- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
CheckMates Fest 2026
Watch Now!AI Security Masters
Hacking with AI: The Dark Side of Innovation
CheckMates Go:
CheckMates Fest
Hi,
Since I've been working in the cloud (about a year), I've noticed firewall design patterns are somewhat different, using a separate ingress and egress firewall/cluster, rather than a two-tier design more often seen on prem (although I have seen user traffic using a different firewall from server traffic, although there was still an internal tier).
What I haven't seen is a rationale for why this is the design choice for vendors. I first saw it with the Check Point CloudGuard architectures but I have seen a similar thing with Cisco's new Multicloud Defense aquisition.
Anyone have any guidance or links on the reason for this design preference?
Thanks in advance.
I had a lot of head scratching moment too when I saw public cloud designs and proposals, and the CloudGuard Blueprints.
https://www.checkpoint.com/downloads/products/cloudguard-architecture-blueprint-diagrams.pdf
It comes down to the design and limitations of the public cloud, and vendors having to fit in with how it is in the cloud.
In some ways it seems like networking was reinvented with the introduction of public cloud.
SDN and virtualisation brings all sorts of new capabilities to networking.
For example, microsegmentation and traffic steering allows two hosts on the same subnet to be isolated at layer 2 by steering the traffic to the VNA for policy enforcement.
That's not new though, VMware NSX offered that for on premises private cloud about a decade ago but it's SDN so public cloud uses the same capabilities.
Of course the cloud comes with its own language and acronyms, like Virtual Network Appliances (VNA) and Workloads.
It's not a crime to say Firewall and Virtual Machines in my world.
Of course serverless and other Workloads are needing new terminology and acronyms.
I joke about the book seller and an operating system vendor reinventing networking and throwing traditional networking out the window but again the reality is that SDN and SDDC are different and traffic handling and steering is enhanced.
AWS was first to offer a VM in the cloud and get the whole public cloud offerings going and it was them who defined the Well Architectected framework for cloud.
It's effectively a series of blue prints (available in Kindle format of course) and offers customers (and potential customers) guidance for designing, deploying and maintaining in their cloud.
Someone else's computer.
Imagine you're going to deploy your IT assets and network in someone else's DC. You'd need to clearly define the agreement and work within their DCs capabilities and limitations. And you'd want the well documented. Well Architected.
https://aws.amazon.com/architecture/well-architected/
The public cloud is relatively new still and evolution is fast. That actually puts a burden on vendors like Check Point to reprogram their products to fit into new public cloud offerings (vWAN and GWLBs come to mind)
They are also having to advise the CSPs on how they can improve in some cases. Calling on multiple decades of experience to advise the CSPs how networking and network security is best done.
A 7 minutes ClusterXL failover time comes to mind, when the cloud's APIs took 7 minutes to redirect the traffic following a ClusterXL failover, as it was in the early days.
It's an interesting evolution to witness but keeps cloud customers on their toes, redesigning and redeploying (or not) to keep up with the cloud, and the cost savings potential. Or getting burned by excess costs, facing the disappointment and rethink the cloud approach. It happens.
Check Point has 100,000 + customers but only 5k or maybe more, <10k (?), in the cloud (CloudGuard is a big family of products) so it is still early ish in terms of cloud adoption, with a growing trend and cloud first approach.
My 2 cents (first draft)
Hope that helps,
Don
Since Im sort of obligated to say this now, as its AI answer, and should be taken with the grain of salt, but here it is : - )
Andy
*****************************
A Cloud Firewall Design Rationale explains the reasoning behind the architecture, components, and strategies used to secure cloud infrastructure using firewall technology. It ensures that firewall controls align with organizational security policies, compliance requirements, and cloud-native best practices.
Here’s a structured outline of a typical Cloud Firewall Design Rationale:
Define the objective:
Protect cloud workloads from unauthorized access.
Enforce segmentation between environments (e.g., dev/test/prod).
Meet compliance (e.g., PCI DSS, HIPAA, GDPR).
Centralize control over ingress/egress traffic.
The cloud provider (e.g., AWS, Azure, GCP) offers native firewalling capabilities.
Workloads are distributed across multiple regions/zones.
Use of Infrastructure-as-Code (IaC) for firewall rule deployment.
Teams follow a shared responsibility model.
Deployed at VPC/VNet boundaries.
Inspect north-south traffic (external-internal).
Installed on VMs/instances.
Manage east-west traffic or workload-specific rules.
Protect against HTTP(S) threats (OWASP Top 10).
Often placed in front of load balancers or APIs.
e.g., AWS Network Firewall, Azure Firewall, GCP Cloud Firewall.
Used for centralized policy enforcement.
Stateless/stateful firewalls must auto-scale with demand.
Use autoscaling groups or managed services.
Use zone-redundant or regionally distributed firewalls.
Avoid single points of failure.
Enable logging of accepted/denied traffic.
Integrate with SIEM or cloud-native monitoring (e.g., CloudWatch, Azure Monitor).
Use tags, labels, or security groups for dynamic rules.
Maintain least privilege access principles.
Whitelist-based approach: explicitly allow necessary traffic, deny all else.
Automated provisioning via Terraform, ARM templates, or CloudFormation.
Version control and peer review of rules.
Define zones: Internet, DMZ, Internal, Restricted.
Control flow between zones using firewall policies.
Evaluate cost of traffic inspection and logging.
