Cloud NGFW Scalability Across Multiple AWS VPCs
    Learn about how to scale your Cloud NGFW resource across multiple AWS
        VPCs.
    
  
    
  
| Where Can I Use This? | What Do I Need? | 
|---|
    
|  | Cloud NGFW subscriptionPalo Alto Networks Customer Support Account (CSP)AWS Marketplace accountUser role (either tenant or administrator)
 | 
 
  
 
  
A Cloud NGFW resource provides NGFW capabilities for your VPC. This resource has built-in
            resiliency, scalability and lifecycle management. A NGFW resource spans multiple AWS
            availability zones, which are distinct locations within an AWS Region, engineered to be
            isolated from failures in other Availability Zones. They provide inexpensive,
            low-latency network connectivity to other Availability Zones in the same AWS Region.
A NGFW resource is a gateway load balancer-based 
VPC endpoint service. To use a NGFW resource,
            you create a dedicated subnet in your VPC for each desired AWS availability zone. You
            then create NGFW endpoints (also known as Gateway Load Balancer endpoints) on the
            subnets and update the VPC route tables to send traffic through these endpoints.
You previously created the Cloud NGFW resource and dedicated it to a single VPC in your
            AWS environment. You could use the Cloud NGFW resource by creating NGFW endpoints in
            that VPC. This dedicated resource would be sufficient if you use Cloud NGFW resources in
            a centralized deployment. 
In the centralized architecture model, a dedicated security VPC provides a simplified and
            central approach to managing advanced access control, and threat inspection of traffic
            using an 
AWS Transit Gateway for all applications in
            the spoke VPCs. You would then configure route rules in the application VPCs and the
            transit gateway to redirect traffic to the security VPC for inspection. However, your
            deployment may require a 
hybrid architecture model, where the
            spoke VPCs can use the centralized VPC for east-west inspection. This model also allows
            distributing the inspection points (NGFW resources) on each application VPC that needs
            protection for its Internet Ingress/Egress traffic. However, you would incur hourly
            costs for each NGFW resource in your deployment, which you might want to avoid.
In the image below, single VPC NGFW resources are in a combined deployment architecture,
            which forces you to incur additional costs for securing multiple VPCs:
  Multi-VPC NGFW Resources
With multi-VPC NGFW resources, you can create endpoints for an NGFW resource in
                different VPCs and route traffic to the NGFW resource for inspection:
  Having these VPCs in different AWS accounts provides significant operational
                    benefits:
- Deployment flexibility. You can share Cloud NGFW resources across
                        multiple VPCs in different AWS accounts.
- Scalable connectivity. Create up to 50 Cloud NGFW endpoints (also
                        known as Gateway Load Balancer endpoints) across different VPCs and send
                        traffic through these endpoints for NGFW inspection.
- Cost effectiveness. Reduce the number of NGFW resources needed to
                        protect your AWS environment and consolidate your overall network security
                        posture. There is no additional cost to share Cloud NGFW resources across
                        multiple VPCs. You pay AWS directly for the Cloud NGFW endpoints (Gateway
                        Load Balancer endpoints) that you would use to send traffic to the NGFW
                            resource.