Adding FireNet to an AWS Transit Gateway

Ensure you have completed any prerequisites before beginning.

See Minimum Gateway Instance Sizes for FireNet deployment for information on the interfaces/NICs created when you add FireNet to a Transit Gateway.
  1. On the Security > FireNet > FireNet Gateways tab, click +Add FireNet.

  1. In the Add FireNet to Transit Gateway dialog, select if you want to add FireNet functionality to an existing Transit gateway or on a new Transit gateway.

    If you are adding FireNet to an existing Transit gateway that has the BGP over LAN slider On, that Transit gateway must also have DNAT/SNAT configured.

    Only Transit gateways that have the Transit Egress Capability toggle enabled (selected when you create a Transit gateway from Cloud Fabric > Gateways > Transit Gateways) are displayed in the Existing Transit Gateway List.

  1. If creating a new Transit gateway, enter a name in the Name field.

  2. Configure the Transit FireNet using the information in the table below.

    Parameter Description

    Name

    A name for the Transit FireNet

    Cloud (prepopulated if creating on an existing Transit gateway)

    Select Cloud type: Standard, GovCloud, China

    Account (pre-populated if creating on an existing Transit gateway)

    The cloud access account for creating the Transit FireNet Gateway.

    Region (pre-populated if creating on an existing Transit gateway)

    The cloud region in which to create the Transit FireNet Gateway.

    VPC/VNet

    The VPC or VNet in the selected region in which to create the Spoke Gateway.

    Instance Size

    Minimum size: c5.xlarge

    The minimum size may vary if HPE is enabled.

    High Performance Encryption (HPE)

    Turn On HPE for the FireNet deployment, for higher throughputs.

    Attach to Subnet

    FireNet is launched in this public subnet.

    Public IP

    Allocate a new, static public IP address to the new Transit gateway.

    Primary FireNet

    Select if you want this FireNet to be the Primary FireNet where firewalls are attached.

    Secondary FireNet

    Select if you want this to be a Secondary FireNet that will send traffic to the Primary FireNet to be inspected.

    Egress and traffic inspection are disabled when Secondary FireNet is selected.

    Attach Secondary FireNets

    Select the Secondary FireNets to attach to this Primary FireNet.

    Attach to Primary FireNet

    Select the Primary FireNet to which to attach this Secondary FireNet.

    Gateway Load Balancer

    Slide On to enable the AWS Gateway Load Balancer (differs from the Native AWS Load Balancer, which is part of the AWS TGW FireNet workflow).

    If the Gateway Load Balancer option was turned On as part of the Transit Gateway creation workflow (for AWS), it will be On and disabled in the Transit FireNet creation workflow. If the Gateway Load Balancer option was left Off as part of the Transit Gateway creation workflow (for AWS), it will be Off and disabled in the Transit FireNet creation workflow.

    Traffic Inspection

    If turned Off the FireNet gateway loops back all packets.

    If creating an AWS Transit Gateway with Secondary FireNet selected, Traffic Inspection is Off by default, and hidden.

    Egress

    Enable Egress (Internet-bound) traffic inspection.

  1. Click Add.

    If you are attaching Secondary FireNets to Primary (AWS only), the Attach Secondary FireNet to Primary FireNet dialog displays.

    You can check the FireNet creation progress on the Monitor > Notifications > Tasks tab.