DESIGN - AWS Gateway Load-Balancer with PAN Firewalls for Inbound, Outbound and East-West Security

Поділитися
Вставка
  • Опубліковано 9 лют 2025

КОМЕНТАРІ • 78

  • @mylesmcveigh3555
    @mylesmcveigh3555 2 дні тому

    This video helped me understand AWS network design/routing more than any other video I've found yet. We need more content like this!

  • @yourrakesh123
    @yourrakesh123 Рік тому

    This is an awesome tutorial that I was searching on youtube. Excellent explanation on setting up GWLB and firewall in multi-account environment through TGW. :)

  • @ADV-IT
    @ADV-IT 2 роки тому +1

    Great detailed explanation, thanks!

  • @BreathingBadminton
    @BreathingBadminton Рік тому

    Thank you for the detailed diagram and explanation. Keep up the Good Job.

  • @n8goodman
    @n8goodman 3 роки тому +1

    You just saved me so much time. Thank you for making this!

  • @VirtualizeStuff
    @VirtualizeStuff 2 роки тому +1

    Excellent job Ralph explaining the GWLB and the awesome packet walk! Learned a ton!

  • @jessicaalcantara122
    @jessicaalcantara122 2 місяці тому

    Thank you so much for this explanation, it was amazing!

  • @alinaqvi385
    @alinaqvi385 Рік тому

    Excellent and thank you, Mr. Carter.

  • @trandat7274
    @trandat7274 2 роки тому

    Many thanks Ralph, your video is very very great.... Thanks a lot !!!!

  • @johnjiang2470
    @johnjiang2470 2 роки тому

    Ralph, great presentation!

  • @vardanvardanyan884
    @vardanvardanyan884 4 роки тому +1

    Awesome presentation. Very clearly explained with packet walk.
    Thank you!

  • @ryanmilton2643
    @ryanmilton2643 3 роки тому +2

    Fantastic presentation. I’m working on exactly this model.

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 роки тому

      Hi Ryan, How is deployment going? I am working on the same design maybe good to share some notes? let me know thanks

    • @ryanmilton2643
      @ryanmilton2643 3 роки тому +1

      @@muhammadyaqoob9777 it is going well. Mine is a bigger environment. Not 100% out of POC

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 роки тому

      @@ryanmilton2643 Thanks, I am close to completion for my deployment of this with PA's cluster in multiple regions.

  • @damianfernandez1
    @damianfernandez1 3 роки тому +1

    Very grateful for putting this out. Cleared all my doubts.
    Amazingly well done !

  • @abelcarvajalgil6705
    @abelcarvajalgil6705 9 місяців тому

    Thank you for your job. Excellent explication traffic North-South East-West

  • @dmohan16
    @dmohan16 3 роки тому

    Excellent explanation..!! well articulated with the traffic flows.

  • @protossss
    @protossss 4 роки тому +5

    Hi! This is a great presentation! It provides a very good starting point. To get the full architecture picture it would be great to address the following in addtion: 1. On-Premise connectivity via VPN and DX attachment; 2. TGW Attachment to keep AWS cloud traffic in the cloud. 3. Internet Inbound (Ingress) with two AZs (e.g. How the introduction of a third party Load Balancer (e.g. f5) could look like; Ad3) I know that AWS provides the ALB and NLB beside the GWLB but some companies want to rely on their load balancers (e.g. f5) across all environments (on-premise and cloud (aws, azure, google, ...). The presentation is really great and I have my personal understanding on how points 1. 2. and 3. fit into that architecture but it would be great to see others (your view Ralph on that). All the best. THX YOU AGAIN! ROUTING MAKES SENSE NOW :-D

  • @muhammadyaqoob9777
    @muhammadyaqoob9777 4 роки тому +1

    Hi Ralph, thanks for sharing amazing content! Thanks Mo

  • @seph2x538
    @seph2x538 4 роки тому +1

    Bravo !! Awesome presentation and walkthrough the use case.
    I am going to lab it asap.
    Thank you

  • @zubairqureshi9063
    @zubairqureshi9063 3 роки тому

    Awesome presentation and explanation 👍🏻

  • @djangosmissingfingers
    @djangosmissingfingers 8 місяців тому

    This is awesome. I would love to see an explanation of how this changes with Overlay routing and app-vpc to subint matching as well.

  • @mehulpruthi
    @mehulpruthi 2 роки тому

    Thank a ton Ralph, request you to teach us about Azure GWLB with PAN Firewalls for Inbound, Outbound and East-West Security

  • @arindamsaha9052
    @arindamsaha9052 2 роки тому

    That was an awesome explanation.

