In This Section: |
Step |
Description |
---|---|
1 |
If you do not already have an AWS account, create one at AWS. |
2 |
Use the region selector in the navigation bar to choose the AWS region, where you want to deploy Check Point CloudGuard Auto Scaling on AWS. |
3 |
Create a key pair in your preferred region. |
4 |
If necessary, request a service limit increase for the AWS resources you are going to use. You may have to do this, if you have an existing deployment that uses the AWS resources below, and you may exceed the default limit with this deployment. The resources that may need a service limit increase are:
|
By default, this Deployment guide uses c4.xlarge for the Security Gateways and m4.xlarge for the Security Management Server.
Step |
Description |
---|---|
1 |
Log in to AWS Marketplace. |
2 |
Select one of these licensing options for Check Point CloudGuard Security Gateways: |
3 |
Select Continue to subscribe. |
4 |
Select Accept Terms to confirm that you accept the AWS Marketplace license agreement. |
5 |
If you want to deploy a Check Point CloudGuard Security Management Server, repeat Step 3 and Step 5 in this procedure and select one of these licensing options:
Note - If you want to manage more than five Security Gateways, select the BYOL option to purchase a license. Contact Check Point Sales to purchase a license. |
When you deploy the Transit VPC in the steps that follow, you are prompted for the licensing information for the Security Gateways and Security Management Server that you selected.
Select one of these options to launch the Transit VPC template into your AWS account:
Option |
CloudFormation Template |
Direct Link |
Deploy Check Point CloudGuard IaaS Transit into a new VPC on AWS |
New VPC |
|
Deploy Check Point CloudGuard IaaS Transit into an existing VPC on AWS |
Existing VPC |
Important - If you deploy Check Point CloudGuard IaaS Transit into an existing VPC, make sure that your VPC has:
Each deployment might take approximately 30 minutes to complete.
General Settings:
Parameter name |
Default |
Description |
---|---|---|
|
|
Specifies the CIDR block for the VPC. |
|
Requires input |
Specifies the Availability Zones you want to use for resource distribution. This field displays the available zones within your selected region. You must select two availability zones from this list. The logical order of your selections is preserved in your deployment. |
|
|
Specifies the CIDR block for the public (DMZ) subnet located in Availability Zone 1. |
|
|
Specifies the CIDR block for the public (DMZ) subnet located in Availability Zone 2. |
|
|
Specifies the CIDR block for the private subnet located in Availability Zone 1. |
|
|
Specifies the CIDR block for the private subnet located in Availability Zone 2. |
|
Requires input |
Specifies the public/private key pair that allows you to connect securely with your instance after it launches. When you create an AWS account, this is the key pair you created in your preferred region. |
|
|
Specifies the tag is used by the Security Management Server to provision the Security Gateways automatically. Must contain up to 12 alphanumeric characters. Must be unique for each Quick Start deployment. |
|
|
Specifies whether to download automatically the Software Blades contracts and other important data. Improves product experience by sending data to Check Point. |
Configuration of Check Point CloudGuard IaaS Transit Gateways:
Parameter name |
Default |
Description |
---|---|---|
|
|
Specifies the EC2 instance type for the Security Gateway. |
|
|
Specifies the organization Autonomous System Number (ASN) that identified the routing domain for the Security Gateways. |
|
|
Specifies the license to use for the Security Gateways. See Step 2 for the licensing options. You must have a subscription to the corresponding AMI in the AWS marketplace. |
|
Optional |
Specifies the administrator password hash. Use this command to get the password hash:
|
|
Requires input |
Specifies the one-time Activation Key. Enter a string that consists of at least 8 alphanumeric characters. |
Configuration of the Check Point CloudGuard IaaS Security Management Server:
Parameter name |
Default |
Description |
---|---|---|
|
|
Configure "
|
|
|
If the Spoke VPCs are trusted, you can configure " |
|
|
Specifies the EC2 instance type of the Security Management Server. |
|
|
Specifies the license to install on the Security Management Server. |
|
Optional |
Specifies the administrator password hash. Use this command to get the password hash:
|
|
|
Configure " After the deployment, you can manually enable and disable these and additional Software Blades. |
|
Requires input |
Specifies the allowed IP addresses, from which you can connect to the Security Management Server with HTTP, HTTPS, SSH, and GUI clients. |
|
|
Specifies the CIDR IP range that is permitted to access the Security Management Server. Only gateways with IP addresses from this network can communicate with the Security Management Server. |
General Settings:
Parameter name |
Default |
Description |
---|---|---|
|
Requires input |
Specifies the ID of your existing VPC. |
|
Requires input |
Specifies the ID of an existing subnet inside the VPC for the first Security Gateway. |
|
Requires input |
Specifies the ID of an existing subnet inside the VPC for the second Security Gateway. |
|
Requires input |
Specifies the ID of an existing private subnet inside the VPC for the first Security Gateway. |
|
Requires input |
Specifies the ID of an existing private subnet inside the VPC for the second Security Gateway. |
|
Requires input |
Specifies the public/private key pair that allows you to connect securely with your instance, after it launches. When you create an AWS account, this is the key pair you created in your preferred region. |
|
|
Specifies that the Security Management Server uses this tag to provision the Security Gateways automatically. Must contain up to 12 alphanumeric characters. Must be unique for each Quick Start deployment. |
|
|
Specifies whether to download automatically the Software Blades contracts and other important data. Improves product experience by sending data to Check Point. |
Configuration of Check Point CloudGuard IaaS Transit Gateways:
Parameter name |
Default |
Description |
---|---|---|
|
|
Specifies the EC2 instance type for the Security Gateway. |
|
|
Specifies the organization Autonomous System Number (ASN) that identified the routing domain for the Security Gateways. |
|
|
Specifies the license to use for the Security Management Server. See Step 2 for the licensing options. You must have a subscription to the corresponding AMI in the AWS marketplace. |
|
Optional |
Specifies the administrator password hash. Use this command to get the password hash:
|
|
Requires input |
Specifies the one-time Activation Key. Enter a string that consists of at least 8 alphanumeric characters. |
Configuration of the Check Point CloudGuard IaaS Security Management Server:
Parameter name |
Default |
Description |
---|---|---|
|
|
Configure "
|
|
|
If the Spoke VPCs are trusted, you can configure " |
|
|
Specifies the EC2 instance type of the Security Management Server. |
|
|
Specifies the license to install on the Security Management Server. |
|
Optional |
Specifies the administrator password hash. Use this command to get the password hash:
|
|
|
Configure " After the deployment, you can manually enable and disable these and additional Software Blades. |
|
Requires input |
Specifies the allowed IP addresses, from which you can connect to the Security Management Server with HTTP, HTTPS, SSH, and GUI clients. |
|
|
Specifies the CIDR IP range that is permitted to access the Security Management Server. Only gateways with IP addresses from this network can communicate with the Security Management Server. |
You can use these values displayed in the Outputs tab to configure the environment later:
Key |
Description |
---|---|
|
Specifies the tag to put on the spoke VPC. |
|
Specifies the name that represents the Security Management Server. |
|
Specifies the name of the VPN Community created on the Security Management Server. |
|
Specifies the name that represents the configuration template. Configurations required to provision the Gateways automatically in the Auto Scaling Group are placed in this template name. For example, what Security Policy to install, which Software Blades to enable, and so on. |
|
Specifies the Public IP address of the first gateway. |
|
Specifies the Public IP address of the second gateway. |
|
Specifies the public IP address of the Security Management Server. |
|
Specifies the name that represents the controller. Configurations required to connect to your AWS environment are placed in this controller template name. For example, credentials and regions. |
Review the deployment in the AWS Management Console and in Check Point SmartConsole.
If the set up was successful, you should see these components: