This video helped me understand AWS network design/routing more than any other video I've found yet. We need more content like this!
@yourrakesh123 Жыл бұрын
This is an awesome tutorial that I was searching on youtube. Excellent explanation on setting up GWLB and firewall in multi-account environment through TGW. :)
@ADV-IT2 жыл бұрын
Great detailed explanation, thanks!
@VirtualizeStuff2 жыл бұрын
Excellent job Ralph explaining the GWLB and the awesome packet walk! Learned a ton!
@n8goodman3 жыл бұрын
You just saved me so much time. Thank you for making this!
@BreathingBadminton Жыл бұрын
Thank you for the detailed diagram and explanation. Keep up the Good Job.
@jessicaalcantara122Ай бұрын
Thank you so much for this explanation, it was amazing!
@damianfernandez13 жыл бұрын
Very grateful for putting this out. Cleared all my doubts. Amazingly well done !
@vardanvardanyan8844 жыл бұрын
Awesome presentation. Very clearly explained with packet walk. Thank you!
@alinaqvi385 Жыл бұрын
Excellent and thank you, Mr. Carter.
@ralphcarter7699 ай бұрын
You are very welcome
@trandat72742 жыл бұрын
Many thanks Ralph, your video is very very great.... Thanks a lot !!!!
@djangosmissingfingers8 ай бұрын
This is awesome. I would love to see an explanation of how this changes with Overlay routing and app-vpc to subint matching as well.
@johnjiang24702 жыл бұрын
Ralph, great presentation!
@protossss4 жыл бұрын
Hi! This is a great presentation! It provides a very good starting point. To get the full architecture picture it would be great to address the following in addtion: 1. On-Premise connectivity via VPN and DX attachment; 2. TGW Attachment to keep AWS cloud traffic in the cloud. 3. Internet Inbound (Ingress) with two AZs (e.g. How the introduction of a third party Load Balancer (e.g. f5) could look like; Ad3) I know that AWS provides the ALB and NLB beside the GWLB but some companies want to rely on their load balancers (e.g. f5) across all environments (on-premise and cloud (aws, azure, google, ...). The presentation is really great and I have my personal understanding on how points 1. 2. and 3. fit into that architecture but it would be great to see others (your view Ralph on that). All the best. THX YOU AGAIN! ROUTING MAKES SENSE NOW :-D
@abelcarvajalgil67059 ай бұрын
Thank you for your job. Excellent explication traffic North-South East-West
@dmohan163 жыл бұрын
Excellent explanation..!! well articulated with the traffic flows.
@muhammadyaqoob97774 жыл бұрын
Hi Ralph, thanks for sharing amazing content! Thanks Mo
@ryanmilton26433 жыл бұрын
Fantastic presentation. I’m working on exactly this model.
@muhammadyaqoob97773 жыл бұрын
Hi Ryan, How is deployment going? I am working on the same design maybe good to share some notes? let me know thanks
@ryanmilton26433 жыл бұрын
@@muhammadyaqoob9777 it is going well. Mine is a bigger environment. Not 100% out of POC
@muhammadyaqoob97773 жыл бұрын
@@ryanmilton2643 Thanks, I am close to completion for my deployment of this with PA's cluster in multiple regions.
@zubairqureshi90633 жыл бұрын
Awesome presentation and explanation 👍🏻
@mehulpruthi2 жыл бұрын
Thank a ton Ralph, request you to teach us about Azure GWLB with PAN Firewalls for Inbound, Outbound and East-West Security
@seph2x5384 жыл бұрын
Bravo !! Awesome presentation and walkthrough the use case. I am going to lab it asap. Thank you
@shankarmaheswaran54353 жыл бұрын
Hi Joe, Have you done setup with the Lab? I need some help.
@psaneem3 жыл бұрын
Awesome presentation
@arindamsaha90522 жыл бұрын
That was an awesome explanation.
@gkorten4 жыл бұрын
Hey, Ralph been a while. Thanks for sharing the info, good stuff.
