<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Cloud NGFW for AWS (SCM Try and Buy): Deployment Guide with Terraform in Cloud NGFW for AWS Articles</title>
    <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-aws-articles/cloud-ngfw-for-aws-scm-try-and-buy-deployment-guide-with/ta-p/1243010</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H1&gt;&lt;SPAN&gt;Introduction:&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud NGFW for AWS&lt;/STRONG&gt; is a fully managed, cloud-native firewall service delivered by Palo Alto Networks and natively integrated with &lt;STRONG&gt;Amazon Web Services&lt;/STRONG&gt;. It combines the power of Palo Alto Networks’ industry-leading threat prevention technologies with the simplicity and scalability of an AWS-managed service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Built on machine learning–powered security capabilities, Cloud NGFW protects your AWS Virtual Private Clouds (VPCs) from advanced threats, exploits, malware, command-and-control activity, and risky applications—without requiring you to manage the underlying firewall infrastructure.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;Key Capabilities of Cloud NGFW for AWS&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;ML-Powered Threat Prevention:&lt;/STRONG&gt; Leverages real-time machine learning to block zero-day attacks, malware, and command-and-control traffic.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;App-ID &amp;amp; User-ID:&lt;/STRONG&gt; Classifies applications and users accurately for precise policy enforcement.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;URL Filtering:&lt;/STRONG&gt; Blocks access to risky or malicious websites using PAN-DB, a continuously updated cloud database.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;WildFire Analysis:&lt;/STRONG&gt; Provides cloud-based malware analysis and automatic signature generation.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Fully Managed Service:&lt;/STRONG&gt; Palo Alto Networks handle scaling, availability, health monitoring, and lifecycle operations.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Native AWS Integration:&lt;/STRONG&gt; Works seamlessly with VPCs, Subnet Routing, Transit Gateway, and VPC Endpoints—eliminating complex network engineering.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Elastic &amp;amp; Scalable:&lt;/STRONG&gt; Automatically scales to match your traffic needs.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Centralized Management:&lt;/STRONG&gt; All policies, logs, and firewall resources are configured through Strata Cloud Manager (SCM), providing a single, unified management plane.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H3&gt;About the Deployment Guide&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This guide explains how to configure and integrate Cloud NGFW for AWS using a &lt;STRONG&gt;combined deployment model&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a combined deployment model:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Hub-and-spoke&lt;/STRONG&gt; connectivity is used, with NGFW endpoints deployed across accounts.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;The hub, typically a transit gateway, serves as the central point of connectivity between VPCs, securing east-west and outbound traffic.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Cross-account NGFW endpoints in the application VPCs handle inbound traffic security.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using Cloud NGFW in this model ensures consistent, high-performance security across distributed AWS environments while reducing operational overhead.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Architecture Diagram&lt;/H2&gt;
&lt;DIV id="tinyMceEditorssyed_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.51.30 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70013i021AE48A9D72771F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.51.30 AM.png" alt="Screenshot 2025-11-14 at 11.51.30 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H2&gt;Prerequisites&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before you begin, you must have the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;AWS Account:&lt;/STRONG&gt; An AWS account with permissions to create VPCs, TGWs, EC2 instances, ALBs, and VPC Endpoints.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Terraform CLI:&lt;/STRONG&gt; Terraform installed on your local machine or on the EC2 instance you are running this from.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;EC2 Key Pair:&lt;/STRONG&gt; An existing EC2 Key Pair in your AWS account. You must know its exact name (e.g., prod-dev-key).&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Palo Alto Networks Strata Cloud Manager&amp;nbsp;:&lt;/STRONG&gt; You must have access to Strata Cloud Manager to deploy and manage the Cloud NGFW for AWS service.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Deploy the Cloud-NGFW via SCM (Try and Buy)&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before running the Terraform script, you must first deploy the firewall and create and push policies using Strata Cloud Manager..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Step 1:Access Cloud NGFW in SCM&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Log in to the Strata Cloud Manager (SCM) console.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Navigate to &lt;STRONG&gt;Configurations&lt;/STRONG&gt; → &lt;STRONG&gt;Cloud NGFWs&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click &lt;STRONG&gt;Get Started&lt;/STRONG&gt; to open the Cloud NGFW onboarding workflow.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.34.02 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70002iE7C2F15817A78B89/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.34.02 AM.png" alt="Screenshot 2025-11-14 at 10.34.02 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4&gt;Step 2: Begin the Firewall Creation Process&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click &lt;STRONG&gt;Create Cloud NGFW&lt;/STRONG&gt; to launch the setup wizard.&lt;/LI&gt;
