Deployment Steps for Geo Cluster in AWS Transit Gateway High Availability

This section gives advanced use cases for using Check Point's Security Geo ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. in AWSClosed Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services.. A typical Security Geo Cluster use case is cross VPC, region, and account protection (see more use cases here). Using AWS attachment and inter-region peering, you can interconnect and protect an entire distributed environment by means of a central security solution. This solution is highly available and does not interfere with safe traffic.

Step 1: Prepare Your AWS Account

To prepare your AWS account, do these steps:

  1. If you do not already have an AWS account, create one at AWS.

  2. Use the region selector in the navigation bar to choose the AWS region, where you want to deploy Check Point CloudGuard Cross AZ Cluster on AWS.

  3. Create a key pair in your preferred region.

  4. If necessary, request a service limit increase for the AWS resources you are going to use.

    You may have to do this, if you have an existing deployment that uses the AWS resources below, and you may exceed the default limit with this deployment.

    The resources that may need a service limit increase are:

    • Number of On-demand EC2 instances.

    • Number of Elastic IP addresses.

    • Number of VPCs for each region.

    • Number of VPN connections for each region.

    • Number of Customer for each region.

    • Number of virtual private for each region.

    • VPN connections for each VPC.

By default, this Deployment guide uses c5.xlarge for the Security Gateways and m5.xlarge for the Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server..

Deployment minimum permissions

For a successful deployment, the relevant IAM policy must have minimum permissions set configured below.

In the AWS VPCClosed AWS Virtual Private Cloud. A private cloud that exists in the public cloud of Amazon. It is isolated from other Virtual Networks in the AWS cloud. Console navigate to IAM service, select the relevant IAM policy and copy/paste this text:

Step 2: Subscribe to CloudGuard Network Security

To subscribe to Check Point CloudGuard Network, do these steps:

  1. Log in to the AWS Marketplace.

  2. Search for "CloudGuard Network Security".

  3. Select one of these licensing options for Check Point CloudGuard Security Gateways:

    Or one of these licensing options for a Check Point CloudGuard Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.:

    Note - If you want to manage more than five Security Gateways, select the BYOL option and contact Check Point Sales to purchase a license.

  4. Select Continue to subscribe.

  5. Select Accept Terms to confirm that you accept the AWS Marketplace license agreement.

Note - In the deployment steps that follow, you are prompted for the licensing information for the Security Gateways and Security Management Server that you selected.

Step 3: Deploying the Security Geo Cluster for Transit Gateway High Availability (HA)

Before you deploy Check Point's Security Geo Cluster in AWS's TGW HA, select a CloudFormation template for a "new" or "existing" VPC. Next, follow the instructions in this section on how to deploy the AWS TGW HA. Finally, review and test the deployment. If you decide to deploy the Geo Cluster without association of Elastic IP to the Cluster MemberClosed Security Gateway that is part of a cluster., see Deploying Geo Cluster Members without an Elastic IP

Select one of the CloudFormation templates to launch the Geo Cluster for Transit Gateway HA template in your AWS account.

Notes:

  • When you deploy the CloudFormation template, the Check Point First Time Wizard runs automatically. (Note - This is a one-time reboot).

  • To route all traffic going outside the VPC by means of Check Point's Cluster Active Member, the CloudFormation template automatically creates an AWS routing table that associates the internal subnets from bot Availability Zones.

  • To route all traffic from the TGW attachments outside the subnet by means of Check Point's Cluster Active Member, the CloudFormation template automatically creates an AWS routing table that associates the TGW subnets from both Availability Zones.

  • After you run the template, the default Active Member is "Member A".

Parameters for Deploying a Geo Cluster for TGW HA into a New VPC

Use these parameters for deploying a Geo Cluster in a New VPC:

Parameters for Deploying a Geo Cluster for TGW HA into an Existing VPC

Use these parameters for deploying a Geo Cluster in a New VPC:

Step 4: Deploying the AWS Transit Gateway

Deployment minimum permissions

Follow the AWS instructions to deploy Transit Gateways

When you create the Transit Gateway, configure these settings in Amazon VPC console:

  1. Disable the Default route table association.

  2. Disable the Default route table propagation.

  3. For cross-account spokes, enable the Auto accept shared attachments.

Note - If you did not disable the Default route table association and the Default route table propagation settings, then delete the existing Transit Gateway and create a new one. If you do not delete the earlier Transit Gateway, AWS associates and propagates all attachments to the Transit Gateway to the same default Transit Gateway route table. As a result, traffic can flow directly between spokes and not through CloudGuard Gateways. To change this, move the association and propagation to the correct Transit Gateway route table.

Step 5: Configuring the Security Geo Cluster for Transit Gateway HA

Attaching Spoke VPCs to the Transit Gateway

To attach Spoke VPCs to the Transit Gateway:

  1. Create the Spoke VPCs and its subnets.

  2. Attach all Spoke VPCs to the Transit Gateway created earlier.

  3. Add a default route to the Transit Gateway in each Spoke VPC route table:

    Destination: 0.0.0.0/0

    Target: Transit Gateway ID

Notes:

  • The route table must be the route table in which the associated subnets are those attached to the Transit Gateway.

  • To remove a link from a spoke, delete the VPC attachment from the Transit Gateway.

Attaching a Security VPC to the Transit Gateway

To route all traffic coming into the TGW to the Security Gateways and send traffic from the Gateways to the correct destination, you must attach the Security VPC to the TGW.

To attach a Security VPC to the Transit Gateway:

Step Description

1

Attach the Security VPC (in which the Cluster Members are deployed in) to the Transit Gateway you created. The subnets you use for the VPC attachment must be the dedicated TGW subnets in both Availability Zones.

2

Add a default route to the Transit Gateway in the public route table (to which the public subnets are associated too):

The route table must contain a default route to the Internet Gateway and specific routes for the spokes to the Transit Gateway.

Route 1:

Destination: <SPOKES_CIDR_INITIAL>

Target: Transit Gateway ID

Route 2:

Destination: 0.0.0.0/0

Target: Internet Gateway ID

Configuring Transit Gateway Route Tables

To configure a Transit Gateway route table:

Step Description

1

In Amazon VPC console, go to the Transit Gateway Route Tables tab.

2

Configure a checkpoint route table:

  • Create a new checkpoint route table.
    • Associate the Security VPC attachment.

    • Propagate the route table to the spokes.

This creates a route from each CloudGuardTransit Gateway HA member to all spoke VPCs.

3

Configure a spokes route table:

  1. Create a new spokes route table.

  2. Associate the spokes attachments to the route table.

  3. Create a static default route to the Security VPC attachment.

This creates a default route from each spoke to the Security VPC attachment that is directed to the Active CloudGuard HA member.

Step 6: Configuring the Security CloudGuard Geo Cluster for Transit Gateway HA in SmartConsole

For the Security Gateways to run as a synchronized cluster and to apply a security policyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. to the cluster, you must configure the cluster object on the Security Management.

Configuring the Cluster Object

Allowing Outbound Traffic for the Spoke VPCs

Step 7: Review and Test the Deployment

Use these steps to check for proper configuration and set up of all components.

If the set up was successful, you will see these components:

Step Description

1

In AWS WebUI:

  1. In the VPC console, under Route Tables, go to the Private Route table (to which the Private Subnets of the Security VPC are associated).

  2. In the Routes table, make sure there is a default route to the Active member's private interface (eth1).

  3. In the VPC console, under Route Tables go to the TGW Route table (to which the TGW attachment Subnets of the Security VPC are associated).

  4. In the Routes table make sure there is a default route to the Active member's public interface (eth0).

2

Log in to both members in the Expert mode:

  1. Run cphaprob state to validate that the cluster is operating correctly.

    Output of cphaprob state command on both cluster member must show identical information for Load State (“ACTIVE”).

    Example:

    [Expert@HostName:0]# cphaprob stat
    
    Cluster Mode: Active Active with IGMP Membership
    
    Number       Unique Address   Assigned Load   State    Name
    1 (local)    10.0.1.20        N/A             Active   Member-A
    2            10.0.1.30        N/A             Active   Member-B
  2. Run $FWDIR/scripts/aws_ha_test.py and make sure that it ends successfully without errors.

3

Simulate a cluster failover:

From the Active member that is not on standby, run in the Expert mode:

clusterXL_admin down

After two seconds, you should see in AWS WebUI > VPC Console > Route Tables that all route tables (that had a default route directed to the Active Member) are now directed to the Standby Active member.

Notes:

  • To see the changes, refresh the AWS WebUI.

  • It can take a few minutes until failover is fully configured to pass traffic through the Active Member,