Egress FireNet for AWS

Parameter Description

Name

A name for the Transit FireNet

Cloud (prepopulated if creating on an existing Transit gateway)

Select Cloud type: Standard, GovCloud, China

Account (pre-populated if creating on an existing Transit gateway)

The cloud access account for creating the Transit FireNet Gateway.

Region (pre-populated if creating on an existing Transit gateway)

The cloud region in which to create the Transit FireNet Gateway.

VPC/VNet

The VPC or VNet in the selected region in which to create the Spoke Gateway.

Instance Size

Minimum size: c5.xlarge

The minimum size may vary if HPE is enabled.

High Performance Encryption (HPE)

Turn On HPE for the FireNet deployment, for higher throughputs.

Peer to Spoke Gateways (optional)

Select pre-existing Spoke gateways to connect to the Transit FireNet gateway. Traffic from these Spoke gateways is sent to the Transit FireNet gateway for firewall inspection.

Attach to Subnet

FireNet is launched in this public subnet.

Public IP

Allocate a new, static public IP address to the new Transit gateway.

Gateway Load Balancer

Slide On to enable the AWS Gateway Load Balancer (differs from the Native AWS Load Balancer, which is part of the AWS TGW FireNet workflow).

If the Gateway Load Balancer option was turned On as part of the Transit Gateway creation workflow (for AWS), it will be On and disabled in the Transit FireNet creation workflow. If the Gateway Load Balancer option was left Off as part of the Transit Gateway creation workflow (for AWS), it will be Off and disabled in the Transit FireNet creation workflow.

Traffic Inspection

Off by default. This means that only egress traffic will be inspected/routed to a firewall.

Egress

Egress (Internet-bound) traffic inspection is On and disabled by default.