&lt;/OL&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 2.44.35 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70003i617F3BABDBCBD21C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 2.44.35 PM.png" alt="Screenshot 2025-11-14 at 2.44.35 PM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4&gt;Step 3: Create a Cloud NGFW Resource for AWS&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the Create Cloud NGFW wizard, select &lt;STRONG&gt;Amazon Web Services&lt;/STRONG&gt; as your cloud provider.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click Next to continue.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Provide the required deployment details:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Firewall Name&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;AWS Region&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Availability Zone IDs&lt;/STRONG&gt; (choose one or more depending on your HA requirements)&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Allowlisted AWS Account :&lt;/STRONG&gt; Enter the AWS account ID where you want to deploy the Endpoints&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;P&gt;After completing the configuration fields, click &lt;STRONG&gt;Create and Deploy&lt;/STRONG&gt; to provision the firewall.&lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.34.53 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70004iD2F8EAA0B8794C19/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.34.53 AM.png" alt="Screenshot 2025-11-14 at 10.34.53 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Step 4:Explore Firewall Details&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After the deployment completes, you can click &lt;STRONG&gt;Check Firewall Details&lt;/STRONG&gt; to check the Status&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.37.23 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70007iA51E2B3B4B2570C5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.37.23 AM.png" alt="Screenshot 2025-11-14 at 10.37.23 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;The firewall deployment will take approximately 10 minutes. Once the status changes to &lt;STRONG&gt;Create Complete&lt;/STRONG&gt;, click the &lt;STRONG&gt;Firewall ID&lt;/STRONG&gt; to open the resource details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.55.02 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70008iD99EA95EC3452AE3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.55.02 AM.png" alt="Screenshot 2025-11-14 at 10.55.02 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Navigate to the &lt;STRONG&gt;Endpoint Management section&lt;/STRONG&gt; and copy the &lt;STRONG&gt;VPC Endpoint Service Name.&lt;/STRONG&gt; You’ll need this value when running the Terraform deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.57.30 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70005iB8C82E08713098CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.57.30 AM.png" alt="Screenshot 2025-11-14 at 10.57.30 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_5" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4&gt;Step 5: Configure a Baseline Policy&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Once deployed, the Cloud NGFW resource automatically registers as a device in Strata Cloud Manager.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Navigate to &lt;STRONG&gt;Configuration→ NGFW&lt;/STRONG&gt; and Prisma Access.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the &lt;STRONG&gt;Configuration Scope&lt;/STRONG&gt; section, select &lt;STRONG&gt;All Firewalls&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Go to &lt;STRONG&gt;Security Services → Security Policy&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click &lt;STRONG&gt;Add Rule&lt;/STRONG&gt; &amp;nbsp;to create a new security policy.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.14.10 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70009iB8A801E88C14FE44/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.14.10 AM.png" alt="Screenshot 2025-11-14 at 11.14.10 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Start by creating an &lt;STRONG&gt;Allow-All&lt;/STRONG&gt; rule. You can later refine and modify the rule set based on your specific use case and security requirements.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_8" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.17.10 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70006iAD1922E3CDBF722A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.17.10 AM.png" alt="Screenshot 2025-11-14 at 11.17.10 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Click Save once the rule configuration is complete.