<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS: GWLB endpoint mapping in Central Design Model in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-gwlb-endpoint-mapping-in-central-design-model/m-p/574442#M2090</link>
    <description>&lt;P&gt;I'm trying to understand the use of GWLB endpoint mapping in an AWS&amp;nbsp;&lt;EM&gt;Central Design Model&lt;/EM&gt;&amp;nbsp;deployment, other than separating VPC traffic flows from that of the GWLB itself - or separating outbound from east-west.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this model, the source zone on the firewall is determined by the&amp;nbsp;&lt;EM&gt;destination address&lt;/EM&gt; in the encapsulated packet, via the route table associated with the TGW attachment subnet pointing to the GWLBe in the inspection VPC. While overlay routing permits the use of inter-zone policies, all east/west flows are&amp;nbsp;&lt;EM&gt;intra&lt;/EM&gt;-zone and should mandate an override of the default intra-zone rule to&amp;nbsp;&lt;EM&gt;deny and log&amp;nbsp;&lt;/EM&gt;yet I have only once seen this in the reference architecture and observed implementations with&amp;nbsp;&lt;EM&gt;explicit&amp;nbsp;&lt;/EM&gt;intra-zone deny rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For pre-cloud engineers, these principles are counterintuitive, and the source of confusion observed in community posts concerning mapping VPCs to zones and the use of inter-zone policies, especially when looking at diagrams like this:&lt;/P&gt;
&lt;DIV id="tinyMceEditormb_equate_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mb_equate_1-1706168663602.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56860iBF4F8C9CC9EAF640/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mb_equate_1-1706168663602.png" alt="mb_equate_1-1706168663602.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;(src: P48, Securing Applications in AWS, Feb 2003)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mb_equate_3-1706168811998.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56862i4AC2AA7356C51F74/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mb_equate_3-1706168811998.png" alt="mb_equate_3-1706168811998.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In these diagrams, we see sub-interfaces depicted on the VM-series instances associated with application VPCs that also match the colour of the VPC. I find this misleading because&amp;nbsp;the source zone on the firewall can only be determined by the&amp;nbsp;&lt;EM&gt;destination address&lt;/EM&gt; in the packet explained above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The above schema is accurate for an&amp;nbsp;&lt;EM&gt;isolated design model&lt;/EM&gt;&amp;nbsp;where each VPC has a GWLBe in each AZ, and those GWLBe's can be associated with sub-interfaces in PAN-OS and therefore zones. However isolated designs are specifically intended for&amp;nbsp;&lt;EM&gt;isolated VPCs&amp;nbsp;&lt;/EM&gt;and does not support east/west flows between VPCs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mb_equate_4-1706173404403.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56865i0F127CD5EF21627E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mb_equate_4-1706173404403.png" alt="mb_equate_4-1706173404403.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because GWLB endpoints for outbound and east/west traffic in a Centralised (Centralized) model exist in the security VPC, and a GWLBe is determined by the route table associated with the TGW attachment subnet,&amp;nbsp;sub-interfaces and therefore zones can only be determined by the destination IP. There is (for now) no way to associate a VPC with a security zone in this model, nor do the traditional from/to zone principles apply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From a traffic engineering perspective, I find it easiest to think of this model as a firewall on a stick (perhaps with an external interface) and the TGW as a policy router (or a backbone connecting routers connected to each attachment). Since all outbound traffic from a spoke VPC (protected network) reaches the firewall over the same link, it all hits the same interface and therefore same zone. When reaching the firewall, all east/west traffic is returned on the same interface (i.e hairpinned,&amp;nbsp;&lt;EM&gt;intra-zone&lt;/EM&gt;) and should be denied by default, and with overlay routing all outbound traffic may still be from the same zone (unless you want the TGW attachment subnet route table to split outbound traffic to a dedicated GWLBe).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this piece of rubber duck debugging helps others questioning life reality and their place in the universe, and that the diagrams are updated to minimise confusion &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jan 2024 09:40:09 GMT</pubDate>
    <dc:creator>mb_equate</dc:creator>
    <dc:date>2024-01-25T09:40:09Z</dc:date>
    <item>
      <title>AWS: GWLB endpoint mapping in Central Design Model</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-gwlb-endpoint-mapping-in-central-design-model/m-p/574442#M2090</link>
      <description>&lt;P&gt;I'm trying to understand the use of GWLB endpoint mapping in an AWS&amp;nbsp;&lt;EM&gt;Central Design Model&lt;/EM&gt;&amp;nbsp;deployment, other than separating VPC traffic flows from that of the GWLB itself - or separating outbound from east-west.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this model, the source zone on the firewall is determined by the&amp;nbsp;&lt;EM&gt;destination address&lt;/EM&gt; in the encapsulated packet, via the route table associated with the TGW attachment subnet pointing to the GWLBe in the inspection VPC. While overlay routing permits the use of inter-zone policies, all east/west flows are&amp;nbsp;&lt;EM&gt;intra&lt;/EM&gt;-zone and should mandate an override of the default intra-zone rule to&amp;nbsp;&lt;EM&gt;deny and log&amp;nbsp;&lt;/EM&gt;yet I have only once seen this in the reference architecture and observed implementations with&amp;nbsp;&lt;EM&gt;explicit&amp;nbsp;&lt;/EM&gt;intra-zone deny rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For pre-cloud engineers, these principles are counterintuitive, and the source of confusion observed in community posts concerning mapping VPCs to zones and the use of inter-zone policies, especially when looking at diagrams like this:&lt;/P&gt;
&lt;DIV id="tinyMceEditormb_equate_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mb_equate_1-1706168663602.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56860iBF4F8C9CC9EAF640/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mb_equate_1-1706168663602.png" alt="mb_equate_1-1706168663602.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;(src: P48, Securing Applications in AWS, Feb 2003)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mb_equate_3-1706168811998.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56862i4AC2AA7356C51F74/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mb_equate_3-1706168811998.png" alt="mb_equate_3-1706168811998.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In these diagrams, we see sub-interfaces depicted on the VM-series instances associated with application VPCs that also match the colour of the VPC. I find this misleading because&amp;nbsp;the source zone on the firewall can only be determined by the&amp;nbsp;&lt;EM&gt;destination address&lt;/EM&gt; in the packet explained above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The above schema is accurate for an&amp;nbsp;&lt;EM&gt;isolated design model&lt;/EM&gt;&amp;nbsp;where each VPC has a GWLBe in each AZ, and those GWLBe's can be associated with sub-interfaces in PAN-OS and therefore zones. However isolated designs are specifically intended for&amp;nbsp;&lt;EM&gt;isolated VPCs&amp;nbsp;&lt;/EM&gt;and does not support east/west flows between VPCs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mb_equate_4-1706173404403.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56865i0F127CD5EF21627E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mb_equate_4-1706173404403.png" alt="mb_equate_4-1706173404403.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because GWLB endpoints for outbound and east/west traffic in a Centralised (Centralized) model exist in the security VPC, and a GWLBe is determined by the route table associated with the TGW attachment subnet,&amp;nbsp;sub-interfaces and therefore zones can only be determined by the destination IP. There is (for now) no way to associate a VPC with a security zone in this model, nor do the traditional from/to zone principles apply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From a traffic engineering perspective, I find it easiest to think of this model as a firewall on a stick (perhaps with an external interface) and the TGW as a policy router (or a backbone connecting routers connected to each attachment). Since all outbound traffic from a spoke VPC (protected network) reaches the firewall over the same link, it all hits the same interface and therefore same zone. When reaching the firewall, all east/west traffic is returned on the same interface (i.e hairpinned,&amp;nbsp;&lt;EM&gt;intra-zone&lt;/EM&gt;) and should be denied by default, and with overlay routing all outbound traffic may still be from the same zone (unless you want the TGW attachment subnet route table to split outbound traffic to a dedicated GWLBe).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this piece of rubber duck debugging helps others questioning life reality and their place in the universe, and that the diagrams are updated to minimise confusion &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 09:40:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-gwlb-endpoint-mapping-in-central-design-model/m-p/574442#M2090</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-01-25T09:40:09Z</dc:date>
    </item>
  </channel>
</rss>

