- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Cloud Network Security
- :
- Deploying Cloudguard on AWS with Autoscaling
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Deploying Cloudguard on AWS with Autoscaling
Hi everyone
I'm trying to deploy a 2 hubs solution (Northbound + Southbound) using internal and external load balancers (as per Checkpoint Cloud Security blueprint v1.0 and 2.0) . Inbound traffic flow would be as follow:
<internet> --- <IGW> --- <external LB> --- <CGI farm> --- <internal LB> --- < Web server farm>
I'm deploying CloudGuard instances (CGis) with autoscaling using Checkpoint's CloudFormation template. I'm finding myself very confused about how to architect the solution since the gateways deployed by the template only have 1 network interface by default.
I want the topology to be automated so the gateways deployed should be able to be fully operational without any manual intervention. I like the concept of CGI using 2 interfaces as there is a clear demarcation between trusted and untrusted zones. I get that with one interface i could NAT the inbound traffic from the external load balancer and send it, after inspection, to the internal load balancer but the demarcation line isn't as clean as it should. I could also use an edge association to force the internet gateway to send all Internet inbound traffic via the CGI which would then forward it to the external load balancer (and back to the CGI) but that means the same traffic is inspected twice by the security gateway .
All the topologies i saw seem to use 2 NICs except for Gateway load balacing which i haven't tried yet. What am I missing here ?
Do I need to architect my own CF template and modify the user-data to create the dynamic object i desperately need for NAT and sec policy ?
-
168.63.129.16
1 -
ACI
1 -
API
1 -
architecture
4 -
Automation
4 -
Automation and APIs
1 -
autoprov_cfg
1 -
Aviatrix
1 -
AWS
8 -
Azure
10 -
Azure DevOps
1 -
bash
1 -
CDT
1 -
cisco
1 -
Cisco ACI
1 -
Cloud
3 -
Cloud - Automation - Orchestration
1 -
Cloud Managment Extention
1 -
Cloud network security
3 -
Cloud Security
1 -
cloudappsecurity
1 -
CloudGuard
6 -
Cloudguard Controller debug
1 -
CloudGuard IaaS
7 -
cloudwatch
1 -
Cluster
1 -
ClusterXL
2 -
CP CME
1 -
Debug
1 -
Debug full
1 -
deployment
2 -
DevSecOps
1 -
DHCP
1 -
DirectConnect
1 -
disk
1 -
file share
1 -
firewall
1 -
Gaia
1 -
GWLB
1 -
IaC
1 -
identity
1 -
Install-Policy
1 -
Integrations
2 -
Intra
1 -
Intra-VCN
1 -
Intra-VCN Routing
1 -
loadbalancer
1 -
Logging
1 -
MDS 80.40
1 -
mount
1 -
multi cloud
1 -
NAT
1 -
NDR
1 -
networking
1 -
next generation firewall
1 -
NSX-T
2 -
OCI
1 -
Oracle
1 -
partition
1 -
private
1 -
public
1 -
R81
1 -
R81.10
1 -
reference
1 -
resource groups
1 -
Routing
2 -
script
1 -
Site to Site VPN
3 -
Smart Console
1 -
sms
1 -
Structura.io
1 -
technical
1 -
Terraform
2 -
TGW
1 -
VCN
1 -
VMSS
1 -
VPN
1 -
vsec_lic_cli
1
- « Previous
- Next »