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the top-right corner, click &lt;STRONG&gt;Push Config&lt;/STRONG&gt; to send the configuration to the firewall resource.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the Admin Scope section, select &lt;STRONG&gt;All Admins.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Enter a brief description for the change.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Select the firewall resources you want to push the configuration to.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Click &lt;STRONG&gt;Push&lt;/STRONG&gt; to complete the configuration deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.22.03 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70010i3A69BE401A85FE53/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.22.03 AM.png" alt="Screenshot 2025-11-14 at 11.22.03 AM.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;
&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Your Cloud NGFW resource is now ready for Terraform to deploy endpoints.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Part 2: Deploy Infrastructure with Terraform&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This section walks you through deploying the Cloud NGFW demo environment using Terraform. Before proceeding, ensure you have downloaded all required Terraform files (&lt;CODE&gt;main.tf&lt;/CODE&gt;, &lt;CODE&gt;variables.tf&lt;/CODE&gt;, &lt;CODE&gt;terraform.tfvars&lt;/CODE&gt;, and the &lt;CODE&gt;modules/&lt;/CODE&gt; directory).&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H4&gt;&lt;STRONG&gt;Step 1: Clone the Repository&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Start by cloning the project repository to your local machine:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;git clone https://github.com/PaloAltoNetworks/CloudNGFW-Combined-Model-Try-and-Buy.git
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;HR /&gt;
&lt;H4&gt;&lt;STRONG&gt;Step 2: Configure Your Terraform Environment&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Verify that your project directory matches the expected structure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;├── main.tf
├── tgw.tf
├── providers.tf
├── variables.tf
├── README.md
├── terraform.tfvars
└── modules/
    ├── vpc-app/
    │   ├── main.tf
    │   ├── outputs.tf
    │   └── variables.tf
    └── vpc-security/
        ├── main.tf
        ├── outputs.tf
        └── variables.tf
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Open &lt;STRONG&gt;terraform.tfvars&lt;/STRONG&gt; and update the following values:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;EC2 Key Pair Name&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Replace with your existing AWS EC2 key pair:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-hcl"&gt;instance_key_name = "prod-xxxx-key"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Cloud NGFW Service Name&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use the service name copied from Secure Cloud Managed (SCM) earlier:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-hcl"&gt;gwlb_service_name = "com.amazonaws.vpce.us-east-1.vpce-svc-xxxxxxxxx"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H4&gt;&lt;STRONG&gt;Step 3: Deploy the Network Infrastructure&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the root of the Terraform project directory, run the commands below.&lt;/P&gt;
&lt;H6&gt;&amp;nbsp;&lt;/H6&gt;
&lt;H6&gt;&lt;STRONG&gt;Initialize Terraform&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;terraform init
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Review the Deployment Plan&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;terraform plan
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Deploy the Infrastructure&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;terraform apply
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Type &lt;STRONG&gt;yes&lt;/STRONG&gt; when prompted to begin deployment.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;STRONG&gt;What Terraform Will Create&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Terraform will automatically provision the full demo environment, including:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Three VPCs&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;1 Security VPC&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;2 Application VPCs&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;AWS Transit Gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Gateway Load Balancer Endpoints (Cloud NGFW)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Application Load Balancer (ALB)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Test EC2 instances&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Routing for both north-south and east-west traffic flows&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Deployment Output&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After the deployment completes, Terraform will output &lt;STRONG&gt;two ALB DNS names&lt;/STRONG&gt; that you can use for testing application traffic through Cloud NGFW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;7. Testing and Validation&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Test 1: Ingress Traffic (Internet → ALB → EC2)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Copy the &lt;/SPAN&gt;&lt;STRONG&gt;app_vpc_1_alb_dns&lt;/STRONG&gt;&lt;SPAN&gt; value from the Terraform output.