Configure Private Traffic Range
Table of Contents
Expand all | Collapse all
-
- About Cloud NGFW for AWS
- Getting Started from the AWS Marketplace
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for AWS Pricing
- Cloud NGFW Credit Distribution and Management
- Cloud NGFW for AWS Free Trial
- Cloud NGFW for AWS Limits and Quotas
- Subscribe to Cloud NGFW for AWS
- Locate Your Cloud NGFW for AWS Serial Number
- Cross-Account Role CFT Permissions for Cloud NGFW
- Invite Users to Cloud NGFW for AWS
- Manage Cloud NGFW for AWS Users
- Deploy Cloud NGFW for AWS with the AWS Firewall Manager
- Enable Programmatic Access
- Terraform Support for Cloud NGFW AWS
- Provision Cloud NGFW Resources to your AWS CFT
- Configure Automated Account Onboarding
- Usage Explorer
- Create a Support Case
- Cloud NGFW for AWS Certifications
- Cloud NGFW for AWS Privacy and Data Protection
-
-
- Prepare for Panorama Integration
- Link the Cloud NGFW to Palo Alto Networks Management
- Unlink the Cloud NGFW from Palo Alto Networks Management
- Associate a Linked Panorama to the Cloud NGFW Resource
- Use Panorama for Cloud NGFW Policy Management
- View Cloud NGFW Logs and Activity in Panorama
- View Cloud NGFW Logs in Strata Logging Service
- Tag Based Policies
- Configure Zone-based Policy Rules
- Enterprise Data Loss Prevention (E-DLP) Integration with Cloud NGFW for AWS
-
- Strata Cloud Manager Policy Management
Configure Private Traffic Range
Specify a private traffic range for an endpoint.
Cloud NGFW allows you to specify the Private Traffic Range for each endpoint. By
default, the private traffic range prefixes include the VPC-allowed IP address
ranges as specified in IANA RFC 1918. However, your hybrid cloud
network could additionally include the shared address space per IANA
RFC 6598 or a certain set of publicly routable CIDR blocks in the private
traffic range prefixes.
To configure private traffic ranges:
- Log in to the Cloud NGFW console.Click NGFWs.In the Endpoint Management section, select the subnet from the drop-down menu.Select Manage Traffic and Egress NAT for the appropriate endpoint in the Endpoints table:In the Manage Traffic and Egress NAT screen, specify the IP address (or addresses) that you want to explicitly include:Select the check box to Add Additional Prefixes to Private Traffic Range.Select the Perform Egress NAT check box to ensure that address translation occurs to all public IP address destinations, except those noted in the private traffic range.Click Save.