Deploying a Quick Start Centralized GWLB Security VPC with Customer Web Services

This Quick Start provides step-by-step instructions for deploying a web service secured by a CloudGuard Network Security VPC with Gateway Load Balancer.

The Quick Start is for users who want to publish an automatically scaled and dynamically secured web service on AWSClosed Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services., configure content-level access policy, monitor incoming/outgoing/east-west requests to and from the service, apply intrusion prevention system (IPSClosed Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System).) protections for web servers, enforce geo-based policy, prevent malicious bots activity, and more.

The Quick Start Gateway Load Balancer deployment includes a Security VPC with a Gateway Load Balancer, an Auto Scaling Group of Security Gateways, a server VPC with Gateway Load Balancer Endpoints (1 per Availability Zone), an Application Load Balancer, and Services.

You can manage the CloudGuard Security Gateways with a preconfigured Check Point CloudGuard Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server., or an existing Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

Architecture

The Quick Start Centralized GWLB solution deploys:

Step 1: Prepare your AWS Account

Before you begin, make sure to do these steps.

To prepare your AWS account:

  1. If you do not have an AWS account, create one.

  2. Use the region selector in the navigation bar to select the AWS region where you want to deploy Check Point CloudGuard Network Auto Scaling on AWS.

  3. Create a key pair in your preferred region.

  4. Request a service limit increase for the AWS resources you plan to use, if necessary.

    By default, this Deployment Guide uses:

    • c5.xlarge instances for Security Gateways

    • m5.xlarge instances for the Security Management Server.

Minimum Permissions for Deployment

Configure the relevant IAM policy with the minimum permissions for a successful deployment, as shown below.

In the AWS VPCClosed AWS Virtual Private Cloud. A private cloud that exists in the public cloud of Amazon. It is isolated from other Virtual Networks in the AWS cloud. Console, navigate to the IAM service, select the relevant IAM policy, copy the required permissions from this guide (see below) and paste them into the policy:

Step 2: Subscribe to Check Point CloudGuard Network

To deploy a CloudGuard Network Security for Gateway Load Balancer, do these steps:

  1. Log in to the AWS Marketplace.

  2. Search for "CloudGuard Network Security".

  3. Select one of these licensing options for the CloudGuard Network Security for Gateway Load Balancer:

    Or one of these licensing options for a Check Point CloudGuard Security Management Server:

  4. Select Continue to subscribe.

  5. Select Accept Terms to confirm that you accept the AWS Marketplace license agreement.

Step 3: Deploy the Check Point Security Management Server

Use one of these options to deploy the Check Point Security Management Server:

Step 4: Deploy Quick Start GWLB Centralized Security VPC

There are two deployment options:

CloudFormation (CFT) Template

Description

Deploying Quick Start GWLB with new VPCs

Creates a new VPC and deploys a Gateway Load Balancer, Check Point CloudGuard Security Gateway Auto Scaling Group, and an optional Security Management Server to the new VPC.

Deploy Quick Start GWLB into existing VPCs

Deploys a Gateway Load Balancer, Check Point CloudGuard Security Gateway Auto Scaling Group, and an optional Security Management Server to the existing VPC.

Step 4.1: Launch the Quick start CloudFormation

Load the applicable CloudFormation Template URI in the AWS CloudFormation portal.

Steps 4.2: Configure the required parameters to specify the GWLB deployment details

Deploying Quick Start GWLB to a New VPC:

Parameter Name

Default Value

Description

Availability Zones

Requires input

Select, at minimum, two Availability Zones (AZs) for the VPC subnets.

Number of AZs

2

Specify the number of AZs to use in the VPC. This must align with the number of AZs selected for the Availability Zones parameter.

VPC CIDR

10.0.0.0/16

Configure the CIDR block for the VPC.

Security Auto Scaling Group Public Subnet 1

10.0.10.0/24

A CIDR block for the public subnet 1 is located in the 1st Availability Zone. If you select to deploy a Security Management Server, it is deployed in this subnet.

Security Auto Scaling Group Public Subnet 2

10.0.20.0/24

A CIDR block for the public subnet 2 located in the 2nd Availability Zone.

Security Auto Scaling Group Public Subnet 3

10.0.30.0/24

A CIDR block for the public subnet 3 located in the 3rd Availability Zone.

Security Auto Scaling Group Public Subnet 4

10.0.40.0/24

A CIDR block for the public subnet 4 located in the 4th Availability Zone.

Servers VPC CIDR

192.168.0.0/16

A CIDR block for the VPC.

Servers Auto Scaling Group Public Subnet 1

192.168.10.0/24

A CIDR block for the public subnet 1 located in the 1st Availability Zone.

Servers Auto Scaling Group Public Subnet 2

192.168.20.0/24

A CIDR block for the public subnet 2 located in the 2nd Availability Zone.

Servers Auto Scaling Group Public Subnet 3

192.168.30.0/24

A CIDR block for the public subnet 3 located in the 3rd Availability Zone.

Servers Auto Scaling Group Public Subnet 4

192.168.40.0/24

A CIDR block for the public subnet 4 located in the 4th Availability Zone.

GWLBe Subnet 1

192.168.70.0/24

A CIDR block for the GWLBe subnet 1 located in Availability Zone 1.

GWLBe Subnet 2

192.168.80.0/24

A CIDR block for the GWLBe subnet 2 located in Availability Zone 2.

GWLBe Subnet 3

192.168.90.0/24

A CIDR block for the GWLBe subnet 3 located in Availability Zone 3.

GWLBe Subnet 4

192.168.100.0/24

A CIDR block for the GWLBe subnet 4 located in Availability Zone 4.

Inbound Subnet tagging for Inspection

0.0.0.0/0

Inbound Subnet tagging for Inspection (Comma-delimited list of CIDR blocks for inspection).

Outbound Subnet tagging for Inspection

0.0.0.0/0

Outbound Subnet tagging for Inspection (Comma-delimited list of CIDR blocks for inspection).

Deploy Quick Start GWLB into existing VPC’s:

Parameter Name

Default Value

Description

Number of AZs

2

Specify the number of AZs to use in the VPC. This must align with the number of AZs selected for the Availability Zones parameter.

Security VPC

Requires input

Specify the Security VPC ID.

Gateways subnets

Requires input

Specify the Subnets ID for the Gateway deployment.

Servers VPC

Requires input

Specify the Servers VPC ID.

Servers subnets

Requires input

Specify the Subnets ID for the Servers deployment.

Servers CIDRs

Requires input

Specify the Subnets CIDR for the Servers deployment.

GWLBe subnets

Requires input

Specify the Subnets ID for the GWLB endpoints deployment.

Server VPC IGW

Requires input

Specify the Internet Gateway ID that is attached to the Servers VPC.

General Settings:

Parameter Name

Default Value

Description

Key name

Requires input

Specify an EC2 key pair to enable SSH access to the instances created by this stack.

Enable Environment Volume Encryption

True

Enable or disable instance volume encryption with the default AWS Key Management Service (KMS) key.

Enable AWS Instance Connect

False

Enable or disable establishing SSH connections through the AWS web console.

Termination Protection

False

Enable or disable protection against accidental instance termination.

Allow Upload & Download

True

Enable or disable automatic download of Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. Contracts and data sharing with Check Point for a better product experience.

Management Server

gwlb-management server

Provide a name for the Security Management Server in the automatic provisioning configuration.

Configuration template

gwlb-ASG-configuration

Specify a name for a Security Gateway configuration template in the automatic provisioning configuration.

Email Address

Optional

(Optional) Provide an email address to receive AWS notifications about scaling events.

Admin Shell

/etc/cli.sh

Select the admin shell to enable advanced command line configuration for Security Gateways and Security Management Server.

Gateway Load Balancer Configuration:

Parameter Name

Default Value

Description

Gateway Load Balancer Name

gwlb1

Provide a unique name for the Gateway Load Balancer. The name can have a maximum of 32 alphanumeric characters and hyphens.

Important - The name cannot start or end with a hyphen.

Target Group Name

tg1

Specify a unique name for the target group. The name can have a maximum of 32 alphanumeric characters and hyphens.

Important - The name cannot start or end with a hyphen.

Connection Acceptance Required

False

Specify if requests from Service Consumers to create endpoints on your service require acceptance. The default value is set to False ("acceptance" is not required).

Enable Cross Zone Load Balancing

True

Enable or disable Cross-AZ Load Balancing.

Important - If you enable this parameter, this can increase Cross-AZ charges.

Check Point CloudGuard Network Security Gateways Auto Scaling Group Configuration:

Parameter Name

Default Value

Description

Gateways Instance Name

Check Point Gateway

Provide a name tag for the Security Gateway instances.

Gateways Instance Type

c5.xlarge

Select the EC2 instance type for Security Gateways.

Minimum Group Size

2

Set the minimum number of Security Gateways in the Auto Scaling Group.

Maximum Group Size

10

Set the maximum number of Security Gateways in the Auto Scaling Group.

Gateways Version & License

R81.20-BYOL

Select the version and license type for Security Gateways.

Gateways Password Hash

Optional

(Optional) Provide the admin user's password hash (use the command "openssl passwd -6 PASSWORD" to get the password's hash).

Gateway Maintenance Password hash

Optional

(Optional) Check Point recommends to set the admin user's password and maintenance-mode password for recovery purposes (use command grub2-mkpasswd-pbkdf2 to get the password's hash). For R81.10 and lower versions, the admin user's password is also used as a maintenance-mode password.

Gateways SIC Key

Requires input

Enter a SICClosed Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. key to create trusted connections between Check Point components. Provide a random string that has a minimum of 8 alphanumeric characters.

Gateways addresses

Private

Select if provisioned Security Gateways use private or public addresses.

Allocate Public IPs

False

Enable or disable allocation of public IP addresses for Security Gateways.

Add support for IPv6 traffic inspection

False

Enable or disable support for IPv6 traffic inspection.

CloudWatch Metrics

False

Enable or disable reporting of Check Point-specific CloudWatch metrics.

Gateways bootstrap script

Optional

Provide an optional script with semicolon-separated commands to run on initial boot.

Note - For more information on how to use Check Point metrics to trigger AWS Auto-Scaling events, refer to sk162592.

Check Point CloudGuard Network Security Configuration:

Parameter Name

Default Value

Description

Deploy Management Server

True

Specify False to use an existing Security Management Server, or True to deploy a new Security Management Server. If you select False, ignore the other parameters in this section. .

Management Instance Type

m5.xlarge

Select the EC2 instance type for the Security Management Server.

Management Version & License

R81.20-BYOL

Select the version and license type for the Security Management Server.

Management Password Hash

Optional

(Optional) Provide the admin user's password hash (use the command "openssl passwd -6 PASSWORD" to get the password's hash).

Management Maintenance Password hash

Optional

(Optional) Check Point recommends to set the admin user's password and maintenance-mode password for recovery purposes (use the command grub2-mkpasswd-pbkdf2 to get the password's hash). For R81.10 and lower versions, the Admin user's password is also used as a maintenance-mode password.

Security Policy

Standard

Specify the name of the Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. package to install on the Security Gateways in the Security Auto Scaling Group.

Default Blades

(GatewaysBlades)

On

Enable or disable the Intrusion Prevention System, Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI., Antivirus, and Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT. Software Blades. (You can also do it manually after the deployment.)

Administrator Addresses

Requires input

Specify the network allowed to connect to the Security Management Server through web, SSH, and graphical clients..

Manage Gateways

Locally managed

Select between local management or management over the Internet based on Security Gateway accessibility. If, at minimum, one of the Security Gateways that you want to manage is not directly accessed through its private IP address, select Over the internet.

Gateways Addresses

Requires input

Specify the network allowed for communication of Security Gateways with the Security Management Server.

Note - Interfaces of Auto Scaling Group instances are automatically configured with Internal Topology. This is not defined in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on..

Important - The External Load Balancer sends health probes to TCP port 8117 to determine the health of the CloudGuard Network Security Gateways, so port 8117 must be open on the Security Gateways

Web Servers Auto Scaling Group Configuration:

Parameter Name

Default Value

Description

AMI ID

Requires input

Specify the Amazon Machine Image (AMI) ID of the preconfigured web server to deploy (for example: ami-0dc7dc63).

ALB Protocol

HTTP

Specify the protocol to use on the Application Load Balancer. If the Network Load Balancer was selected, this section is ignored.

Custom service port

Optional

(Optional) Specify the port for the external Load Balancer. Keep this field blank to use default ports: Port 80 for HTTP and port 443 for HTTPS.

Servers Instance type

t3.micro

Select the EC2 instance type for the web servers.

Resources Tag Name

Optional

(Optional) Specify the name tag for the resources.