Support Center > Search Results > SecureKnowledge Details
How to deploy Check Point CloudGuard on AWS Outposts Technical Level
Solution

AWS Outposts is a fully managed service offering the same AWS infrastructure, AWS services, APIs, and tools to virtually any datacenter, co-location space, or on-premises facility for a truly consistent hybrid experience.

Customers who require the latest in next-generation security features while using Outposts can now deploy Check Point's CloudGuard Network Security and/or CloudGuard Network Security Managers on AWS Outposts to complement their deployments in AWS regions or on-premises.

The solution brief below describes how to deploy Check Point CloudGuard on Outposts including a reference architecture and support information.  


Notes

  • You must accept the Software Terms of the relevant Check Point Product AMI in the AWS Marketplace at least once before you launch the CloudFormation templates. It is not required to actually launch the instance from the Marketplace, but the agreement must be accepted from this location.
  • Some stacks may "roll back" automatically after 1 hour, with an "WaitCondition timed out" error. If this happens, make sure that your Internet access is working, either through AWS Internet Gateway (IGW) assigned to the VPC, or via the Local Gateway on Outposts. 

Known Limitations 

  • On Outposts, you can deploy CloudGuard only in a standalone Gateway or Security Cluster Mode (auto scaling clusters are not supported). 
  • The CloudFormation template used in this guide can be customized to support customer managed keys, IAM roles/profiles/etc. 
  • Inter VPC communication within an Outpost must use VPC-peering and as such cannot support inspection by a CloudGuard Gateway

Prerequisites

  • The customer is responsible for deploying AWS Outposts and all underlying connectivity to the Internet and/or Local Network resources.
  • The customer should create VPCs and Subnets before deploying CloudGuard and should use Check Point's CloudFormation Templates that “deploy into an existing VPC”.
    • The customer must create (1) Public and (1) Private Subnet belonging to the Outpost for use by CloudGuard.  Follow these AWS Outpost instructions.

Supported Use Cases


North/South (ingress/egress) next generation traffic inspection between subnets in an Outpost VPC and:
  • Public Access to the Internet
  • Private access to the local network connected to the Outpost

Reference Architecture

Deploy and configure CloudGuard in AWS Outposts

  1. Deploy a Single CloudGuard Gateway or CloudGuard Security Cluster using theCloudFormation templates available in sk111013.
    1. For a single CloudGuard Gateway use CFT # 2: “Deploys a Security Gateway into an existing VPC”.
    2. For a CloudGuard HA Security cluster, use CFT # 4: “Deploys a Cluster into an existing VPC”.
  2. Specify a stack name and parameters:
    1. VPC Network Configuration:
      1. Choose the VPC, Public (external) subnet, and Private (internal) subnet created in the prerequisites.
      2. Cluster deployment Only: Specify IP addresses for each Security Gateway, including cluster IP’s if you are deploying a Security Cluster 
    2. EC2 Instance Configuration:
      1. Choose from the available instance types according to bandwidth and feature requirements. 
        1. Check Point Recommends c5.xlarge
      2. Select an EC2 key pair to use for ssh access to the instance(s).
        1. SSH login uses the following username: admin instead of ec2-user
      3. Leave the root volume size.  
      4. Specify the customer managed key for EBS volume encryption or leave as is for the default AWS key. 
    3. c. Check Point Settings:
      1. Choose a version and license per your requirements. 
        1. Check Point Recommends R80.40. 
      2. Admin Shell: use the default /etc/cli.sh
      3. SIC Key: provide a OTP for SIC establishment with Check Point Manager.
      4. Optionally:
        1. Provide a password for admin login to the Gateways.
        2. Allow automatic information sharing with Check Point License center to improve product experience.
        3. Specify NTP servers.
        4. Provide Automatic Provisioning with Security Management Server (SMS).
  3. Check the Capabilities to acknowledge creation of IAM resources with custom names and Auto Expand, and click Create Stack to deploy the Gateways. 
  4. Cluster deployment only: Continue with CloudGuard Cluster configuration as outlined in sk104418.  

Deploy Check Point Security Management Server (SMS) on Outposts

  1. Deploy a Security Management Server (SMS) or Multi-Domain SMS via the CloudFormation templates provided in sk111013
    1. For an SMS Server, use template # 16: “Security Management Server” and refer to sk130372 for details.
    2. For Multi-Domain SMS, use template # 17: “Multi-Domain Security Management Server” and refer to sk143213 for details.
  2. Specify a stack name and Parameters and click Create Stack.

Support for Check Point CloudGuard Security Gateways or SMS on Outpost


For advanced scenarios beyond the solution described in this article, reach out to your AWS Solutions Architect/Partner Team, your Check Point Account Team, and/or contact Check Point Support.

To get support for an existing Check Point Deployment on Outposts, open a Service Request.

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment