Public Subnet Filtering and Distributed Cloud Firewall
Public Subnet Filtering (PSF) Gateways provide ingress and egress security for AWS public subnets where instances have public IP addresses.Prerequisites
If the following conditions are met you can enforce Distributed Cloud Firewall (DCF) rules on Public Subnet Filtering (PSF) Gateways:-
PSF gateways must be deployed in Controller version 7.2.4820
PSF gateways deployed prior to Controller version 7.2.4820 require an image upgrade before DCF rules can be enforced on PSF gateways.
- DCF feature is enabled: this automatically makes the DCF on PSF Gateways feature available.
- Enforcement on PSF Gateways setting is enabled
Enforcing DCF Rules on PSF Gateways
To enforce DCF rules on PSF Gateways:- Ensure that you have created your PSF Gateways.
- Create a SmartGroup that contains resources from the VPC associated with the PSF gateway. This should be a CIDR-based SmartGroup that contains IP addresses.
- (optional) Create a URL or Domain WebGroup.
- (optional) Create a ExternalGroup that contains a Country or Threat Feed to use as the Source or Destination in the subsequent DCF rule.
- Create a DCF rule that:
- Uses the above SmartGroup as a Source or Destination.
- Uses the WebGroup you created.
- Uses the above ExternalGroup (that can contain a Country or a Threat Feed) as a Source or Destination (select the opposite of what you selected for the SmartGroup).
The DCF rule is not enforced if it terminates on a PSF subnet that is not monitored.