DESIGN - AWS Gateway Load-Balancer with PAN Firewalls for Inbound, Outbound and East-West Security

Поделиться
HTML-код
  • Опубликовано: 26 авг 2024

Комментарии • 76

  • @djangosmissingfingers
    @djangosmissingfingers 3 месяца назад

    This is awesome. I would love to see an explanation of how this changes with Overlay routing and app-vpc to subint matching as well.

  • @VirtualizeStuff
    @VirtualizeStuff 2 года назад +1

    Excellent job Ralph explaining the GWLB and the awesome packet walk! Learned a ton!

  • @ADV-IT
    @ADV-IT Год назад +1

    Great detailed explanation, thanks!

  • @yourrakesh123
    @yourrakesh123 Год назад

    This is an awesome tutorial that I was searching on youtube. Excellent explanation on setting up GWLB and firewall in multi-account environment through TGW. :)

  • @abelcarvajalgil6705
    @abelcarvajalgil6705 3 месяца назад

    Thank you for your job. Excellent explication traffic North-South East-West

  • @BreathingBadminton
    @BreathingBadminton Год назад

    Thank you for the detailed diagram and explanation. Keep up the Good Job.

  • @mehulpruthi
    @mehulpruthi Год назад

    Thank a ton Ralph, request you to teach us about Azure GWLB with PAN Firewalls for Inbound, Outbound and East-West Security

  • @yuding1833
    @yuding1833 Месяц назад

    Great Video !

  • @n8goodman
    @n8goodman 3 года назад +1

    You just saved me so much time. Thank you for making this!

  • @ryanmilton2643
    @ryanmilton2643 3 года назад +2

    Fantastic presentation. I’m working on exactly this model.

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 года назад

      Hi Ryan, How is deployment going? I am working on the same design maybe good to share some notes? let me know thanks

    • @ryanmilton2643
      @ryanmilton2643 3 года назад +1

      @@muhammadyaqoob9777 it is going well. Mine is a bigger environment. Not 100% out of POC

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 года назад

      @@ryanmilton2643 Thanks, I am close to completion for my deployment of this with PA's cluster in multiple regions.

  • @benjaminlugger2908
    @benjaminlugger2908 3 года назад +3

    Hi! This is a great presentation! It provides a very good starting point. To get the full architecture picture it would be great to address the following in addtion: 1. On-Premise connectivity via VPN and DX attachment; 2. TGW Attachment to keep AWS cloud traffic in the cloud. 3. Internet Inbound (Ingress) with two AZs (e.g. How the introduction of a third party Load Balancer (e.g. f5) could look like; Ad3) I know that AWS provides the ALB and NLB beside the GWLB but some companies want to rely on their load balancers (e.g. f5) across all environments (on-premise and cloud (aws, azure, google, ...). The presentation is really great and I have my personal understanding on how points 1. 2. and 3. fit into that architecture but it would be great to see others (your view Ralph on that). All the best. THX YOU AGAIN! ROUTING MAKES SENSE NOW :-D

  • @trandat7274
    @trandat7274 2 года назад

    Many thanks Ralph, your video is very very great.... Thanks a lot !!!!

  • @vardanvardanyan884
    @vardanvardanyan884 3 года назад +1

    Awesome presentation. Very clearly explained with packet walk.
    Thank you!

  • @damianfernandez1
    @damianfernandez1 3 года назад +1

    Very grateful for putting this out. Cleared all my doubts.
    Amazingly well done !

  • @alinaqvi385
    @alinaqvi385 7 месяцев назад

    Excellent and thank you, Mr. Carter.

  • @vennempify
    @vennempify 3 года назад +2

    This is fantastic. Though this subnetting would require a public IP on the management interface.

  • @seph2x538
    @seph2x538 3 года назад +1

    Bravo !! Awesome presentation and walkthrough the use case.
    I am going to lab it asap.
    Thank you

  • @muhammadyaqoob9777
    @muhammadyaqoob9777 3 года назад +1

    Hi Ralph, thanks for sharing amazing content! Thanks Mo

  • @psaneem
    @psaneem 3 года назад +1

    Awesome presentation

  • @johnjiang2470
    @johnjiang2470 2 года назад

    Ralph, great presentation!

  • @dmohan16
    @dmohan16 3 года назад

    Excellent explanation..!! well articulated with the traffic flows.

  • @zubairqureshi9063
    @zubairqureshi9063 2 года назад

    Awesome presentation and explanation 👍🏻

  • @tdelnatte
    @tdelnatte 9 месяцев назад

    Great job, very grateful.
    Jusk ask, is it possible to create a gateway loadbalancer endpoint cross account environnement typically for inbound from internet?

  • @arunabhbiswas3210
    @arunabhbiswas3210 10 месяцев назад

    Very few videos available on RUclips that talks about this architecture, but yours one is unique and best of all. Quick question about the outbound traffic (north-south) that is flowing from PROD vpc to the internet via security vpc transit attachment, that has only routes to security vpc, prod vpc and dev vpc, but i dont see any entry that tells it to redirect this outbound traffic to security vpc. Then how come it will reach to security vpc transit eni? can you please explain this?

  • @arindamsaha9052
    @arindamsaha9052 2 года назад

    That was an awesome explanation.

  • @sskavuri
    @sskavuri 3 года назад +1

    Thank you for the great design and explanation. If you don’t mind, can you share the diagram?

  • @edgarssimanis9381
    @edgarssimanis9381 2 года назад

    Thanks, awesome explanation

  • @user-sf1cv5np6o
    @user-sf1cv5np6o 9 месяцев назад

    Awesome video

  • @Shanayathukral
    @Shanayathukral 2 года назад

    Hi Raplh, great video! U mentioned about part 2 on how to ? May i know when u are doing that video?

  • @gkorten
    @gkorten 3 года назад +1

    Hey, Ralph been a while. Thanks for sharing the info, good stuff.

    • @ralphcarter769
      @ralphcarter769  3 года назад

      Anytime pal!

    • @gkorten
      @gkorten 3 года назад

      @@ralphcarter769 Ralph can you give me a call at work. This is about a few projects I am working on.

  • @DARK_YT242
    @DARK_YT242 3 года назад

    Great Job. awesome presentation!! .Want to deploy in my environment. Do you have the next session of the implementation video?.

  • @David-bc2oj
    @David-bc2oj Год назад

    What would the architecture look like if I needed to put a WAF in front of the http/https ports? The WAF would be working together with the Palo Alto NGFW to handle non-http/https traffic

  • @thecatbellayuki
    @thecatbellayuki 3 года назад +1

    That was freaking awesome. Just one question though. The GWLBe03 subnet cidr should've been /28 instead of /26 and thus the subsequent change in the DEMO-Prod-Ingreass_RT. Or am I missing something?

  • @hakinen4000
    @hakinen4000 Год назад

    Hi Ralph, thank you for posting this, truly helped this newbie understand how AWS GW can be used. I do have a question, what if this is trying to be deployed in an environment that already has PA's setup across multiple sites and these sites connect to the Core (via IPSEC), where most of our on-prem apps reside? Thanks again for the great and easy to understand video

  • @tc-cm5ml
    @tc-cm5ml 3 года назад +2

    Awesome video..great work Ralph...Could you please also do a video referencing the same architecture but without Gateway LB and with usual VPN/VPC attachments...that would be a great help for me since the Gateway LB is not available in my region yet...Thanks a lot!!!

  • @chrisholman7468
    @chrisholman7468 Год назад

    I found this very insightful (well earned kudos to you Ralph), but when trying to implement it, I can't make it support a load balanced application.
    The Prod IGW routing table only routes to AZ 1a, therefore the app is not load balanced. I've been trying to figure out how to make this possible, but no luck so far. Any hints welcome.

  • @user-xs6hr1ol7d
    @user-xs6hr1ol7d 2 года назад

    Quite Impressive !

  • @marekwugmailcom
    @marekwugmailcom 3 года назад +2

    Very clear and helpful presentation. Thanks ! But with EC2 with EIP is simple.The only question is how to protect ALBs (either internal or internet-facing). In case of internet-facing Will ingress routing help to route traffic to GLB endpoint ?

    • @ralphcarter769
      @ralphcarter769  3 года назад

      Yes, Ingress traffic > GWLBe > ALB, follow the routing.

  • @tc-cm5ml
    @tc-cm5ml 3 года назад +1

    Hi Ralph, do we need public IPs to be assigned compulsorily on any of the devices in the architecture you designed to make it work, please let me know... Thanks a lot!

  • @RicardoGutierrezOchoa
    @RicardoGutierrezOchoa 3 года назад +1

    Great job. QQ, what software did you use for the presentation? was it PPT?

  • @vainilk78
    @vainilk78 2 года назад

    Ralph, that was a great session. I want to know what charting tool you used ? I want to learn more about it to map my AWS drawing design better.

  • @networkers5037
    @networkers5037 3 года назад

    if you can share any document or video of deployment guide for manual integration of GWLB and PAN VM series it will be helpful.

  • @abdallahezat8604
    @abdallahezat8604 2 года назад

    great effort !

