- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Discussion
- :
- CP in AWS
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
CP in AWS
Hi everyone,..
That is possible if deployment cloudguard GWLB in AWS using scheme centralized security VPC (transparent inspection) without subnet tagging?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Yes, you don't really need the subnet tagging. most of our deployment are done without Subnet tagging , using a centralized security VPC.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@Shay_Levin can you please answer?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Yes, you don't really need the subnet tagging. most of our deployment are done without Subnet tagging , using a centralized security VPC.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Nir_Shamir okay, i want make sure again. so if we deployment centralized security vpc ( without subnet tagging and without transit gateway? Thats posible to inspect north south traffic?
If possible, any guidance to help us.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes.
it will inspect any traffic you push through the GWLB endpoints.
just make sure to take care of routing in and out.
check this GWLB infrastructure SK which has all the architecture options:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Nir_Shamir I have been deploy centralized security vpc. But i have problem in spoke VPC which is using nat gateway infrastructure. If applied the concept gwlbe with nat gateway (spoke vpc), for private ip under the nat gateway , the ip instance cannot reach internet ? the routing table like this in attachment.
any solution ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This is how is should be:
To Internet:
VM > GWLBe > Cloudguard instances > GWLBe > NAT GW > Internet.
Back from Internet:
Internet > NAT GW > GWLBe > CloudGuard instances > GWLBe > VM
can you send a topology of the network you created so I can understand the flow of it ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Nir_Shamir Thank you very much for your respond
So I need add new subnet for allocation NAT subnetright ?
VM > GWLBe > Cloudguard instances > GWLBe > NAT GW > Internet. ==> for this, its mean topology flow in spoke VPC right.
Here is attachment for the topology . Please advice
Thank you
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes,
you will need to build the NAT GW's in different subnets to allow different route table back to the GWLBe for the return traffic.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Nir_Shamir I have been deploying centralized security VPC. But I got some issues in spoke VPC using Nat gateway infrastructure. If using nat gateway, for private IP under nat gateway can't reach internet and can't inspect to the security vpc ( checkpoint ). Overall scheme from spoke VPC using nat gateway connect to the security vpc just using gwlbe to gwlbe via vpc endpoint (without any transit gateway) . For routing table already correct configuration like this ==> routing table private subnet destination 0.0.0.0/0 to vpc endpoint , and then routing table gwlbe for the 0.0.0.0/0 to the nat gateway.
Any solution for this case? Please help us.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
the NAT GW needs to be on a different subnet (if it's not already is).
it needs to have a separate routing table pointing to the Private subnet via the GWLBe.