<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS Privatelink for Hub and Spoke Topology in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-privatelink-for-hub-and-spoke-topology/m-p/1001183#M2316</link>
    <description>&lt;P&gt;HI all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need some assistance with someone who has familiarity with deploying VM-Series FW in AWS w/ AWS Privatelink....our organization currently has an existing environment that we are currently leveraging TGW's for Interconnectivity between Accounts w/ a side of VPC Peering, tends to be a bit of a rodeo. This overall seems costly compared to Privatelink when you factor in the Cost of Attachments plus Data Process GigaByte (TGW) vs PetaByte (AWS Privatelink).&amp;nbsp; Our company has entertained using Palo's as the Central Network Hub for all Ingress/Egress Traffic in terms of Inter-Zone Connectivity (VPC-to-VPC, Internet-to-VPC, VPC-to-Internet).&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We also have to adhere to the PCI-DSS Data Plane Standard in terms of Secure-to-NonSecure Traffic Flow, an which it would be:&lt;BR /&gt;&lt;STRONG&gt;&lt;U&gt;&lt;BR /&gt;Green VPC Environment (Non-Secure)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Non-Secure-to-Non-Secure (not inspected | intrazone | bi-directional)&lt;/LI&gt;
&lt;LI&gt;Non-Secure to Secure (Inspected | interzone | bi-directional)&lt;/LI&gt;
&lt;LI&gt;Non-Secure to Internet (Inspected | interzone | one-way}&lt;/LI&gt;
&lt;LI&gt;DMZ to Internet (Inspected | interzone | bi-directional)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Red VPC Environment&amp;nbsp; (Secure)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Secure-to-Non-Secure&amp;nbsp; (inspected | inter-zone | one-way communiction to Proxy)&lt;/LI&gt;
&lt;LI&gt;Secure to Secure (not inspected | intrazone | bi-directional)&lt;/LI&gt;
&lt;LI&gt;Secure to Internet (Inspected | interzone | bi-directional w/Proxy sits in DMZ)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the Kicker both environments would still need to communicate with our existing (rodeo) environment until we can consolidate to our new environment.&amp;nbsp; I have the following questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;For DMZ Reachability into our environment via the Public Palo Interface under other Public IP's, can that be handle via creating Elastic IPs in AWS and then tie the routing back towards the Palo so it can target a NAT Policy?&lt;/LI&gt;
&lt;LI&gt;Since Red VPC Environment would need to transit via Green VPC Environment to leverage internet would both VPC's need to be attached to TGW in order to follow proper communication with Inspection being done at both FW's or can this be tackled with VPC Peering?&lt;/LI&gt;
&lt;LI&gt;Spoke w/ AWS on this and they lean towards more Proprietary options with IPS/IDS and preferred we used TGW for interconnectivity between Consumer VPC's (Secure and Non-Secure) and Service VPC's (Secure and Non-Secure), but I just see that as costly vs AWS PrivateLink.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Attaching ad-hoc Design&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jan 2025 22:36:07 GMT</pubDate>
    <dc:creator>Murph</dc:creator>
    <dc:date>2025-01-08T22:36:07Z</dc:date>
    <item>
      <title>AWS Privatelink for Hub and Spoke Topology</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-privatelink-for-hub-and-spoke-topology/m-p/1001183#M2316</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need some assistance with someone who has familiarity with deploying VM-Series FW in AWS w/ AWS Privatelink....our organization currently has an existing environment that we are currently leveraging TGW's for Interconnectivity between Accounts w/ a side of VPC Peering, tends to be a bit of a rodeo. This overall seems costly compared to Privatelink when you factor in the Cost of Attachments plus Data Process GigaByte (TGW) vs PetaByte (AWS Privatelink).&amp;nbsp; Our company has entertained using Palo's as the Central Network Hub for all Ingress/Egress Traffic in terms of Inter-Zone Connectivity (VPC-to-VPC, Internet-to-VPC, VPC-to-Internet).&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We also have to adhere to the PCI-DSS Data Plane Standard in terms of Secure-to-NonSecure Traffic Flow, an which it would be:&lt;BR /&gt;&lt;STRONG&gt;&lt;U&gt;&lt;BR /&gt;Green VPC Environment (Non-Secure)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Non-Secure-to-Non-Secure (not inspected | intrazone | bi-directional)&lt;/LI&gt;
&lt;LI&gt;Non-Secure to Secure (Inspected | interzone | bi-directional)&lt;/LI&gt;
&lt;LI&gt;Non-Secure to Internet (Inspected | interzone | one-way}&lt;/LI&gt;
&lt;LI&gt;DMZ to Internet (Inspected | interzone | bi-directional)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Red VPC Environment&amp;nbsp; (Secure)&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Secure-to-Non-Secure&amp;nbsp; (inspected | inter-zone | one-way communiction to Proxy)&lt;/LI&gt;
&lt;LI&gt;Secure to Secure (not inspected | intrazone | bi-directional)&lt;/LI&gt;
&lt;LI&gt;Secure to Internet (Inspected | interzone | bi-directional w/Proxy sits in DMZ)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the Kicker both environments would still need to communicate with our existing (rodeo) environment until we can consolidate to our new environment.&amp;nbsp; I have the following questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;For DMZ Reachability into our environment via the Public Palo Interface under other Public IP's, can that be handle via creating Elastic IPs in AWS and then tie the routing back towards the Palo so it can target a NAT Policy?&lt;/LI&gt;
&lt;LI&gt;Since Red VPC Environment would need to transit via Green VPC Environment to leverage internet would both VPC's need to be attached to TGW in order to follow proper communication with Inspection being done at both FW's or can this be tackled with VPC Peering?&lt;/LI&gt;
&lt;LI&gt;Spoke w/ AWS on this and they lean towards more Proprietary options with IPS/IDS and preferred we used TGW for interconnectivity between Consumer VPC's (Secure and Non-Secure) and Service VPC's (Secure and Non-Secure), but I just see that as costly vs AWS PrivateLink.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Attaching ad-hoc Design&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 22:36:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-privatelink-for-hub-and-spoke-topology/m-p/1001183#M2316</guid>
      <dc:creator>Murph</dc:creator>
      <dc:date>2025-01-08T22:36:07Z</dc:date>
    </item>
  </channel>
</rss>

