Share Your AWS re:Post Experience - Quick 3 Question Survey and Earn a re:Post Badge
Help us improve AWS re:Post! We're interested in understanding how you use re:Post and its impact on your AWS journey. Please take a moment to complete our brief 3-question survey
How do I set up an AWS Network Firewall with a NAT gateway?
I want to configure my AWS Network Firewall to inspect traffic using a NAT gateway.
Short description
AWS Network Firewall provides more granular control over traffic to and from the resources inside your Amazon Virtual Private Cloud (Amazon VPC). To protect your Amazon VPC resources, you can deploy your Network Firewall endpoints in their own subnets and route the workload instance traffic through them. This can be done by:
- Creating a VPC
- Creating a firewall
- Configuring the traffic routing
Note: Network Firewall cannot inspect workloads in the same subnet where the firewall endpoints are deployed.
Resolution
Creating a VPC
- Open the Amazon VPC console.
- On the VPC dashboard, click Create VPC.
- Under VPC settings, enter the following:
Choose VPC and more.
Under Name tag auto-generation, enter a name for the VPC. For this example, the VPC is named Protected_VPC_10.0.0.0_16-vpc. If the Auto-generate option is selected, the name will be added as a name tag to all resources in the VPC.
For IPv4 CIDR block, enter 10.0.0.0/16.
For IPv6 CIDR block, choose No IPv6 CIDR block.
For Tenancy, choose Default.
For Number of Availability Zones (AZs), choose 2.
Under Customize AZs, choose two Availability Zones. For this example, us-east-2a and us-east-2b are selected.
For Number of public subnets, choose 2.
For Number of private subnets, choose 4. Two of the private subnets are for the firewall and two are for the workload subnets.
For NAT gateways ($), choose 1 per AZ. The NAT gateways are deployed in the public subnets automatically.
For VPC endpoints, choose None. - Choose Create VPC.
- Name the subnets according to their purpose:
The two public subnets are for the NAT gateways and are named Public_Subnet_AZa and Public_Subnet_AZb for this example.
For the private subnets, two are for the firewall endpoints and are named Firewall_Subnet_AZa and Firewall_Subnet_AZb for this example.
The other two private subnets are for the workload endpoints and are named Private_Subnet_AZa and Private_Subnet_AZb for this example.
Create a firewall
- On the navigation pane, under Network Firewall, choose Firewalls.
- Choose Create firewall.
- Under Create firewall, enter the following:
Enter a name for the firewall. For this example, the firewall is named Network-Firewall-Test.
For VPC, choose Protected_VPC_10.0.0.0_16-vpc.
For Firewall subnets, choose the first Availability Zone (us-east-2a) and choose Firewall_Subnet_AZa for the subnet. Then, choose Add new subnet and repeat for the second Availability Zone (us-east-2b) and choose Firewall_Subnet_AZb for the subnet.
For Associated firewall policy, choose Create and associate an empty firewall policy.
For New firewall policy name, enter a name for the new policy. - Choose Create firewall. Each subnet must have a unique routing table. The four private subnets have a unique routing table associated with it, while the public subnets share a routing table. You must create a new routing table with a static route to an internet gateway and associate it to one of the public subnets.
Configure the traffic routing
The traffic flows as follows:
- Traffic initiated from workload instance in AZa is forwarded to firewall endpoint in AZa.
- The firewall endpoint in AZa will route the traffic to the NAT gateway in AZa.
- NAT gateway in AZa forwards the traffic to the internet gateway associated with the VPC.
- The internet gateway forwards the traffic out to the internet.
The reverse traffic follows the same path in the opposite direction:
- Return traffic from the internet reaches the internet gateway attached to the VPC. There can only be one internet gateway attached to a VPC.
- The internet gateway forwards the traffic to the NAT gateway in AZa. The internet gateway makes this decision based on the workload Availability Zone. Because the destination of the traffic is in AZa, the internet gateway picks the NAT gateway in AZa to forward the traffic. There is no need to maintain a route table for internet gateway.
- The NAT gateway in AZa forward the traffic to the firewall endpoint in AZa.
- The firewall endpoint in AZa forward the traffic to the workload in AZa.
Note: Internet gateways can identify the NAT gateway for packets returning from the internet to the workload instances.
After creating the VPC and firewall, you must configure the routing tables. When configuring the routing tables, keep the following in mind:
- The private subnet in AZa (Private_Subnet_AZa) forwards all traffic destined to the internet to the firewall endpoint in AZa (Firewall_Subnet_AZa). This is repeated with the private subnet in AZb and the firewall endpoint in AZb.
- The firewall subnet in AZa (Firewall_Subnet_AZa) forwards all traffic destined to the internet to a NAT gateway in AZa ( Public_Subnet_AZa). This is repeated with the firewall subnet in AZb and the NAT gateway in AZb.
- The public subnet in AZa (Public_Subnet_AZa) forwards all traffic to the internet gateway attached to the VPC.
- Return traffic follows the same path in reverse.
Note: Traffic is kept in the same Availability Zone so that the network firewall has both the egress and ingress traffic route through the same firewall endpoint. This allows the firewall endpoints in each Availability Zone to make stateful inspections of the packets.
The following are example configurations of the routing tables:
Public_Subnet_RouteTable_AZa (Subnet association: Public_Subnet_AZa)
Destination | Target |
---|---|
0.0.0.0/0 | Internet gateway |
10.0.0.0/16 | Local |
10.0.128.0/20 | Firewall endpoint in AZa |
Note: In this example, 10.0.128.0/20 is the CIDR of Private_Subnet_AZa.
Public_Subnet_RouteTable_AZb (Subnet association: Public_Subnet_AZb)
Destination | Target |
---|---|
0.0.0.0/0 | Internet gateway |
10.0.0.0/16 | Local |
10.0.16.0/20 | Firewall endpoint in AZb |
Note: In this example, 10.0.16.0/20 is the CIDR of Private_Subnet_AZb.
Firewall_Subnet_RouteTable_AZa (Subnet association: Firewall_Subnet_AZa)
Destination | Target |
---|---|
0.0.0.0/0 | NAT gateway in Public_Subnet_AZa |
10.0.0.0/16 | Local |
Firewall_Subnet_RouteTable_AZb (Subnet association: Firewall_Subnet_AZb)
Destination | Target |
---|---|
0.0.0.0/0 | NAT gateway in Public_Subnet_AZb |
10.0.0.0/16 | Local |
Private_Subnet_RouteTable_AZa (Subnet association: Private_Subnet_AZa)
Destination | Target |
---|---|
0.0.0.0/0 | Firewall endpoint in AZa |
10.0.0.0/16 | Local |
Private_Subnet_RouteTable_AZb (Subnet association: Private_Subnet_AZb)
Destination | Target |
---|---|
0.0.0.0/0 | Firewall endpoint in AZb |
10.0.0.0/16 | Local |
To verify if your routing was configured correctly, you can deploy an EC2 instance in one of your private subnets to test your internet connectivity. Without any rules configured in the network firewall policy, traffic will not be inspected and can reach the internet. After confirming your routing, security group, and network access control lists (network ACLs) are configured, add rules to your firewall policy.
Note: You can also set up Network Firewall to route traffic from the internet through the firewall, then the NAT gateway. For more information, see Architecture with an internet gateway and a NAT gateway.
Related information
Logging and monitoring in AWS Network Firewall
Deployment models for AWS Network Firewall with VPC routing enhancements

Relevant content
- asked 2 years agolg...
- asked 3 years agolg...
- Accepted Answerasked a year agolg...
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 3 days ago