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Paste this DNS name into your web browser.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Expected Result:&lt;/STRONG&gt;&lt;SPAN&gt; You should see a "Hello from ip-10-1-x-x... in application-vpc-1" message.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;SPAN&gt; In SCM → Log Viewer, verify you see logs for this traffic.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Validated Flow:&lt;/STRONG&gt; &lt;SPAN&gt;Internet → IGW → GWLB Endpoint (NGFW) → ALB → EC2&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Test 2: Outbound Traffic (EC2 → Internet)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Use AWS SSM Session Manager or a bastion host to access an EC2 instance in a &lt;/SPAN&gt;&lt;STRONG&gt;private subnet&lt;/STRONG&gt;&lt;SPAN&gt; of an App VPC.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Run a command to test internet access&amp;nbsp; &amp;nbsp; "&lt;/SPAN&gt;&lt;SPAN&gt;curl -v &lt;A href="http://www.google.com" target="_blank" rel="noopener"&gt;http://www.google.com"&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Expected Result:&lt;/STRONG&gt;&lt;SPAN&gt; You should receive a successful HTTP 200 OK response.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;SPAN&gt; In SCM → Log Viewer, verify you see logs for this outbound traffic.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Validated Flow:&lt;/STRONG&gt; &lt;SPAN&gt;EC2 Private Subnet → TGW → Security VPC → GWLB Endpoint (NGFW) → NAT Gateway → Internet&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Test 3: East-West Traffic (VPC-to-VPC)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;SSH to an EC2 instance in App VPC 1&amp;nbsp; (e.g., &lt;/SPAN&gt;&lt;SPAN&gt;10.1.x.x&lt;/SPAN&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Ping the private IP address of an EC2 instance in App VPC 2&amp;nbsp; (e.g., &lt;/SPAN&gt;&lt;SPAN&gt;10.2.x.x&lt;/SPAN&gt;&lt;SPAN&gt;).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Expected Result:&lt;/STRONG&gt;&lt;SPAN&gt; You should receive a successful ICMP reply.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;SPAN&gt; In SCM → Log Viewer, verify you see logs for this VPC-to-VPC traffic.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Validated Flow:&lt;/STRONG&gt; &lt;SPAN&gt;App VPC 1 → TGW → Security VPC → GWLB Endpoint (NGFW) → TGW → App VPC 2&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 03 Dec 2025 19:12:25 GMT</pubDate>
    <dc:creator>ssyed</dc:creator>
    <dc:date>2025-12-03T19:12:25Z</dc:date>
    <item>
      <title>Cloud NGFW for AWS (SCM Try and Buy): Deployment Guide with Terraform</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-aws-articles/cloud-ngfw-for-aws-scm-try-and-buy-deployment-guide-with/ta-p/1243010</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H1&gt;&lt;SPAN&gt;Introduction:&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud NGFW for AWS&lt;/STRONG&gt; is a fully managed, cloud-native firewall service delivered by Palo Alto Networks and natively integrated with &lt;STRONG&gt;Amazon Web Services&lt;/STRONG&gt;. It combines the power of Palo Alto Networks’ industry-leading threat prevention technologies with the simplicity and scalability of an AWS-managed service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Built on machine learning–powered security capabilities, Cloud NGFW protects your AWS Virtual Private Clouds (VPCs) from advanced threats, exploits, malware, command-and-control activity, and risky applications—without requiring you to manage the underlying firewall infrastructure.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;Key Capabilities of Cloud NGFW for AWS&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;ML-Powered Threat Prevention:&lt;/STRONG&gt; Leverages real-time machine learning to block zero-day attacks, malware, and command-and-control traffic.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;App-ID &amp;amp; User-ID:&lt;/STRONG&gt; Classifies applications and users accurately for precise policy enforcement.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;URL Filtering:&lt;/STRONG&gt; Blocks access to risky or malicious websites using PAN-DB, a continuously updated cloud database.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;WildFire Analysis:&lt;/STRONG&gt; Provides cloud-based malware analysis and automatic signature generation.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Fully Managed Service:&lt;/STRONG&gt; Palo Alto Networks handle scaling, availability, health monitoring, and lifecycle operations.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Native AWS Integration:&lt;/STRONG&gt; Works seamlessly with VPCs, Subnet Routing, Transit Gateway, and VPC Endpoints—eliminating complex network engineering.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Elastic &amp;amp; Scalable:&lt;/STRONG&gt; Automatically scales to match your traffic needs.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Centralized Management:&lt;/STRONG&gt; All policies, logs, and firewall resources are configured through Strata Cloud Manager (SCM), providing a single, unified management plane.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H3&gt;About the Deployment Guide&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This guide explains how to configure and integrate Cloud NGFW for AWS using a &lt;STRONG&gt;combined deployment model&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a combined deployment model:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Hub-and-spoke&lt;/STRONG&gt; connectivity is used, with NGFW endpoints deployed across accounts.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;The hub, typically a transit gateway, serves as the central point of connectivity between VPCs, securing east-west and outbound traffic.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Cross-account NGFW endpoints in the application VPCs handle inbound traffic security.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using Cloud NGFW in this model ensures consistent, high-performance security across distributed AWS environments while reducing operational overhead.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Architecture Diagram&lt;/H2&gt;
&lt;DIV id="tinyMceEditorssyed_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.51.30 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70013i021AE48A9D72771F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.51.30 AM.png" alt="Screenshot 2025-11-14 at 11.51.30 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H2&gt;Prerequisites&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before you begin, you must have the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;AWS Account:&lt;/STRONG&gt; An AWS account with permissions to create VPCs, TGWs, EC2 instances, ALBs, and VPC Endpoints.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Terraform CLI:&lt;/STRONG&gt; Terraform installed on your local machine or on the EC2 instance you are running this from.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;EC2 Key Pair:&lt;/STRONG&gt; An existing EC2 Key Pair in your AWS account. You must know its exact name (e.g., prod-dev-key).&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Palo Alto Networks Strata Cloud Manager&amp;nbsp;:&lt;/STRONG&gt; You must have access to Strata Cloud Manager to deploy and manage the Cloud NGFW for AWS service.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Deploy the Cloud-NGFW via SCM (Try and Buy)&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before running the Terraform script, you must first deploy the firewall and create and push policies using Strata Cloud Manager..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Step 1:Access Cloud NGFW in SCM&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Log in to the Strata Cloud Manager (SCM) console.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Navigate to &lt;STRONG&gt;Configurations&lt;/STRONG&gt; → &lt;STRONG&gt;Cloud NGFWs&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click &lt;STRONG&gt;Get Started&lt;/STRONG&gt; to open the Cloud NGFW onboarding workflow.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.34.02 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70002iE7C2F15817A78B89/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.34.02 AM.png" alt="Screenshot 2025-11-14 at 10.34.02 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4&gt;Step 2: Begin the Firewall Creation Process&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click &lt;STRONG&gt;Create Cloud NGFW&lt;/STRONG&gt; to launch the setup wizard.&lt;/LI&gt;
&lt;/OL&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 2.44.35 PM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70003i617F3BABDBCBD21C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 2.44.35 PM.png" alt="Screenshot 2025-11-14 at 2.44.35 PM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4&gt;Step 3: Create a Cloud NGFW Resource for AWS&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the Create Cloud NGFW wizard, select &lt;STRONG&gt;Amazon Web Services&lt;/STRONG&gt; as your cloud provider.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click Next to continue.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Provide the required deployment details:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Firewall Name&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;AWS Region&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Availability Zone IDs&lt;/STRONG&gt; (choose one or more depending on your HA requirements)&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Allowlisted AWS Account :&lt;/STRONG&gt; Enter the AWS account ID where you want to deploy the Endpoints&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;P&gt;After completing the configuration fields, click &lt;STRONG&gt;Create and Deploy&lt;/STRONG&gt; to provision the firewall.&lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.34.53 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70004iD2F8EAA0B8794C19/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.34.53 AM.png" alt="Screenshot 2025-11-14 at 10.34.53 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Step 4:Explore Firewall Details&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After the deployment completes, you can click &lt;STRONG&gt;Check Firewall Details&lt;/STRONG&gt; to check the Status&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.37.23 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70007iA51E2B3B4B2570C5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.37.23 AM.png" alt="Screenshot 2025-11-14 at 10.37.23 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;The firewall deployment will take approximately 10 minutes. Once the status changes to &lt;STRONG&gt;Create Complete&lt;/STRONG&gt;, click the &lt;STRONG&gt;Firewall ID&lt;/STRONG&gt; to open the resource details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.55.02 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70008iD99EA95EC3452AE3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.55.02 AM.png" alt="Screenshot 2025-11-14 at 10.55.02 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Navigate to the &lt;STRONG&gt;Endpoint Management section&lt;/STRONG&gt; and copy the &lt;STRONG&gt;VPC Endpoint Service Name.&lt;/STRONG&gt; You’ll need this value when running the Terraform deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 10.57.30 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70005iB8C82E08713098CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 10.57.30 AM.png" alt="Screenshot 2025-11-14 at 10.57.30 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_5" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H4&gt;Step 5: Configure a Baseline Policy&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Once deployed, the Cloud NGFW resource automatically registers as a device in Strata Cloud Manager.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Navigate to &lt;STRONG&gt;Configuration→ NGFW&lt;/STRONG&gt; and Prisma Access.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the &lt;STRONG&gt;Configuration Scope&lt;/STRONG&gt; section, select &lt;STRONG&gt;All Firewalls&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Go to &lt;STRONG&gt;Security Services → Security Policy&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Click &lt;STRONG&gt;Add Rule&lt;/STRONG&gt; &amp;nbsp;to create a new security policy.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.14.10 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70009iB8A801E88C14FE44/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.14.10 AM.png" alt="Screenshot 2025-11-14 at 11.14.10 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Start by creating an &lt;STRONG&gt;Allow-All&lt;/STRONG&gt; rule. You can later refine and modify the rule set based on your specific use case and security requirements.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="tinyMceEditorssyed_8" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.17.10 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70006iAD1922E3CDBF722A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.17.10 AM.png" alt="Screenshot 2025-11-14 at 11.17.10 AM.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Click Save once the rule configuration is complete.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the top-right corner, click &lt;STRONG&gt;Push Config&lt;/STRONG&gt; to send the configuration to the firewall resource.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;In the Admin Scope section, select &lt;STRONG&gt;All Admins.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Enter a brief description for the change.&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;Select the firewall resources you want to push the configuration to.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Click &lt;STRONG&gt;Push&lt;/STRONG&gt; to complete the configuration deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-11-14 at 11.22.03 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70010i3A69BE401A85FE53/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-11-14 at 11.22.03 AM.png" alt="Screenshot 2025-11-14 at 11.22.03 AM.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;
&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Your Cloud NGFW resource is now ready for Terraform to deploy endpoints.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Part 2: Deploy Infrastructure with Terraform&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This section walks you through deploying the Cloud NGFW demo environment using Terraform. Before proceeding, ensure you have downloaded all required Terraform files (&lt;CODE&gt;main.tf&lt;/CODE&gt;, &lt;CODE&gt;variables.tf&lt;/CODE&gt;, &lt;CODE&gt;terraform.tfvars&lt;/CODE&gt;, and the &lt;CODE&gt;modules/&lt;/CODE&gt; directory).&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H4&gt;&lt;STRONG&gt;Step 1: Clone the Repository&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Start by cloning the project repository to your local machine:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;git clone https://github.com/PaloAltoNetworks/CloudNGFW-Combined-Model-Try-and-Buy.git
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;HR /&gt;
&lt;H4&gt;&lt;STRONG&gt;Step 2: Configure Your Terraform Environment&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Verify that your project directory matches the expected structure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;├── main.tf
├── tgw.tf
├── providers.tf
├── variables.tf
├── README.md
├── terraform.tfvars
└── modules/
    ├── vpc-app/
    │   ├── main.tf
    │   ├── outputs.tf
    │   └── variables.tf
    └── vpc-security/
        ├── main.tf
        ├── outputs.tf
        └── variables.tf