  • @mohammadchavoshi5568
    @mohammadchavoshi5568 Месяц назад

    🙏🏽🙏🏽🙏🏽🙏🏽🙏🏽

  • @nonatercesa2865
    @nonatercesa2865 2 года назад +1

    Very nice video; well explained. Thanks Ralph. I have a few questions though. Is there a reason why you did not allow the Palo Alto (PA) firewalls to act as the NAT gateway? I have a new AWS deployment with PA firewalls in active-passive mode but one of the infrastructure requirement is to allow the PA to act as the NAT gateway, and as the VPN Gateway because the intention is to create a site-to-site (S2S) IPSec tunnel between the PA in AWS and another PA that is on-premise. I like to know if I will still need a GWLB in a case where the PAs are in active-passive and not in active-active. Awaiting your reply. Thanks again.

    • @matheusbertimansano9693
      @matheusbertimansano9693 2 года назад

      i m curious as well to know if is required

    • @vennempify
      @vennempify 2 года назад +1

      @@matheusbertimansano9693 Apparently this is supported with a slightly different architecture - I'm playing with this now and have the above architecture working as expected. I believe if you wanted to NAT out thru PAT it would rrequire another feature called Overlay Routing which released in 10.0.3 or 10.0.4.

  • @shamstabrez2986
    @shamstabrez2986 2 года назад

    plz make video on cloud wan with complete details n hands on lab

  • @jayf9553
    @jayf9553 8 месяцев назад

    ON the data port of the Palo's do we set up zones? I feel like you lose the ability to apply zones if you're routing all traffic though that data port without applying multiple zones. How do you apply multiple zones to one interface?

    • @maxcavalera917
      @maxcavalera917 4 месяца назад

      You can use sub-interfaces(this will over complicate the design) or you can just control traffic based on src/dst instead of zones (you will need to deny all intra-zone traffic that is allow by default)

  • @mmantilla2010
    @mmantilla2010 3 года назад +1

    Hi, just amazing video, very good walk through. I wanted to ask in this architecture. Where would the on premise vpn or direct connect terminate? Would it be another spoke VPC? Second question is, where would I put a VPN firewall like an ASav for Anyconnect VPN. Thank you

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 года назад

      Hi Maikel, in my opinion what you can do is create a separate RT for Direct Connect and VPN in TGW and enable routing to and from on-prem through that.

  • @srinivasanandababu2701
    @srinivasanandababu2701 Год назад

    Can we use VPCe instead of traversing via Transit GW?

  • @CreateWithDre
    @CreateWithDre 2 года назад

    Love it Ralph. Got this one working manually and traffic is flowing inbound/outbound as intended. Only issue is with Global Protect, my VPN users can't seem to connect to internal resources. Is that because the return path is coming back across the GWLB, but the forwarding to a server (is going across the TGW)? Any suggestions/articles that you know of addressing this concern? Thanks so much and keep up the great work.

  • @dnyaneshwarnarale88
    @dnyaneshwarnarale88 3 года назад

    Awesome content. I do have One Doubt where to map Elastic IP's, from those IP's server will be accessible? Can anyone knows please let us know?

  • @randicalib
    @randicalib 2 года назад

    hi, where can i watch the configuration video?

  • @bx1803
    @bx1803 Год назад

    Is there a template for this available?

  • @gattupalliaditya7244
    @gattupalliaditya7244 3 года назад

    Can Demo-Security IGW be used for inbound traffic too instead of Demo-Production IGW ?

  • @PhaseHabit
    @PhaseHabit 3 года назад

    This is a great video! In the inbound flow, where are you authenticating (e.g., via mTLS, UN/PW) the traffic? Is that needed in this case? I'm also assuming that if you didn't want East-West Prod to Dev traffic, you'd block that at the Palo (though I guess if you needed to refresh DEV from PROD for testing/development purposes) - is that right? Or is that simply looking for malicious content and session state and the GWLBe01/2 is looking at it's route table and if no there, would send a 404.

  • @syedlogin
    @syedlogin 3 года назад

    Well explained, appreciate it. as you were mentioning, do you have deployment video as well?

  • @vyaspranav
    @vyaspranav 3 года назад

    awesome...

  • @dougclendening5896
    @dougclendening5896 2 года назад

    What if you don't want inline and just want to mirror the TGW traffic off to a security vpc to be analyzed?

    • @teibidh
      @teibidh 2 года назад

      You want VPC Traffic Mirroring for this, I believe.

  • @s_dee_13
    @s_dee_13 3 года назад

    Does this support ipv6?

  • @looqmern
    @looqmern 3 года назад

    Hi, how does one configure the palo alto to use one interface for inbound and outbound traffic and what does the security policy look like?
    Thanks

    • @Shanayathukral
      @Shanayathukral 2 года назад

      I think it will be same zone to same zone policy, but your source destination subnet will be used as a differentiator.

  • @chatchaikomrangded960
    @chatchaikomrangded960 3 года назад

    Best one!!