<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to secure DMZ and Internal traffic inside AWS Concept in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-dmz-and-internal-traffic-inside-aws-concept/m-p/333189#M835</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, I 'm pretty with AWS...&lt;/P&gt;&lt;P&gt;VPC is configured in the range 10.0.0.0/16.&lt;/P&gt;&lt;P&gt;I have a firewall (PA VM) deployed with 3 interfaces (Untrust, DMZ, Trust).&lt;/P&gt;&lt;P&gt;Untrust: 10.0.0.0/24, Internal : 10.0.1.0/24 (FW.1) , DMZ : 10.0.99.0/24 (FW.1).&lt;/P&gt;&lt;P&gt;I created 3 Routing tables for each zone and assign each subnet into the RT.&lt;/P&gt;&lt;P&gt;I changed the default route for routing table DMZ and Internal, pointing to the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because each routing table (focusing on DMZ and Trust here) has a default entry (10.0.0.0/16) pointing to local that cannot be changed, it's possible to pass traffic from DMZ to Internal WITHOUT traversing the firewall.&lt;/P&gt;&lt;P&gt;I created two self referencing security group (SG-TRUST and SG-DMZ) and assign it to each ENI (FW ENI and host ENI).&lt;/P&gt;&lt;P&gt;Now traffic is blocked (so bypassing fw is not possible anymore) but routes needs to be added on each host to pass traffic from Trust to DMZ (and reverse)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ON DMZ Host&lt;/P&gt;&lt;P&gt;10.0.1.0/24 gw 10.0.1.99.1 (FW)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ON Internal Host&lt;/P&gt;&lt;P&gt;10.0.99.0/24 gw 10.0.1.1 (FW)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to avoid creating this static routes on the host and force traffic to traverse the firewall (configuration on the routing table) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jun 2020 14:32:08 GMT</pubDate>
    <dc:creator>slp-security</dc:creator>
    <dc:date>2020-06-12T14:32:08Z</dc:date>
    <item>
      <title>How to secure DMZ and Internal traffic inside AWS Concept</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-dmz-and-internal-traffic-inside-aws-concept/m-p/333189#M835</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, I 'm pretty with AWS...&lt;/P&gt;&lt;P&gt;VPC is configured in the range 10.0.0.0/16.&lt;/P&gt;&lt;P&gt;I have a firewall (PA VM) deployed with 3 interfaces (Untrust, DMZ, Trust).&lt;/P&gt;&lt;P&gt;Untrust: 10.0.0.0/24, Internal : 10.0.1.0/24 (FW.1) , DMZ : 10.0.99.0/24 (FW.1).&lt;/P&gt;&lt;P&gt;I created 3 Routing tables for each zone and assign each subnet into the RT.&lt;/P&gt;&lt;P&gt;I changed the default route for routing table DMZ and Internal, pointing to the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because each routing table (focusing on DMZ and Trust here) has a default entry (10.0.0.0/16) pointing to local that cannot be changed, it's possible to pass traffic from DMZ to Internal WITHOUT traversing the firewall.&lt;/P&gt;&lt;P&gt;I created two self referencing security group (SG-TRUST and SG-DMZ) and assign it to each ENI (FW ENI and host ENI).&lt;/P&gt;&lt;P&gt;Now traffic is blocked (so bypassing fw is not possible anymore) but routes needs to be added on each host to pass traffic from Trust to DMZ (and reverse)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ON DMZ Host&lt;/P&gt;&lt;P&gt;10.0.1.0/24 gw 10.0.1.99.1 (FW)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ON Internal Host&lt;/P&gt;&lt;P&gt;10.0.99.0/24 gw 10.0.1.1 (FW)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to avoid creating this static routes on the host and force traffic to traverse the firewall (configuration on the routing table) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 14:32:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-dmz-and-internal-traffic-inside-aws-concept/m-p/333189#M835</guid>
      <dc:creator>slp-security</dc:creator>
      <dc:date>2020-06-12T14:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to secure DMZ and Internal traffic inside AWS Concept</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-dmz-and-internal-traffic-inside-aws-concept/m-p/333197#M836</link>
      <description>&lt;P&gt;AWS does not allow of the addition of more specific routes in a VPC.&amp;nbsp; Due to this, you would typically look at a multi-VPC model to achieve east-west inspection between instances.&amp;nbsp; We have examples of these types of deployments in our AWS reference architecture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/reference-architectures/aws" target="_blank"&gt;https://www.paloaltonetworks.com/resources/reference-architectures/aws&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 15:05:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/how-to-secure-dmz-and-internal-traffic-inside-aws-concept/m-p/333197#M836</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-06-12T15:05:14Z</dc:date>
    </item>
  </channel>
</rss>