Optimize placement to avoid unnecessary data transfer charges.
Ensure firewall policies support compliance (PCI, ISO 27001).
Periodic audits and automated compliance checks.
Public API gateway protected by WAF and rate-limited.
Internal database subnet with strict IP whitelisting.
Egress firewall filtering to prevent data exfiltration.
I had a lot of head scratching moment too when I saw public cloud designs and proposals, and the CloudGuard Blueprints.
https://www.checkpoint.com/downloads/products/cloudguard-architecture-blueprint-diagrams.pdf
It comes down to the design and limitations of the public cloud, and vendors having to fit in with how it is in the cloud.
In some ways it seems like networking was reinvented with the introduction of public cloud.
SDN and virtualisation brings all sorts of new capabilities to networking.
For example, microsegmentation and traffic steering allows two hosts on the same subnet to be isolated at layer 2 by steering the traffic to the VNA for policy enforcement.
That's not new though, VMware NSX offered that for on premises private cloud about a decade ago but it's SDN so public cloud uses the same capabilities.
Of course the cloud comes with its own language and acronyms, like Virtual Network Appliances (VNA) and Workloads.
It's not a crime to say Firewall and Virtual Machines in my world.
Of course serverless and other Workloads are needing new terminology and acronyms.
I joke about the book seller and an operating system vendor reinventing networking and throwing traditional networking out the window but again the reality is that SDN and SDDC are different and traffic handling and steering is enhanced.
AWS was first to offer a VM in the cloud and get the whole public cloud offerings going and it was them who defined the Well Architectected framework for cloud.
It's effectively a series of blue prints (available in Kindle format of course) and offers customers (and potential customers) guidance for designing, deploying and maintaining in their cloud.
Someone else's computer.
Imagine you're going to deploy your IT assets and network in someone else's DC. You'd need to clearly define the agreement and work within their DCs capabilities and limitations. And you'd want the well documented. Well Architected.
https://aws.amazon.com/architecture/well-architected/
The public cloud is relatively new still and evolution is fast. That actually puts a burden on vendors like Check Point to reprogram their products to fit into new public cloud offerings (vWAN and GWLBs come to mind)
They are also having to advise the CSPs on how they can improve in some cases. Calling on multiple decades of experience to advise the CSPs how networking and network security is best done.
A 7 minutes ClusterXL failover time comes to mind, when the cloud's APIs took 7 minutes to redirect the traffic following a ClusterXL failover, as it was in the early days.
It's an interesting evolution to witness but keeps cloud customers on their toes, redesigning and redeploying (or not) to keep up with the cloud, and the cost savings potential. Or getting burned by excess costs, facing the disappointment and rethink the cloud approach. It happens.
Check Point has 100,000 + customers but only 5k or maybe more, <10k (?), in the cloud (CloudGuard is a big family of products) so it is still early ish in terms of cloud adoption, with a growing trend and cloud first approach.
My 2 cents (first draft)
Hope that helps,
Don
The CG NW Blueprints are a result of the public cloud dictating/recommending topology and the vendor matching it with their solution melted into it.
Way better than AI answer : - )
Andy
Appreciate the response; however, I'm still not seeing the rationale. The closest I'm getting is the CSPs said it should be like that? What was their rationale? The cynic in me was thinking it is just a way to sell more firewall licenses....
Of course, you can still do two-tier designs in the cloud, but I haven't seen them recommended.
Note: I tried AI too before I came here, but did not get a satisfactory response 🙂
I would suggest maybe ask your local SE about it, but if you dont like their answer either, definitely open TAC case. Otherwise, lets see if anyone else responds here.
Andy
The CSP is indeed dictating the way it is.
Ask your Check Point rep to run you through the comparison between CSP firewall Threat Prevention offerings, and the cybersecurity vendor TP offerings and catch rate.
That's one of the main drivers to go with a dedicated cybersecurity vendor.
There is flexibility in how cloud SGs are deployed. A cloud solution can deal with network security in similar ways to an on prem SG, but the cloud is different and offers unique solutions that the traditional IT solutions don't. Security needs to be able to fit in with the rest of the solution.
BYOL and PAYG models show the dynamic nature of the cloud and show how it may be advantageous to use cloud in some cases.
AI can be a real disappointment at times.
I got this, and it makes sense so I thought I'd share it.
Hi @wanartisan , he is the very short version. The two-tier design comes down to traffic flows, risk mitigation, and capabilities that match the needs of what it is you are designing for.
For example in Azure we have a number of available architectures but they all have their pros and cons. If you are protecting a web application that sees variable spikes in usage, it makes sense to deploy VMSS in front of it. But VMSS doesn't support S2S VPN.
For E/W and traffic destined back and forth to HQ, it may make more sense to deploy High Availability or Virtual WAN for the VPN support and because the traffic loads are more of a known commodity.
Now take into account maintenance(patching and upgrades), instead of having all traffic for all traffic types flowing through a single choke point and the potential impact, you can do maintenance on one or the other at a time of your choosing.
Regarding licensing, we price CloudGuard Network Security on cores allocated(BYOL) or PAYG...so in comparison to one very large cluster versus a dynamically adjusting scale set or consumption or core-based configuration you are actually optimizing for what you actually need.
At the end of the day, please reach out to your account team who can and will connect you with one of our Cloud Architects to help design what makes the most sense for your particular use case.
Hope this helps!
BR!
Jeff
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesTue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesTue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY