DESIGN - AWS Gateway Load-Balancer with PAN Firewalls for Inbound, Outbound and East-West Security

  Рет қаралды 51,138

Ralph Carter

Ralph Carter

Күн бұрын

In this video Ralph Carter designs an AWS Security VPC architecture in order to support Inbound, Outbound and East-West Traffic Inspection use cases within AWS. The AWS construct design is discussed along with Packet Walks for all of the use-cases.

Пікірлер: 74
@damianfernandez1
@damianfernandez1 3 жыл бұрын
Very grateful for putting this out. Cleared all my doubts. Amazingly well done !
@vardanvardanyan884
@vardanvardanyan884 3 жыл бұрын
Awesome presentation. Very clearly explained with packet walk. Thank you!
@VirtualizeStuff
@VirtualizeStuff 2 жыл бұрын
Excellent job Ralph explaining the GWLB and the awesome packet walk! Learned a ton!
@n8goodman
@n8goodman 3 жыл бұрын
You just saved me so much time. Thank you for making this!
@muhammadyaqoob9777
@muhammadyaqoob9777 3 жыл бұрын
Hi Ralph, thanks for sharing amazing content! Thanks Mo
@ADV-IT
@ADV-IT Жыл бұрын
Great detailed explanation, thanks!
@yourrakesh123
@yourrakesh123 11 ай бұрын
This is an awesome tutorial that I was searching on youtube. Excellent explanation on setting up GWLB and firewall in multi-account environment through TGW. :)
@dmohan16
@dmohan16 2 жыл бұрын
Excellent explanation..!! well articulated with the traffic flows.
@johnjiang2470
@johnjiang2470 2 жыл бұрын
Ralph, great presentation!
@subramanyasastry517
@subramanyasastry517 11 ай бұрын
Thank you for the detailed diagram and explanation. Keep up the Good Job.
@trandat7274
@trandat7274 2 жыл бұрын
Many thanks Ralph, your video is very very great.... Thanks a lot !!!!
@zubairqureshi9063
@zubairqureshi9063 2 жыл бұрын
Awesome presentation and explanation 👍🏻
@abelcarvajalgil6705
@abelcarvajalgil6705 2 ай бұрын
Thank you for your job. Excellent explication traffic North-South East-West
@seph2x538
@seph2x538 3 жыл бұрын
Bravo !! Awesome presentation and walkthrough the use case. I am going to lab it asap. Thank you
@shankarmaheswaran5435
@shankarmaheswaran5435 3 жыл бұрын
Hi Joe, Have you done setup with the Lab? I need some help.
@psaneem
@psaneem 3 жыл бұрын
Awesome presentation
@arindamsaha9052
@arindamsaha9052 2 жыл бұрын
That was an awesome explanation.
@alinaqvi385
@alinaqvi385 5 ай бұрын
Excellent and thank you, Mr. Carter.
@ralphcarter769
@ralphcarter769 2 ай бұрын
You are very welcome
@edgarssimanis9381
@edgarssimanis9381 2 жыл бұрын
Thanks, awesome explanation
@user-sf1cv5np6o
@user-sf1cv5np6o 8 ай бұрын
Awesome video
@abdallahezat8604
@abdallahezat8604 2 жыл бұрын
great effort !
@user-xs6hr1ol7d
@user-xs6hr1ol7d 2 жыл бұрын
Quite Impressive !
@ryanmilton2643
@ryanmilton2643 3 жыл бұрын
Fantastic presentation. I’m working on exactly this model.
@muhammadyaqoob9777
@muhammadyaqoob9777 3 жыл бұрын
Hi Ryan, How is deployment going? I am working on the same design maybe good to share some notes? let me know thanks
@ryanmilton2643
@ryanmilton2643 3 жыл бұрын
@@muhammadyaqoob9777 it is going well. Mine is a bigger environment. Not 100% out of POC
@muhammadyaqoob9777
@muhammadyaqoob9777 3 жыл бұрын
@@ryanmilton2643 Thanks, I am close to completion for my deployment of this with PA's cluster in multiple regions.
@djangosmissingfingers
@djangosmissingfingers Ай бұрын
This is awesome. I would love to see an explanation of how this changes with Overlay routing and app-vpc to subint matching as well.
@gkorten
@gkorten 3 жыл бұрын
Hey, Ralph been a while. Thanks for sharing the info, good stuff.
@ralphcarter769
@ralphcarter769 3 жыл бұрын
Anytime pal!
@gkorten
@gkorten 3 жыл бұрын
@@ralphcarter769 Ralph can you give me a call at work. This is about a few projects I am working on.
@mehulpruthi
@mehulpruthi Жыл бұрын
Thank a ton Ralph, request you to teach us about Azure GWLB with PAN Firewalls for Inbound, Outbound and East-West Security
@vennempify
@vennempify 3 жыл бұрын
This is fantastic. Though this subnetting would require a public IP on the management interface.
@benjaminlugger2908
@benjaminlugger2908 3 жыл бұрын
Hi! This is a great presentation! It provides a very good starting point. To get the full architecture picture it would be great to address the following in addtion: 1. On-Premise connectivity via VPN and DX attachment; 2. TGW Attachment to keep AWS cloud traffic in the cloud. 3. Internet Inbound (Ingress) with two AZs (e.g. How the introduction of a third party Load Balancer (e.g. f5) could look like; Ad3) I know that AWS provides the ALB and NLB beside the GWLB but some companies want to rely on their load balancers (e.g. f5) across all environments (on-premise and cloud (aws, azure, google, ...). The presentation is really great and I have my personal understanding on how points 1. 2. and 3. fit into that architecture but it would be great to see others (your view Ralph on that). All the best. THX YOU AGAIN! ROUTING MAKES SENSE NOW :-D
@DARK_YT242
@DARK_YT242 3 жыл бұрын
Great Job. awesome presentation!! .Want to deploy in my environment. Do you have the next session of the implementation video?.
@vyaspranav
@vyaspranav 3 жыл бұрын
awesome...
@tc-cm5ml
@tc-cm5ml 3 жыл бұрын
Awesome video..great work Ralph...Could you please also do a video referencing the same architecture but without Gateway LB and with usual VPN/VPC attachments...that would be a great help for me since the Gateway LB is not available in my region yet...Thanks a lot!!!
@Shanayathukral
@Shanayathukral 2 жыл бұрын
Hi Raplh, great video! U mentioned about part 2 on how to ? May i know when u are doing that video?
@PhaseHabit
@PhaseHabit 3 жыл бұрын
This is a great video! In the inbound flow, where are you authenticating (e.g., via mTLS, UN/PW) the traffic? Is that needed in this case? I'm also assuming that if you didn't want East-West Prod to Dev traffic, you'd block that at the Palo (though I guess if you needed to refresh DEV from PROD for testing/development purposes) - is that right? Or is that simply looking for malicious content and session state and the GWLBe01/2 is looking at it's route table and if no there, would send a 404.
@thecatbellayuki
@thecatbellayuki 3 жыл бұрын
That was freaking awesome. Just one question though. The GWLBe03 subnet cidr should've been /28 instead of /26 and thus the subsequent change in the DEMO-Prod-Ingreass_RT. Or am I missing something?
@RicardoGutierrezOchoa
@RicardoGutierrezOchoa 3 жыл бұрын
Great job. QQ, what software did you use for the presentation? was it PPT?
@sskavuri
@sskavuri 3 жыл бұрын
Thank you for the great design and explanation. If you don’t mind, can you share the diagram?
@chatchaikomrangded960
@chatchaikomrangded960 3 жыл бұрын
Best one!!
@ralphcarter769
@ralphcarter769 3 жыл бұрын
Glad you liked it.
@vainilk78
@vainilk78 Жыл бұрын
Ralph, that was a great session. I want to know what charting tool you used ? I want to learn more about it to map my AWS drawing design better.
@CreateWithDre
@CreateWithDre 2 жыл бұрын
Love it Ralph. Got this one working manually and traffic is flowing inbound/outbound as intended. Only issue is with Global Protect, my VPN users can't seem to connect to internal resources. Is that because the return path is coming back across the GWLB, but the forwarding to a server (is going across the TGW)? Any suggestions/articles that you know of addressing this concern? Thanks so much and keep up the great work.
@hakinen4000
@hakinen4000 Жыл бұрын
Hi Ralph, thank you for posting this, truly helped this newbie understand how AWS GW can be used. I do have a question, what if this is trying to be deployed in an environment that already has PA's setup across multiple sites and these sites connect to the Core (via IPSEC), where most of our on-prem apps reside? Thanks again for the great and easy to understand video
@tc-cm5ml
@tc-cm5ml 3 жыл бұрын
Hi Ralph, do we need public IPs to be assigned compulsorily on any of the devices in the architecture you designed to make it work, please let me know... Thanks a lot!
@networkers5037
@networkers5037 3 жыл бұрын
if you can share any document or video of deployment guide for manual integration of GWLB and PAN VM series it will be helpful.
@tdelnatte
@tdelnatte 7 ай бұрын
Great job, very grateful. Jusk ask, is it possible to create a gateway loadbalancer endpoint cross account environnement typically for inbound from internet?
@chrisholman7468
@chrisholman7468 Жыл бұрын
I found this very insightful (well earned kudos to you Ralph), but when trying to implement it, I can't make it support a load balanced application. The Prod IGW routing table only routes to AZ 1a, therefore the app is not load balanced. I've been trying to figure out how to make this possible, but no luck so far. Any hints welcome.
@arunabhbiswas3210
@arunabhbiswas3210 9 ай бұрын
Very few videos available on KZbin that talks about this architecture, but yours one is unique and best of all. Quick question about the outbound traffic (north-south) that is flowing from PROD vpc to the internet via security vpc transit attachment, that has only routes to security vpc, prod vpc and dev vpc, but i dont see any entry that tells it to redirect this outbound traffic to security vpc. Then how come it will reach to security vpc transit eni? can you please explain this?
@David-bc2oj
@David-bc2oj Жыл бұрын
What would the architecture look like if I needed to put a WAF in front of the http/https ports? The WAF would be working together with the Palo Alto NGFW to handle non-http/https traffic
@dnyaneshwarnarale88
@dnyaneshwarnarale88 3 жыл бұрын
Awesome content. I do have One Doubt where to map Elastic IP's, from those IP's server will be accessible? Can anyone knows please let us know?
@mmantilla2010
@mmantilla2010 3 жыл бұрын
Hi, just amazing video, very good walk through. I wanted to ask in this architecture. Where would the on premise vpn or direct connect terminate? Would it be another spoke VPC? Second question is, where would I put a VPN firewall like an ASav for Anyconnect VPN. Thank you
@muhammadyaqoob9777
@muhammadyaqoob9777 3 жыл бұрын
Hi Maikel, in my opinion what you can do is create a separate RT for Direct Connect and VPN in TGW and enable routing to and from on-prem through that.
@gattupalliaditya7244
@gattupalliaditya7244 3 жыл бұрын
Can Demo-Security IGW be used for inbound traffic too instead of Demo-Production IGW ?
@syedlogin
@syedlogin 2 жыл бұрын
Well explained, appreciate it. as you were mentioning, do you have deployment video as well?
@nonatercesa2865
@nonatercesa2865 2 жыл бұрын
Very nice video; well explained. Thanks Ralph. I have a few questions though. Is there a reason why you did not allow the Palo Alto (PA) firewalls to act as the NAT gateway? I have a new AWS deployment with PA firewalls in active-passive mode but one of the infrastructure requirement is to allow the PA to act as the NAT gateway, and as the VPN Gateway because the intention is to create a site-to-site (S2S) IPSec tunnel between the PA in AWS and another PA that is on-premise. I like to know if I will still need a GWLB in a case where the PAs are in active-passive and not in active-active. Awaiting your reply. Thanks again.
@matheusbertimansano9693
@matheusbertimansano9693 2 жыл бұрын
i m curious as well to know if is required
@vennempify
@vennempify 2 жыл бұрын
@@matheusbertimansano9693 Apparently this is supported with a slightly different architecture - I'm playing with this now and have the above architecture working as expected. I believe if you wanted to NAT out thru PAT it would rrequire another feature called Overlay Routing which released in 10.0.3 or 10.0.4.
@marekwugmailcom
@marekwugmailcom 3 жыл бұрын
Very clear and helpful presentation. Thanks ! But with EC2 with EIP is simple.The only question is how to protect ALBs (either internal or internet-facing). In case of internet-facing Will ingress routing help to route traffic to GLB endpoint ?
@ralphcarter769
@ralphcarter769 3 жыл бұрын
Yes, Ingress traffic > GWLBe > ALB, follow the routing.
@looqmern
@looqmern 2 жыл бұрын
Hi, how does one configure the palo alto to use one interface for inbound and outbound traffic and what does the security policy look like? Thanks
@Shanayathukral
@Shanayathukral 2 жыл бұрын
I think it will be same zone to same zone policy, but your source destination subnet will be used as a differentiator.
@shamstabrez2986
@shamstabrez2986 Жыл бұрын
plz make video on cloud wan with complete details n hands on lab
@srinivasanandababu2701
@srinivasanandababu2701 Жыл бұрын
Can we use VPCe instead of traversing via Transit GW?
@dougclendening5896
@dougclendening5896 2 жыл бұрын
What if you don't want inline and just want to mirror the TGW traffic off to a security vpc to be analyzed?
@teibidh
@teibidh 2 жыл бұрын
You want VPC Traffic Mirroring for this, I believe.
@jayf9553
@jayf9553 7 ай бұрын
ON the data port of the Palo's do we set up zones? I feel like you lose the ability to apply zones if you're routing all traffic though that data port without applying multiple zones. How do you apply multiple zones to one interface?
@maxcavalera917
@maxcavalera917 2 ай бұрын
You can use sub-interfaces(this will over complicate the design) or you can just control traffic based on src/dst instead of zones (you will need to deny all intra-zone traffic that is allow by default)
@randicalib
@randicalib 2 жыл бұрын
hi, where can i watch the configuration video?
@s_dee_13
@s_dee_13 2 жыл бұрын
Does this support ipv6?
@bx1803
@bx1803 Жыл бұрын
Is there a template for this available?
Step by step guide to build Centralized architecture with AWS GWLB
40:03
Palo Alto Networks LIVEcommunity
Рет қаралды 12 М.
ТАМАЕВ УНИЧТОЖИЛ CLS ВЕНГАЛБИ! Конфликт с Ахмедом?!
25:37
Дарю Самокат Скейтеру !
00:42
Vlad Samokatchik
Рет қаралды 6 МЛН
когда повзрослела // EVA mash
00:40
EVA mash
Рет қаралды 4,5 МЛН
1 or 2?🐄
00:12
Kan Andrey
Рет қаралды 55 МЛН
AWS Gateway Loadbalancer East West inspection with Fortigate Firewall
48:13
Gateway Load Balancers
13:41
LearnCantrill
Рет қаралды 15 М.
AWS re:Inforce 2019: The Fundamentals of AWS Cloud Security (FND209-R)
48:05
Amazon Web Services
Рет қаралды 154 М.
Advanced Architectures with AWS Transit Gateway
41:51
Amazon Web Services
Рет қаралды 36 М.
Deep-dive Workshop: CloudGuard Network Security on AWS (Canada)
2:31:32
Check Point Software
Рет қаралды 3,5 М.
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
VA-PC
Рет қаралды 1,8 МЛН
$1 vs $100,000 Slow Motion Camera!
0:44
Hafu Go
Рет қаралды 20 МЛН
Собери ПК и Получи 10,000₽
1:00
build monsters
Рет қаралды 2,6 МЛН
Hisense Official Flagship Store Hisense is the champion What is going on?
0:11
Special Effects Funny 44
Рет қаралды 3 МЛН