Cloud NGFW for AWS Distributed Deployments
Table of Contents
Expand all | Collapse all
-
- About Cloud NGFW for AWS
- Getting Started from the AWS Marketplace
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for AWS Pricing
- Cloud NGFW Credit Distribution and Management
- Cloud NGFW for AWS Free Trial
- Cloud NGFW for AWS Limits and Quotas
- Subscribe to Cloud NGFW for AWS
- Locate Your Cloud NGFW for AWS Serial Number
- Cross-Account Role CFT Permissions for Cloud NGFW
- Invite Users to Cloud NGFW for AWS
- Manage Cloud NGFW for AWS Users
- Deploy Cloud NGFW for AWS with the AWS Firewall Manager
- Enable Programmatic Access
- Terraform Support for Cloud NGFW AWS
- Provision Cloud NGFW Resources to your AWS CFT
- Configure Automated Account Onboarding
- Usage Explorer
- Create a Support Case
- Cloud NGFW for AWS Certifications
- Cloud NGFW for AWS Privacy and Data Protection
-
-
- Prepare for Panorama Integration
- Link the Cloud NGFW to Palo Alto Networks Management
- Unlink the Cloud NGFW from Palo Alto Networks Management
- Associate a Linked Panorama to the Cloud NGFW Resource
- Use Panorama for Cloud NGFW Policy Management
- View Cloud NGFW Logs and Activity in Panorama
- View Cloud NGFW Logs in Strata Logging Service
- Tag Based Policies
- Configure Zone-based Policy Rules
- Enterprise Data Loss Prevention (E-DLP) Integration with Cloud NGFW for AWS
-
- Strata Cloud Manager Policy Management
Cloud NGFW for AWS Distributed Deployments
In a distributed deployment, each VPC that requires
protection has its own NGFW. This deployment method is less complicated
and, therefore, reduces the chance of misconfiguration.
For additional examples of distributed deployments, see Cloud NGFW for AWS Deployment
Architectures.
Distributed East-West (intra-VPC)
- Traffic from the source instance is routed to the NGFW endpoint and on to the NGFW for inspection.
- If the traffic is allowed, the NGFW endpoint sends the traffic on to the destination.
Distributed Outbound
- Traffic from the source instance is routed to the NGFW endpoint and on to the NGFW for inspection.
- If the traffic is allowed, the NGFW endpoint sends the inspected traffic to the NAT gateway.
- The NAT gateway sends the traffic to the internet gateway.
- The traffic continues to the internet and the destination.
Distributed Inbound
- Traffic from the source arrives at the internet gateway.
- The internet gateway routes the traffic to the NGFW endpoint and then to the NGFW for inspection.
- If the traffic is allowed, the NGFW endpoint routes the traffic to the application load balancer.
- The application load balancer forwards the traffic to the destination.