In This Section: |
It is possible to connect your Corporate Gateway to the Transit hub. To do so, create a VPN tunnel on each CloudGuard Gateway towards the Corporate Gateway.
The customer manually performs the provisioning of VPN towards the Corporate Gateway.
Follow sk120534 - Section "(4-C) Creating the Transit VPC - Configure VPN Tunnel Interface on the on-premises Security Gateway".
Follow sk120534 - Section "(5-C) Connecting Transit VPC to Spoke VPCs - Configure Gaia OS on CloudGuard Gateways for AWS".
For more information, see about the Transit VPC Architecture, see sk120534.
Step |
Description |
---|---|
1 |
Create the spoke VPC and its subnets. |
2 |
Edit the VPC and add this tag: Tag key: Tag value: <MANAGEMENT-NAME>/<VPN-COMMUNITY-NAME> Where:
|
To connect a spoke VPC to multiple VPN communities, see Multi-Hub Support.
To unlink a spoke, remove the tag. This deletes the transit configuration automatically.
Note - If an AWS Virtual Private Gateway (VGW) does not already exist, transit creates it and propagates routes from it, only to the main route table of the VPC. Make sure that all the subnets you want to use with transit, are associated with the main route table.
Important:
Launch the Cross Account Permissions AWS CloudFormation template on the trustee (spoke) account.
Direct Link to AWS Cross Account Permissions Template.
For more information, see sk122074.
Parameters for deploying the STS Role template:
Parameter label (name) |
Default |
Description |
---|---|---|
Trusted Account ID (Trusted account) |
Requires input |
A 12-digit number that represents the ID of the Transit VPC account. Enter that number. |
IAM Role Permissions (Permissions) |
Read-only |
Important - You must select Create with read-write permissions. |
Use the value that is displayed on the Outputs tab to configure the environment afterwards.
Key |
Description |
---|---|
Role |
AWS ARN for the new role you created. Use this role in the STS Role field in the deployment of the Check Point Security Management Server. |
Note - You will be able to add or remove additional spoke accounts later. To do that, edit the Security Management Server Role profile in AWS and add or remove ARNs.
You can connect a spoke VPC to more than one Transit Hub.
For example, the first Transit Hub serves for Internet outbound traffic and the second Transit Hub serves for the corporate and spoke-to-spoke traffic.
To configure Multi-Hub support:
Step |
Description |
---|---|
1 |
Connect to the command line on the Check Point Security Management Server. |
2 |
Log in to the Expert mode. |
3 |
Use the
|
4 |
Use the
|
5 |
Use the
|
6 |
On the AWS CloudFormation service, deploy the Transit template for both hubs. |
7 |
For each spoke VPC, add a tag. The tag will include information on all the Hubs, separated by a colon.
|
Important - If you add or remove a Transit Hub to an existing Hub, the configuration on all existing spokes is removed. This creates a Multi-Hub configuration for each spoke VPC. That causes reprovisioning of all the VPN connections and it may take time to finish. For example, when you design a Multi-Hub topology.
Expect downtime during the reconfiguration of the spoke VPCs. Schedule a maintenance window to perform these configuration steps. The amount of downtime it takes, depends on the number of tunnels you have.
By default, BGP settings export "all Internet (0.0.0.0/0)" CIDR to the spoke. This means that outgoing traffic from the spoke VPC is routed to the Transit Gateways.
There may be times that you want to export specific custom routes, instead of "all Internet". For example, in a Multi-Hub architecture where one hub handles the outbound traffic to the Internet, and the second Transit Hub serves for the spoke-to-spoke traffic. Another example is a single Transit hub environment, which enables spoke-to-spoke communication without allowing Internet access.
To configure a specific route, you have to configure two additional BGP routemaps:
Routemap |
Description |
---|---|
spoke-routes |
Name for a BGP routemap that contains all spoke CIDRs. This routemap is automatically created on the Transit Gateway and exported to the spokes, to enable all spoke-to-spoke traffic. Important - Do not use the name of a routemap that you have already defined on the Security Gateway, or a routemap that you want to manage manually. If you do so, this routemap will be overridden by the automation. |
export-routes |
Name for a BGP routemap that will also be exported to the spokes. The user has to create and manage this routemap on all Transit Gateways. This routemap can contain any routes you want to export to the spoke. For example, the route of a corporate network CIDR. Important - If you want to enable custom routes, you must enable the routes before you connect any spoke VPC to the Transit. If there are already spoke VPCs connected to the VPC and you want to enable custom routes, you have to disconnect them from the Transit:
|
To enable custom routes on the Security Management Server, run the config-community.sh
script:
|
Replace these variables with the names in your configuration:
IMPORTANT
autoprov_cfg
for this configuration template.config-community.sh
does not add Security Gateways as hub.The Transit service scans all VPN connections in the region of a spoke VPC and tries to create interoperable device objects and VTI that match these connections.
If you want to create a VPN connection to a Transit Hub CloudGuard Security Gateway manually, add a tag to the AWS VPN connection object. This will cause the automation to ignore it.
Key: x-chkp-vpn
Value: ignore
As part of the Transit automation work, the Transit service is also responsible to create the AWS customer gateway objects on each spoke VPC region/account.
The service deletes all customer gateways when they are not referenced by a VPN Connection. If you want to preserve your manually created customer gateways, add a tag on the AWS customer gateway object. This will cause the automation to ignore it.
Key: x-chkp-vpn
Value: ignore
Important - Changing the Autonomous System number can be dangerous and can harm the internal data structures used by the Transit service. Make sure to edit only the AS number digits when you change the comment field.
A unique AS value is set for the Transit Gateways as part of the CloudFormation Template attributes. You cannot change the AS value through the AWS CloudFormation templates or through SmartConsole. You can change it through the AWS Console, or the Gaia Portal.
To change the ASN on the Transit Gateway:
Step |
Description |
---|---|
1 |
In the AWS Console, remove the x-chkp-vpn tag from all spoke VPCs. Wait for all the AWS VPN and Check Point resources to be removed. Make sure no interoperable devices remain that are related to the resources you removed. |
2 |
On the Security Management Server, stop the service:
This ensures that no new tags on the spoke VPCs are identified during this process. |
3 |
Configure the Autonomous System number on the Transit Gateway in one of these ways: In Gaia Clish:
In Gaia Portal:
|
4 |
On the Security Gateway examine the new AS number:
|
5 |
Connect with SmartConsole to Security Management Server. |
6 |
The Transit service uses the Comment field to store configuration attributes.
|
7 |
Repeat the steps above on all Security Gateways in the Transit Hub. |
8 |
Add tags back to all related Spoke VPCs. |
9 |
On the Security Management Server, start the service:
|
10 |
Wait for the new resources to provision. New Customer gateway objects are created. VPN Tunnels and BGP configurations are created with the new AS value on each gateway. |
To run Check Point Auto Scaling in AWS on the same Security Management Server that runs Transit:
Step |
Description |
---|---|
1 |
Connect to the command line the Security Management Server. |
2 |
Log in to the Expert mode. |
3 |
Use the
|
4 |
Use the
|
For more information about configuring Auto Scaling in AWS, see sk112575.
It is mandatory that you have an Internet connection when you deploy the Security Management Server CloudFormation template. The CloudFormation template needs an Internet connection to confirm the deployment was successful.
If the Security Management Server instance cannot be reached over the Internet, the CloudFormation deployment will fail and the CloudFormation stack is reverted.
To deploy a Security Management Server without an Internet connection:
Step |
Description |
---|---|
1 |
In the CloudFormation template:
|
2 |
Connect with a web browser to the Security Management Server at:
|
3 |
Enter the username admin, and the password you entered on the CloudFormation template. |
4 |
Click Login. The Gaia First Time Configuration Wizard opens. |
5 |
Follow the instructions on the screen. |