Learn how Aviatrix’s intelligent orchestration and control eliminates unwanted tradeoffs encountered when deploying Palo Alto Networks VM-Series Firewalls with AWS Transit Gateway.
Deploying any next generation firewall in a public cloud environment is challenging, not because of the firewall itself but because of the public cloud networking services that practitioners must use. The job of understanding and problem-solving around cloud networking complexities to ensure a successfully configured and maintained firewall deployment is no small task. It’s a task that is definitely possible — though difficult — and it comes with performance, scale, and visibility tradeoffs that need to be considered closely. This blog explores how to use Aviatrix’s intelligent orchestration and control service to simplify the deployment of Palo Alto Networks VM-Series Firewalls and eliminate those tradeoffs.
Aviatrix Firewall Network Service
Aviatrix’s Firewall Network Service is a service extension of its Enterprise Cloud Backbone Service. The Firewall Network service is a combination of Aviatrix services, combining both the intelligent controller and gateway services. The service enables simple insertion of Next Generation Firewalls (NGFW) into AWS Transit Gateway (TGW) environments, without sacrificing performance, scale, or visibility. The Aviatrix intelligent controller handles orchestration and dynamic updates for all routing elements within the AWS TGW environment, and the gateway service offers dynamic load balancing across multiple firewalls across high-performance links.
The Aviatrix Firewall Network Service leverages the combination of its intelligent orchestration and control as well as gateway services to remove AWS networking complexities such as lack of route propagation to VPCs, IPSec tunnels, and BGP; or use of source address translation (SNAT) between the firewall and the TGW. Eliminating these constraints allows Palo Alto VM-Series firewalls to operate at optimal performance and at TGW-native throughput. Removing the need to use SNAT allows session stickiness and source address to be retained for full visibility. The firewall network