ความคิดเห็น •

  • @damianfernandez1
    @damianfernandez1 3 ปีที่แล้ว +1

    Very grateful for putting this out. Cleared all my doubts.
    Amazingly well done !

  • @VirtualizeStuff
    @VirtualizeStuff 2 ปีที่แล้ว +1

    Excellent job Ralph explaining the GWLB and the awesome packet walk! Learned a ton!

  • @vardanvardanyan884
    @vardanvardanyan884 3 ปีที่แล้ว +1

    Awesome presentation. Very clearly explained with packet walk.
    Thank you!

  • @n8goodman
    @n8goodman 3 ปีที่แล้ว +1

    You just saved me so much time. Thank you for making this!

  • @johnjiang2470
    @johnjiang2470 2 ปีที่แล้ว

    Ralph, great presentation!

  • @muhammadyaqoob9777
    @muhammadyaqoob9777 3 ปีที่แล้ว +1

    Hi Ralph, thanks for sharing amazing content! Thanks Mo

  • @dmohan16
    @dmohan16 2 ปีที่แล้ว

    Excellent explanation..!! well articulated with the traffic flows.

  • @subramanyasastry517
    @subramanyasastry517 11 หลายเดือนก่อน

    Thank you for the detailed diagram and explanation. Keep up the Good Job.

  • @zubairqureshi9063
    @zubairqureshi9063 2 ปีที่แล้ว

    Awesome presentation and explanation 👍🏻

  • @psaneem
    @psaneem 3 ปีที่แล้ว +1

    Awesome presentation

  • @ADV-IT
    @ADV-IT ปีที่แล้ว +1

    Great detailed explanation, thanks!

  • @yourrakesh123
    @yourrakesh123 11 หลายเดือนก่อน

    This is an awesome tutorial that I was searching on youtube. Excellent explanation on setting up GWLB and firewall in multi-account environment through TGW. :)

  • @trandat7274
    @trandat7274 2 ปีที่แล้ว

    Many thanks Ralph, your video is very very great.... Thanks a lot !!!!

  • @arindamsaha9052
    @arindamsaha9052 2 ปีที่แล้ว

    That was an awesome explanation.

  • @alinaqvi385
    @alinaqvi385 5 หลายเดือนก่อน

    Excellent and thank you, Mr. Carter.

    • @ralphcarter769
      @ralphcarter769 2 หลายเดือนก่อน

      You are very welcome

  • @abelcarvajalgil6705
    @abelcarvajalgil6705 2 หลายเดือนก่อน

    Thank you for your job. Excellent explication traffic North-South East-West

  • @edgarssimanis9381
    @edgarssimanis9381 2 ปีที่แล้ว

    Thanks, awesome explanation

  • @seph2x538
    @seph2x538 3 ปีที่แล้ว +1

    Bravo !! Awesome presentation and walkthrough the use case.
    I am going to lab it asap.
    Thank you

    • @shankarmaheswaran5435
      @shankarmaheswaran5435 3 ปีที่แล้ว

      Hi Joe, Have you done setup with the Lab? I need some help.

  • @user-xs6hr1ol7d
    @user-xs6hr1ol7d 2 ปีที่แล้ว

    Quite Impressive !

  • @user-sf1cv5np6o
    @user-sf1cv5np6o 8 หลายเดือนก่อน

    Awesome video

  • @abdallahezat8604
    @abdallahezat8604 2 ปีที่แล้ว

    great effort !

  • @ryanmilton2643
    @ryanmilton2643 3 ปีที่แล้ว +2

    Fantastic presentation. I’m working on exactly this model.

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 ปีที่แล้ว

      Hi Ryan, How is deployment going? I am working on the same design maybe good to share some notes? let me know thanks

    • @ryanmilton2643
      @ryanmilton2643 3 ปีที่แล้ว +1

      @@muhammadyaqoob9777 it is going well. Mine is a bigger environment. Not 100% out of POC

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 ปีที่แล้ว

      @@ryanmilton2643 Thanks, I am close to completion for my deployment of this with PA's cluster in multiple regions.

  • @vennempify
    @vennempify 3 ปีที่แล้ว +2

    This is fantastic. Though this subnetting would require a public IP on the management interface.

  • @vyaspranav
    @vyaspranav 3 ปีที่แล้ว

    awesome...

  • @djangosmissingfingers
    @djangosmissingfingers หลายเดือนก่อน

    This is awesome. I would love to see an explanation of how this changes with Overlay routing and app-vpc to subint matching as well.

  • @gkorten
    @gkorten 3 ปีที่แล้ว +1

    Hey, Ralph been a while. Thanks for sharing the info, good stuff.

    • @ralphcarter769
      @ralphcarter769 3 ปีที่แล้ว

      Anytime pal!

    • @gkorten
      @gkorten 3 ปีที่แล้ว

      @@ralphcarter769 Ralph can you give me a call at work. This is about a few projects I am working on.

  • @chatchaikomrangded960
    @chatchaikomrangded960 3 ปีที่แล้ว

    Best one!!

  • @PhaseHabit
    @PhaseHabit 3 ปีที่แล้ว

    This is a great video! In the inbound flow, where are you authenticating (e.g., via mTLS, UN/PW) the traffic? Is that needed in this case? I'm also assuming that if you didn't want East-West Prod to Dev traffic, you'd block that at the Palo (though I guess if you needed to refresh DEV from PROD for testing/development purposes) - is that right? Or is that simply looking for malicious content and session state and the GWLBe01/2 is looking at it's route table and if no there, would send a 404.

  • @thecatbellayuki
    @thecatbellayuki 3 ปีที่แล้ว +1

    That was freaking awesome. Just one question though. The GWLBe03 subnet cidr should've been /28 instead of /26 and thus the subsequent change in the DEMO-Prod-Ingreass_RT. Or am I missing something?

  • @mehulpruthi
    @mehulpruthi ปีที่แล้ว

    Thank a ton Ralph, request you to teach us about Azure GWLB with PAN Firewalls for Inbound, Outbound and East-West Security

  • @benjaminlugger2908
    @benjaminlugger2908 3 ปีที่แล้ว +3

    Hi! This is a great presentation! It provides a very good starting point. To get the full architecture picture it would be great to address the following in addtion: 1. On-Premise connectivity via VPN and DX attachment; 2. TGW Attachment to keep AWS cloud traffic in the cloud. 3. Internet Inbound (Ingress) with two AZs (e.g. How the introduction of a third party Load Balancer (e.g. f5) could look like; Ad3) I know that AWS provides the ALB and NLB beside the GWLB but some companies want to rely on their load balancers (e.g. f5) across all environments (on-premise and cloud (aws, azure, google, ...). The presentation is really great and I have my personal understanding on how points 1. 2. and 3. fit into that architecture but it would be great to see others (your view Ralph on that). All the best. THX YOU AGAIN! ROUTING MAKES SENSE NOW :-D

  • @RicardoGutierrezOchoa
    @RicardoGutierrezOchoa 3 ปีที่แล้ว +1

    Great job. QQ, what software did you use for the presentation? was it PPT?

  • @sskavuri
    @sskavuri 3 ปีที่แล้ว +1

    Thank you for the great design and explanation. If you don’t mind, can you share the diagram?

  • @Shanayathukral
    @Shanayathukral 2 ปีที่แล้ว

    Hi Raplh, great video! U mentioned about part 2 on how to ? May i know when u are doing that video?

  • @DARK_YT242
    @DARK_YT242 2 ปีที่แล้ว

    Great Job. awesome presentation!! .Want to deploy in my environment. Do you have the next session of the implementation video?.

  • @tc-cm5ml
    @tc-cm5ml 3 ปีที่แล้ว +2

    Awesome video..great work Ralph...Could you please also do a video referencing the same architecture but without Gateway LB and with usual VPN/VPC attachments...that would be a great help for me since the Gateway LB is not available in my region yet...Thanks a lot!!!

  • @tc-cm5ml
    @tc-cm5ml 3 ปีที่แล้ว +1

    Hi Ralph, do we need public IPs to be assigned compulsorily on any of the devices in the architecture you designed to make it work, please let me know... Thanks a lot!

  • @hakinen4000
    @hakinen4000 ปีที่แล้ว

    Hi Ralph, thank you for posting this, truly helped this newbie understand how AWS GW can be used. I do have a question, what if this is trying to be deployed in an environment that already has PA's setup across multiple sites and these sites connect to the Core (via IPSEC), where most of our on-prem apps reside? Thanks again for the great and easy to understand video

  • @CreateWithDre
    @CreateWithDre 2 ปีที่แล้ว

    Love it Ralph. Got this one working manually and traffic is flowing inbound/outbound as intended. Only issue is with Global Protect, my VPN users can't seem to connect to internal resources. Is that because the return path is coming back across the GWLB, but the forwarding to a server (is going across the TGW)? Any suggestions/articles that you know of addressing this concern? Thanks so much and keep up the great work.

  • @vainilk78
    @vainilk78 ปีที่แล้ว

    Ralph, that was a great session. I want to know what charting tool you used ? I want to learn more about it to map my AWS drawing design better.

  • @David-bc2oj
    @David-bc2oj ปีที่แล้ว

    What would the architecture look like if I needed to put a WAF in front of the http/https ports? The WAF would be working together with the Palo Alto NGFW to handle non-http/https traffic

  • @chrisholman7468
    @chrisholman7468 ปีที่แล้ว

    I found this very insightful (well earned kudos to you Ralph), but when trying to implement it, I can't make it support a load balanced application.
    The Prod IGW routing table only routes to AZ 1a, therefore the app is not load balanced. I've been trying to figure out how to make this possible, but no luck so far. Any hints welcome.

  • @tdelnatte
    @tdelnatte 7 หลายเดือนก่อน

    Great job, very grateful.
    Jusk ask, is it possible to create a gateway loadbalancer endpoint cross account environnement typically for inbound from internet?

  • @networkers5037
    @networkers5037 3 ปีที่แล้ว

    if you can share any document or video of deployment guide for manual integration of GWLB and PAN VM series it will be helpful.

  • @dnyaneshwarnarale88
    @dnyaneshwarnarale88 3 ปีที่แล้ว

    Awesome content. I do have One Doubt where to map Elastic IP's, from those IP's server will be accessible? Can anyone knows please let us know?

  • @arunabhbiswas3210
    @arunabhbiswas3210 9 หลายเดือนก่อน

    Very few videos available on TH-cam that talks about this architecture, but yours one is unique and best of all. Quick question about the outbound traffic (north-south) that is flowing from PROD vpc to the internet via security vpc transit attachment, that has only routes to security vpc, prod vpc and dev vpc, but i dont see any entry that tells it to redirect this outbound traffic to security vpc. Then how come it will reach to security vpc transit eni? can you please explain this?

  • @gattupalliaditya7244
    @gattupalliaditya7244 3 ปีที่แล้ว

    Can Demo-Security IGW be used for inbound traffic too instead of Demo-Production IGW ?

  • @syedlogin
    @syedlogin 2 ปีที่แล้ว

    Well explained, appreciate it. as you were mentioning, do you have deployment video as well?

  • @marekwugmailcom
    @marekwugmailcom 3 ปีที่แล้ว +2

    Very clear and helpful presentation. Thanks ! But with EC2 with EIP is simple.The only question is how to protect ALBs (either internal or internet-facing). In case of internet-facing Will ingress routing help to route traffic to GLB endpoint ?

    • @ralphcarter769
      @ralphcarter769 3 ปีที่แล้ว

      Yes, Ingress traffic > GWLBe > ALB, follow the routing.

  • @srinivasanandababu2701
    @srinivasanandababu2701 ปีที่แล้ว

    Can we use VPCe instead of traversing via Transit GW?

  • @nonatercesa2865
    @nonatercesa2865 2 ปีที่แล้ว +1

    Very nice video; well explained. Thanks Ralph. I have a few questions though. Is there a reason why you did not allow the Palo Alto (PA) firewalls to act as the NAT gateway? I have a new AWS deployment with PA firewalls in active-passive mode but one of the infrastructure requirement is to allow the PA to act as the NAT gateway, and as the VPN Gateway because the intention is to create a site-to-site (S2S) IPSec tunnel between the PA in AWS and another PA that is on-premise. I like to know if I will still need a GWLB in a case where the PAs are in active-passive and not in active-active. Awaiting your reply. Thanks again.

    • @matheusbertimansano9693
      @matheusbertimansano9693 2 ปีที่แล้ว

      i m curious as well to know if is required

    • @vennempify
      @vennempify 2 ปีที่แล้ว

      @@matheusbertimansano9693 Apparently this is supported with a slightly different architecture - I'm playing with this now and have the above architecture working as expected. I believe if you wanted to NAT out thru PAT it would rrequire another feature called Overlay Routing which released in 10.0.3 or 10.0.4.

  • @s_dee_13
    @s_dee_13 2 ปีที่แล้ว

    Does this support ipv6?

  • @mmantilla2010
    @mmantilla2010 3 ปีที่แล้ว +1

    Hi, just amazing video, very good walk through. I wanted to ask in this architecture. Where would the on premise vpn or direct connect terminate? Would it be another spoke VPC? Second question is, where would I put a VPN firewall like an ASav for Anyconnect VPN. Thank you

    • @muhammadyaqoob9777
      @muhammadyaqoob9777 3 ปีที่แล้ว

      Hi Maikel, in my opinion what you can do is create a separate RT for Direct Connect and VPN in TGW and enable routing to and from on-prem through that.

  • @randicalib
    @randicalib 2 ปีที่แล้ว

    hi, where can i watch the configuration video?

  • @looqmern
    @looqmern 2 ปีที่แล้ว

    Hi, how does one configure the palo alto to use one interface for inbound and outbound traffic and what does the security policy look like?
    Thanks

    • @Shanayathukral
      @Shanayathukral 2 ปีที่แล้ว

      I think it will be same zone to same zone policy, but your source destination subnet will be used as a differentiator.

  • @shamstabrez2986
    @shamstabrez2986 ปีที่แล้ว

    plz make video on cloud wan with complete details n hands on lab

  • @bx1803
    @bx1803 ปีที่แล้ว

    Is there a template for this available?

  • @dougclendening5896
    @dougclendening5896 2 ปีที่แล้ว

    What if you don't want inline and just want to mirror the TGW traffic off to a security vpc to be analyzed?

    • @teibidh
      @teibidh 2 ปีที่แล้ว

      You want VPC Traffic Mirroring for this, I believe.

  • @jayf9553
    @jayf9553 7 หลายเดือนก่อน

    ON the data port of the Palo's do we set up zones? I feel like you lose the ability to apply zones if you're routing all traffic though that data port without applying multiple zones. How do you apply multiple zones to one interface?

    • @maxcavalera917
      @maxcavalera917 2 หลายเดือนก่อน

      You can use sub-interfaces(this will over complicate the design) or you can just control traffic based on src/dst instead of zones (you will need to deny all intra-zone traffic that is allow by default)