@ralphcarter7693 жыл бұрын
Anytime pal!
@gkorten3 жыл бұрын
@@ralphcarter769 Ralph can you give me a call at work. This is about a few projects I am working on.
@vennempify3 жыл бұрын
This is fantastic. Though this subnetting would require a public IP on the management interface.
@edgarssimanis93812 жыл бұрын
Thanks, awesome explanation
@Shanayathukral3 жыл бұрын
Hi Raplh, great video! U mentioned about part 2 on how to ? May i know when u are doing that video?
@yuding18336 ай бұрын
Great Video !
@geoffreydelnatte Жыл бұрын
Awesome video
@sskavuri3 жыл бұрын
Thank you for the great design and explanation. If you don’t mind, can you share the diagram?
@tdelnatte Жыл бұрын
Great job, very grateful. Jusk ask, is it possible to create a gateway loadbalancer endpoint cross account environnement typically for inbound from internet?
@春华秋实-f8o3 жыл бұрын
Quite Impressive !
@hakinen4000 Жыл бұрын
Hi Ralph, thank you for posting this, truly helped this newbie understand how AWS GW can be used. I do have a question, what if this is trying to be deployed in an environment that already has PA's setup across multiple sites and these sites connect to the Core (via IPSEC), where most of our on-prem apps reside? Thanks again for the great and easy to understand video
@abdallahezat86043 жыл бұрын
great effort !
@arunabhbiswas3210 Жыл бұрын
Very few videos available on KZbin that talks about this architecture, but yours one is unique and best of all. Quick question about the outbound traffic (north-south) that is flowing from PROD vpc to the internet via security vpc transit attachment, that has only routes to security vpc, prod vpc and dev vpc, but i dont see any entry that tells it to redirect this outbound traffic to security vpc. Then how come it will reach to security vpc transit eni? can you please explain this?
@David-bc2oj2 жыл бұрын
What would the architecture look like if I needed to put a WAF in front of the http/https ports? The WAF would be working together with the Palo Alto NGFW to handle non-http/https traffic
@DARK_YT2423 жыл бұрын
Great Job. awesome presentation!! .Want to deploy in my environment. Do you have the next session of the implementation video?.
@chrisholman74682 жыл бұрын
I found this very insightful (well earned kudos to you Ralph), but when trying to implement it, I can't make it support a load balanced application. The Prod IGW routing table only routes to AZ 1a, therefore the app is not load balanced. I've been trying to figure out how to make this possible, but no luck so far. Any hints welcome.
@tc-cm5ml4 жыл бұрын
Awesome video..great work Ralph...Could you please also do a video referencing the same architecture but without Gateway LB and with usual VPN/VPC attachments...that would be a great help for me since the Gateway LB is not available in my region yet...Thanks a lot!!!
@vainilk782 жыл бұрын
Ralph, that was a great session. I want to know what charting tool you used ? I want to learn more about it to map my AWS drawing design better.
@thecatbellayuki3 жыл бұрын
That was freaking awesome. Just one question though. The GWLBe03 subnet cidr should've been /28 instead of /26 and thus the subsequent change in the DEMO-Prod-Ingreass_RT. Or am I missing something?
@srinivasanandababu27012 жыл бұрын
Can we use VPCe instead of traversing via Transit GW?
@jayf9553 Жыл бұрын
ON the data port of the Palo's do we set up zones? I feel like you lose the ability to apply zones if you're routing all traffic though that data port without applying multiple zones. How do you apply multiple zones to one interface?
@maxcavalera9179 ай бұрын
You can use sub-interfaces(this will over complicate the design) or you can just control traffic based on src/dst instead of zones (you will need to deny all intra-zone traffic that is allow by default)
@randicalib2 жыл бұрын
hi, where can i watch the configuration video?
@RicardoGutierrezOchoa4 жыл бұрын
Great job. QQ, what software did you use for the presentation? was it PPT?
@vyaspranav3 жыл бұрын
awesome...
@networkers50373 жыл бұрын
if you can share any document or video of deployment guide for manual integration of GWLB and PAN VM series it will be helpful.
@dnyaneshwarnarale883 жыл бұрын
Awesome content. I do have One Doubt where to map Elastic IP's, from those IP's server will be accessible? Can anyone knows please let us know?
@chatchaikomrangded9603 жыл бұрын
Best one!!
@ralphcarter7693 жыл бұрын
Glad you liked it.
@bx18032 жыл бұрын
Is there a template for this available?
@shamstabrez29862 жыл бұрын
plz make video on cloud wan with complete details n hands on lab
@tc-cm5ml4 жыл бұрын
Hi Ralph, do we need public IPs to be assigned compulsorily on any of the devices in the architecture you designed to make it work, please let me know... Thanks a lot!
@mohammadchavoshi55686 ай бұрын
🙏🏽🙏🏽🙏🏽🙏🏽🙏🏽
@CreateWithDre3 жыл бұрын
Love it Ralph. Got this one working manually and traffic is flowing inbound/outbound as intended. Only issue is with Global Protect, my VPN users can't seem to connect to internal resources. Is that because the return path is coming back across the GWLB, but the forwarding to a server (is going across the TGW)? Any suggestions/articles that you know of addressing this concern? Thanks so much and keep up the great work.
@gattupalliaditya72443 жыл бұрын
Can Demo-Security IGW be used for inbound traffic too instead of Demo-Production IGW ?
@dougclendening58963 жыл бұрын
What if you don't want inline and just want to mirror the TGW traffic off to a security vpc to be analyzed?
@teibidh2 жыл бұрын
You want VPC Traffic Mirroring for this, I believe.
@nonatercesa28653 жыл бұрын
Very nice video; well explained. Thanks Ralph. I have a few questions though. Is there a reason why you did not allow the Palo Alto (PA) firewalls to act as the NAT gateway? I have a new AWS deployment with PA firewalls in active-passive mode but one of the infrastructure requirement is to allow the PA to act as the NAT gateway, and as the VPN Gateway because the intention is to create a site-to-site (S2S) IPSec tunnel between the PA in AWS and another PA that is on-premise. I like to know if I will still need a GWLB in a case where the PAs are in active-passive and not in active-active. Awaiting your reply. Thanks again.
@matheusbertimansano96933 жыл бұрын
i m curious as well to know if is required
@vennempify3 жыл бұрын
@@matheusbertimansano9693 Apparently this is supported with a slightly different architecture - I'm playing with this now and have the above architecture working as expected. I believe if you wanted to NAT out thru PAT it would rrequire another feature called Overlay Routing which released in 10.0.3 or 10.0.4.
@s_dee_133 жыл бұрын
Does this support ipv6?
@looqmern3 жыл бұрын
Hi, how does one configure the palo alto to use one interface for inbound and outbound traffic and what does the security policy look like? Thanks
@Shanayathukral3 жыл бұрын
I think it will be same zone to same zone policy, but your source destination subnet will be used as a differentiator.
@mmantilla20104 жыл бұрын
Hi, just amazing video, very good walk through. I wanted to ask in this architecture. Where would the on premise vpn or direct connect terminate? Would it be another spoke VPC? Second question is, where would I put a VPN firewall like an ASav for Anyconnect VPN. Thank you
@muhammadyaqoob97774 жыл бұрын
Hi Maikel, in my opinion what you can do is create a separate RT for Direct Connect and VPN in TGW and enable routing to and from on-prem through that.
@syedlogin3 жыл бұрын
Well explained, appreciate it. as you were mentioning, do you have deployment video as well?
@PhaseHabit3 жыл бұрын
This is a great video! In the inbound flow, where are you authenticating (e.g., via mTLS, UN/PW) the traffic? Is that needed in this case? I'm also assuming that if you didn't want East-West Prod to Dev traffic, you'd block that at the Palo (though I guess if you needed to refresh DEV from PROD for testing/development purposes) - is that right? Or is that simply looking for malicious content and session state and the GWLBe01/2 is looking at it's route table and if no there, would send a 404.