- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-10-2025 10:32 AM - edited 12-10-2025 02:24 PM
AWS recently launched the Regional NAT Gateway, an option that simplifies outbound traffic handling in Virtual Private Clouds (VPCs). For customers using Cloud NGFW for AWS, this feature reduces architectural overhead, increases resiliency, and maintains a strong security posture for egress traffic.
This post details how Cloud NGFW uses the Regional NAT Gateway to establish a scalable, secure outbound inspection architecture.
Cloud NGFW for AWS is a managed, cloud-native firewall service that delivers:
Cloud NGFW acts as the primary inspection layer for outbound traffic. The VPC routing table directs internet-bound flows from workloads to Cloud NGFW endpoints (vpce-xxxx). The firewall inspects the traffic using Palo Alto Networks security services and forwards permitted traffic to the next-hop egress component.
Historically, this next hop required a Network Address Translation (NAT) Gateway in every Availability Zone (AZ). The Regional NAT Gateway replaces this requirement with a single regional resource.
Legacy egress architectures utilizing Cloud NGFW required specific infrastructure per AZ:
This approach demanded significant infrastructure management. The Regional NAT Gateway consolidates the NAT layer while Cloud NGFW retains its role as the inspection point.
Key architectural changes:
In this architecture, Cloud NGFW enforces mandatory policies for all outbound traffic, while the Regional NAT Gateway handles address translation.
Outbound Traffic Flow:
Return traffic traverses the same path, maintaining session consistency.
Architectural Diagram
Note: Recommended only for the Distributed Deployment Model.
Cloud NGFW endpoints operate at the AZ level. Previously, this required matching per-AZ NAT gateways and route tables. Regional NAT Gateway removes this dependency. Administrators configure a single route from the firewall endpoints to the Regional NAT Gateway, regardless of the originating AZ.
Cloud NGFW ensures high availability by provisioning endpoints in each AZ. The Regional NAT Gateway provides built-in regional resiliency. If a specific AZ becomes unhealthy, the NAT layer remains available, preventing traffic blackholes.
The Regional NAT Gateway supports a single NAT resource for the entire region, simplifying Resource Access Manager (RAM) sharing and multi-account setups.
Follow these steps to integrate Cloud NGFW with a Regional NAT Gateway.
From the SCM console, create the Cloud NGFW instance. This provisions the NGFW endpoints in your selected Availability Zones.
In the Amazon VPC Console:
Update the workload subnet route tables to direct default traffic (0.0.0.0/0) to the Cloud NGFW Endpoint ID (vpce-xxxx) specific to that AZ.
Update the route table associated with the Cloud NGFW endpoint subnets:
The AWS Regional NAT Gateway reduces infrastructure complexity for Cloud NGFW deployments. By consolidating the NAT layer and abstracting AZ-level routing, this architecture delivers a resilient, easier-to-maintain egress path while Cloud NGFW continues to enforce security standards.