DB categories—This allows you to target enforcement for websites that match a set of categories. The website or page must match all the categories defined as part of the custom category.
CustomURLCategory includes:JSON{ "URLTargets" : [ String, ... ], "Name" : String, "Description" : String, "Action" : String, "AuditComment" : String }YAMLURLTargets: - String Name: String Description: String Action: String AuditComment: StringIntelligentFeedUseIntelligentFeedto continually feed the most up-to-date threat intelligence data. IntelligentFeed includes:JSON{ "Name" : String, "Description" : String, "Certificate" : String, "FeedURL" : String, "Type" : String, "Frequency" : String, "Time" : Integer, "AuditComment" : String }YAMLName: String Description: String Certificate: String FeedURL: String Type: String Frequency: String Time: Integer AuditComment: StringCertificateObjectUseCertificateObjectto define elements of the certificate. CertificateObject includes:JSON{ "Name" : String, "Description" : String, "CertificateSignerArn" : String, "CertificateSelfSigned" : Boolean, "AuditComment" : String }YAMLName: String Description: String CertificateSignerArn: String CertificateSelfSigned: Boolean AuditComment: StringFileBlockingUseFileBlockingto identify specific file types that you want to block or monitor. For most traffic (including traffic on your internal network) you will want to block files that are known to carry threats or that have no real use case for upload/download. FileBlocking includes:JSON{ "Direction" : String, "FileType" : String, "Description" : String, "Action" : String, "AuditComment" : String }YAMLDirection: String FileType: String Description: String Action: String AuditComment: StringPaloAltoNetworks::CloudNGFW::NGFW schema- JSON{ "Type": "PaloAltoNetworks::CloudNGFW::NGFW", "Properties" : { "Description" : String, "EndpointMode" : String, "FirewallName" : String, "RuleStackName" : String, "RuleStackName" : String, "SubnetMappings" : [ String, ... ], "Tags" : [ Map, ... ], "VpcId" : String, "UpdateToken" : String, "LogDestinationConfigs" : [ LogProfileConfig, ... ], "CloudWatchMetricNamespace" : String, "ProgrammaticAccessToken" : String }YAMLType: PaloAltoNetworks::CloudNGFW::NGFWProperties: AppIdVersion: String AutomaticUpgradeAppIdVersion: Boolean Description: String EndpointMode: String FirewallName: String RuleStackName: String RuleStackName: String SubnetMappings: - String Tags: - Map VpcId: String UpdateToken: String LogDestinationConfigs: - LogProfileConfig CloudWatchMetricNamespace: String ProgrammaticAccessToken: StringElementDescriptionLogProfileConfigUseLogProfileConfigto display entries for change to the firewall configuration.JSON{ "LogDestination" : String, "LogDestinationType" : String, "LogType" : String}YAMLLogDestination: String LogDestinationType: String LogType: StringActivate public extensionsTo ship logs in AWS CloudWatch, Configure Logging for Cloud NGFW on AWS.Activate both thePaloAltoNetworks::CloudNGFW::NGFWandPaloAltoNetworks::CloudNGFW::RuleStackpublic extensions for your account:
Create an execution role ARN for the extensions. Both extensions can use the same role. Establish trust relationships in the role to consume the Cloud Formation templates: After establishing the trust relationship, activate the extensions: