How to secure DMZ and Internal traffic inside AWS Concept

Showing results for 
Show  only  | Search instead for 
Did you mean: 

How to secure DMZ and Internal traffic inside AWS Concept

L2 Linker

Hi all,


First, I 'm pretty with AWS...

VPC is configured in the range

I have a firewall (PA VM) deployed with 3 interfaces (Untrust, DMZ, Trust).

Untrust:, Internal : (FW.1) , DMZ : (FW.1).

I created 3 Routing tables for each zone and assign each subnet into the RT.

I changed the default route for routing table DMZ and Internal, pointing to the FW.


Because each routing table (focusing on DMZ and Trust here) has a default entry ( pointing to local that cannot be changed, it's possible to pass traffic from DMZ to Internal WITHOUT traversing the firewall.

I created two self referencing security group (SG-TRUST and SG-DMZ) and assign it to each ENI (FW ENI and host ENI).

Now traffic is blocked (so bypassing fw is not possible anymore) but routes needs to be added on each host to pass traffic from Trust to DMZ (and reverse)


ON DMZ Host gw (FW)


ON Internal Host gw (FW)


Is it possible to avoid creating this static routes on the host and force traffic to traverse the firewall (configuration on the routing table) ?






L4 Transporter

AWS does not allow of the addition of more specific routes in a VPC.  Due to this, you would typically look at a multi-VPC model to achieve east-west inspection between instances.  We have examples of these types of deployments in our AWS reference architecture.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!