Cloud NGFW for AWS Centralized Deployments
Table of Contents
Expand all | Collapse all
-
- About Cloud NGFW for AWS
- Getting Started from the AWS Marketplace
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for AWS Pricing
- Cloud NGFW Credit Distribution and Management
- Cloud NGFW for AWS Free Trial
- Cloud NGFW for AWS Limits and Quotas
- Subscribe to Cloud NGFW for AWS
- Locate Your Cloud NGFW for AWS Serial Number
- Cross-Account Role CFT Permissions for Cloud NGFW
- Invite Users to Cloud NGFW for AWS
- Manage Cloud NGFW for AWS Users
- Deploy Cloud NGFW for AWS with the AWS Firewall Manager
- Enable Programmatic Access
- Terraform Support for Cloud NGFW AWS
- Provision Cloud NGFW Resources to your AWS CFT
- Configure Automated Account Onboarding
- Usage Explorer
- Create a Support Case
- Cloud NGFW for AWS Certifications
- Cloud NGFW for AWS Privacy and Data Protection
-
-
- Prepare for Panorama Integration
- Link the Cloud NGFW to Palo Alto Networks Management
- Unlink the Cloud NGFW from Palo Alto Networks Management
- Associate a Linked Panorama to the Cloud NGFW Resource
- Use Panorama for Cloud NGFW Policy Management
- View Cloud NGFW Logs and Activity in Panorama
- View Cloud NGFW Logs in Strata Logging Service
- Tag Based Policies
- Configure Zone-based Policy Rules
- Enterprise Data Loss Prevention (E-DLP) Integration with Cloud NGFW for AWS
-
- Strata Cloud Manager Policy Management
Cloud NGFW for AWS Centralized Deployments
In a centralized deployment, your Cloud NGFW components
are deployed in a centralized security VPC. Traffic must always
pass through an AWS Transit Gateway (TGW), which acts as a network
hub and simplifies the connectivity between VPCs, as well as, on-premises
networks.
For additional examples of centralized deployments, see Cloud NGFW for AWS Deployment
Architectures.
Centralized East-West
- Traffic from the source instance is sent to the TGW ENI.
- The TGW ENI directs traffic to the TGW.
- The TGW routes traffic to security VPC TGW ENI.
- The TGW ENI sends traffic to NGFW endpoint and on to the NGFW for inspection.
- If the traffic is allowed, the NGFW sends traffic back to the NGFW endpoint. The traffic is then sent back to the TGW through the security VPC TGW endpoint.
- The TGW forwards the traffic to the TGW ENI in the destination VPC.
- Then the TGW ENI sends the traffic to the destination.
Centralized Outbound
- Traffic from the source instance is sent to the TGW ENI and on to the TGW.
- The TGW routes the traffic to the security VPC TGW ENI.
- The TGW ENI sends the traffic to the NGFW endpoint and on to the NGFW for inspection.
- If the traffic is allowed, the NGFW endpoint routes traffic to the NAT gateway.
- The NAT gateway forwards the traffic to the IGW and on to the destination.
Centralized Inbound
- Traffic from the internet arrives at the internet gateway.
- The internet gateway routes traffic to the application load balancer (ALB).
- The ALB then sends traffic to the ingress VPC TGW ENI.
- The TGW ENI sends traffic to the TGW.
- The TGW routes traffic to the security VPC TGW ENI.
- The TGW ENI sends traffic to NGFW endpoint and on to the NGFW for inspection.
- If the traffic is allowed, the NGFW endpoint sends the traffic to TGW.
- The TGW then routes the traffic to the protected VPC TGW ENI and then on to the destination.