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Open &lt;STRONG&gt;terraform.tfvars&lt;/STRONG&gt; and update the following values:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;EC2 Key Pair Name&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Replace with your existing AWS EC2 key pair:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-hcl"&gt;instance_key_name = "prod-xxxx-key"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Cloud NGFW Service Name&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use the service name copied from Secure Cloud Managed (SCM) earlier:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-hcl"&gt;gwlb_service_name = "com.amazonaws.vpce.us-east-1.vpce-svc-xxxxxxxxx"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H4&gt;&lt;STRONG&gt;Step 3: Deploy the Network Infrastructure&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the root of the Terraform project directory, run the commands below.&lt;/P&gt;
&lt;H6&gt;&amp;nbsp;&lt;/H6&gt;
&lt;H6&gt;&lt;STRONG&gt;Initialize Terraform&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;terraform init
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Review the Deployment Plan&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;terraform plan
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Deploy the Infrastructure&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;terraform apply
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Type &lt;STRONG&gt;yes&lt;/STRONG&gt; when prompted to begin deployment.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;STRONG&gt;What Terraform Will Create&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Terraform will automatically provision the full demo environment, including:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Three VPCs&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;1 Security VPC&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;2 Application VPCs&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;AWS Transit Gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Gateway Load Balancer Endpoints (Cloud NGFW)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Application Load Balancer (ALB)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Test EC2 instances&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Routing for both north-south and east-west traffic flows&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H5&gt;&lt;STRONG&gt;Deployment Output&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After the deployment completes, Terraform will output &lt;STRONG&gt;two ALB DNS names&lt;/STRONG&gt; that you can use for testing application traffic through Cloud NGFW.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;7. Testing and Validation&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Test 1: Ingress Traffic (Internet → ALB → EC2)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Copy the &lt;/SPAN&gt;&lt;STRONG&gt;app_vpc_1_alb_dns&lt;/STRONG&gt;&lt;SPAN&gt; value from the Terraform output.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Paste this DNS name into your web browser.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Expected Result:&lt;/STRONG&gt;&lt;SPAN&gt; You should see a "Hello from ip-10-1-x-x... in application-vpc-1" message.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;SPAN&gt; In SCM → Log Viewer, verify you see logs for this traffic.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Validated Flow:&lt;/STRONG&gt; &lt;SPAN&gt;Internet → IGW → GWLB Endpoint (NGFW) → ALB → EC2&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Test 2: Outbound Traffic (EC2 → Internet)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Use AWS SSM Session Manager or a bastion host to access an EC2 instance in a &lt;/SPAN&gt;&lt;STRONG&gt;private subnet&lt;/STRONG&gt;&lt;SPAN&gt; of an App VPC.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Run a command to test internet access&amp;nbsp; &amp;nbsp; "&lt;/SPAN&gt;&lt;SPAN&gt;curl -v &lt;A href="http://www.google.com" target="_blank" rel="noopener"&gt;http://www.google.com"&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Expected Result:&lt;/STRONG&gt;&lt;SPAN&gt; You should receive a successful HTTP 200 OK response.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;SPAN&gt; In SCM → Log Viewer, verify you see logs for this outbound traffic.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Validated Flow:&lt;/STRONG&gt; &lt;SPAN&gt;EC2 Private Subnet → TGW → Security VPC → GWLB Endpoint (NGFW) → NAT Gateway → Internet&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Test 3: East-West Traffic (VPC-to-VPC)&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;SSH to an EC2 instance in App VPC 1&amp;nbsp; (e.g., &lt;/SPAN&gt;&lt;SPAN&gt;10.1.x.x&lt;/SPAN&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Ping the private IP address of an EC2 instance in App VPC 2&amp;nbsp; (e.g., &lt;/SPAN&gt;&lt;SPAN&gt;10.2.x.x&lt;/SPAN&gt;&lt;SPAN&gt;).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Expected Result:&lt;/STRONG&gt;&lt;SPAN&gt; You should receive a successful ICMP reply.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;SPAN&gt; In SCM → Log Viewer, verify you see logs for this VPC-to-VPC traffic.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG style="font-family: inherit;"&gt;Validated Flow:&lt;/STRONG&gt; &lt;SPAN&gt;App VPC 1 → TGW → Security VPC → GWLB Endpoint (NGFW) → TGW → App VPC 2&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 03 Dec 2025 19:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-aws-articles/cloud-ngfw-for-aws-scm-try-and-buy-deployment-guide-with/ta-p/1243010</guid>
      <dc:creator>ssyed</dc:creator>
      <dc:date>2025-12-03T19:12:25Z</dc:date>
    </item>
  </channel>
</rss>