  • @psaneem
    @psaneem 3 роки тому +1

    Awesome presentation

  • @gkorten
    @gkorten 4 роки тому +1

    Hey, Ralph been a while. Thanks for sharing the info, good stuff.

    • @ralphcarter769
      @ralphcarter769  3 роки тому

      Anytime pal!

    • @gkorten
      @gkorten 3 роки тому

      @@ralphcarter769 Ralph can you give me a call at work. This is about a few projects I am working on.

  • @vennempify
    @vennempify 3 роки тому +2

    This is fantastic. Though this subnetting would require a public IP on the management interface.

  • @yuding1833
    @yuding1833 6 місяців тому

    Great Video !

  • @Shanayathukral
    @Shanayathukral 3 роки тому

    Hi Raplh, great video! U mentioned about part 2 on how to ? May i know when u are doing that video?

  • @edgarssimanis9381
    @edgarssimanis9381 2 роки тому

    Thanks, awesome explanation

  • @tdelnatte
    @tdelnatte Рік тому

    Great job, very grateful.
    Jusk ask, is it possible to create a gateway loadbalancer endpoint cross account environnement typically for inbound from internet?

  • @arunabhbiswas3210
    @arunabhbiswas3210 Рік тому

    Very few videos available on UA-cam that talks about this architecture, but yours one is unique and best of all. Quick question about the outbound traffic (north-south) that is flowing from PROD vpc to the internet via security vpc transit attachment, that has only routes to security vpc, prod vpc and dev vpc, but i dont see any entry that tells it to redirect this outbound traffic to security vpc. Then how come it will reach to security vpc transit eni? can you please explain this?

  • @geoffreydelnatte
    @geoffreydelnatte Рік тому

    Awesome video

  • @DARK_YT242
    @DARK_YT242 3 роки тому

    Great Job. awesome presentation!! .Want to deploy in my environment. Do you have the next session of the implementation video?.

  • @David-bc2oj
    @David-bc2oj 2 роки тому

    What would the architecture look like if I needed to put a WAF in front of the http/https ports? The WAF would be working together with the Palo Alto NGFW to handle non-http/https traffic

  • @sskavuri
    @sskavuri 3 роки тому +1

    Thank you for the great design and explanation. If you don’t mind, can you share the diagram?

  • @hakinen4000
    @hakinen4000 Рік тому

    Hi Ralph, thank you for posting this, truly helped this newbie understand how AWS GW can be used. I do have a question, what if this is trying to be deployed in an environment that already has PA's setup across multiple sites and these sites connect to the Core (via IPSEC), where most of our on-prem apps reside? Thanks again for the great and easy to understand video

  • @chrisholman7468
    @chrisholman7468 2 роки тому

    I found this very insightful (well earned kudos to you Ralph), but when trying to implement it, I can't make it support a load balanced application.
    The Prod IGW routing table only routes to AZ 1a, therefore the app is not load balanced. I've been trying to figure out how to make this possible, but no luck so far. Any hints welcome.

  • @abdallahezat8604
    @abdallahezat8604 3 роки тому

    great effort !

  • @thecatbellayuki
    @thecatbellayuki 3 роки тому +1

    That was freaking awesome. Just one question though. The GWLBe03 subnet cidr should've been /28 instead of /26 and thus the subsequent change in the DEMO-Prod-Ingreass_RT. Or am I missing something?

  • @srinivasanandababu2701
    @srinivasanandababu2701 2 роки тому

    Can we use VPCe instead of traversing via Transit GW?

  • @tc-cm5ml
    @tc-cm5ml 4 роки тому +2

    Awesome video..great work Ralph...Could you please also do a video referencing the same architecture but without Gateway LB and with usual VPN/VPC attachments...that would be a great help for me since the Gateway LB is not available in my region yet...Thanks a lot!!!

  • @jayf9553
    @jayf9553 Рік тому

    ON the data port of the Palo's do we set up zones? I feel like you lose the ability to apply zones if you're routing all traffic though that data port without applying multiple zones. How do you apply multiple zones to one interface?

    • @maxcavalera917
      @maxcavalera917 9 місяців тому

      You can use sub-interfaces(this will over complicate the design) or you can just control traffic based on src/dst instead of zones (you will need to deny all intra-zone traffic that is allow by default)

  • @tc-cm5ml
    @tc-cm5ml 4 роки тому +1

    Hi Ralph, do we need public IPs to be assigned compulsorily on any of the devices in the architecture you designed to make it work, please let me know... Thanks a lot!

  • @vainilk78
    @vainilk78 2 роки тому

    Ralph, that was a great session. I want to know what charting tool you used ? I want to learn more about it to map my AWS drawing design better.

  • @春华秋实-f8o
    @春华秋实-f8o 3 роки тому

    Quite Impressive !

  • @randicalib
    @randicalib 2 роки тому

    hi, where can i watch the configuration video?

  • @CreateWithDre
    @CreateWithDre 3 роки тому

    Love it Ralph. Got this one working manually and traffic is flowing inbound/outbound as intended. Only issue is with Global Protect, my VPN users can't seem to connect to internal resources. Is that because the return path is coming back across the GWLB, but the forwarding to a server (is going across the TGW)? Any suggestions/articles that you know of addressing this concern? Thanks so much and keep up the great work.

  • @bx1803
    @bx1803 2 роки тому

    Is there a template for this available?

  • @networkers5037
    @networkers5037 3 роки тому

    if you can share any document or video of deployment guide for manual integration of GWLB and PAN VM series it will be helpful.

  • @dnyaneshwarnarale88
    @dnyaneshwarnarale88 3 роки тому

    Awesome content. I do have One Doubt where to map Elastic IP's, from those IP's server will be accessible? Can anyone knows please let us know?

  • @gattupalliaditya7244
    @gattupalliaditya7244 3 роки тому

    Can Demo-Security IGW be used for inbound traffic too instead of Demo-Production IGW ?

  • @shamstabrez2986
    @shamstabrez2986 2 роки тому

    plz make video on cloud wan with complete details n hands on lab

  • @nonatercesa2865
    @nonatercesa2865 3 роки тому +1

    Very nice video; well explained. Thanks Ralph. I have a few questions though. Is there a reason why you did not allow the Palo Alto (PA) firewalls to act as the NAT gateway? I have a new AWS deployment with PA firewalls in active-passive mode but one of the infrastructure requirement is to allow the PA to act as the NAT gateway, and as the VPN Gateway because the intention is to create a site-to-site (S2S) IPSec tunnel between the PA in AWS and another PA that is on-premise. I like to know if I will still need a GWLB in a case where the PAs are in active-passive and not in active-active. Awaiting your reply. Thanks again.

    • @matheusbertimansano9693
      @matheusbertimansano9693 3 роки тому

      i m curious as well to know if is required

    • @vennempify
      @vennempify 3 роки тому +1

      @@matheusbertimansano9693 Apparently this is supported with a slightly different architecture - I'm playing with this now and have the above architecture working as expected. I believe if you wanted to NAT out thru PAT it would rrequire another feature called Overlay Routing which released in 10.0.3 or 10.0.4.

  • @PhaseHabit
    @PhaseHabit 3 роки тому

    This is a great video! In the inbound flow, where are you authenticating (e.g., via mTLS, UN/PW) the traffic? Is that needed in this case? I'm also assuming that if you didn't want East-West Prod to Dev traffic, you'd block that at the Palo (though I guess if you needed to refresh DEV from PROD for testing/development purposes) - is that right? Or is that simply looking for malicious content and session state and the GWLBe01/2 is looking at it's route table and if no there, would send a 404.

  • @RicardoGutierrezOchoa
    @RicardoGutierrezOchoa 4 роки тому +1

    Great job. QQ, what software did you use for the presentation? was it PPT?

  • @looqmern
    @looqmern 3 роки тому

    Hi, how does one configure the palo alto to use one interface for inbound and outbound traffic and what does the security policy look like?
    Thanks

    • @Shanayathukral
      @Shanayathukral 3 роки тому

      I think it will be same zone to same zone policy, but your source destination subnet will be used as a differentiator.

  • @syedlogin
    @syedlogin 3 роки тому

    Well explained, appreciate it. as you were mentioning, do you have deployment video as well?

  • @dougclendening5896
    @dougclendening5896 3 роки тому

    What if you don't want inline and just want to mirror the TGW traffic off to a security vpc to be analyzed?

    • @teibidh
      @teibidh 2 роки тому

      You want VPC Traffic Mirroring for this, I believe.

  • @mmantilla2010
    @mmantilla2010 4 роки тому +1

    Hi, just amazing video, very good walk through. I wanted to ask in this architecture. Where would the on premise vpn or direct connect terminate? Would it be another spoke VPC? Second question is, where would I put a VPN firewall like an ASav for Anyconnect VPN. Thank you

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 4 роки тому

      Hi Maikel, in my opinion what you can do is create a separate RT for Direct Connect and VPN in TGW and enable routing to and from on-prem through that.

  • @s_dee_13
    @s_dee_13 3 роки тому

    Does this support ipv6?

  • @chatchaikomrangded960
    @chatchaikomrangded960 3 роки тому

    Best one!!

  • @vyaspranav
    @vyaspranav 3 роки тому

    awesome...

  • @mohammadchavoshi5568
    @mohammadchavoshi5568 6 місяців тому

    🙏🏽🙏🏽🙏🏽🙏🏽🙏🏽