Firewall Network Design Patterns¶
1. Hybrid with TGW¶
FireNet supports AWS Transit Gateway (TGW), as shown below.
2. Hybrid with Insane Mode¶
FireNet supports AWS Transit (TGW) with Insane Mode,
3. Native TGW integration¶
In the Release 4.6, the hybrid deployment can be using native AWS Direct Connect Gateway.
4. Multi Region Transit with Native TGW integration¶
Connect to on-prem with AWS DXGW and use Aviatrix Edge gateway to connect to multiple regions.
5. Multi Region Transit with Aviatrix Edge¶
Connect to on-prem with an Aviatrix Edge gateway for both hybrid and multi regions.
6. Two Firewall Networks¶
You can deploy two Firewall Networks, one dedicated for VPC to VPC traffic inspection and another for Egress inspection.
Note you must follow the configuration sequence below:
- Disable the Traffic Inspection of the FireNet domain intended for Egress control.
- Enable Egress Control for FireNet domain intended for Egress control.
- Build connection policies.
7. Ingress Traffic Inspection¶
Follow the Ingress firewall instructions to deploy the solution for Ingress traffic inspection.
8. Aviatrix FQDN in FireNet for Egress Control¶
When Aviatrix FQDN gateway is deployed in a VPC, it uses a public IP address to perform both whitelisting and NAT function for Internet bound traffic. Sometimes these Internet bound traffic are partner API calls and these partners require to limit the number of IP addresses for each customer of theirs. In such situation, you can deploy FQDN in a centralized manner as shown in the diagram below.
For more information, follow the FireNet workflow.