Use of AWS Network Firewall for East West Scanning when using AWS Privatelink

0

Hi, as the title says. AWS network firewall is in use for east west scanning between AWS accounts. Few services are being exposed from existing accounts to new AWS accounts using Privatelink endpoints. Question is, how to get east-west scanning working for accounts using Privatelink connection? Is it even possible.

1개 답변
0
수락된 답변

Yes, this is possible. In a single VPC you would route traffic from the "source" subnet to a network Firewall endpoint (which would need to be in a second subnet) to the PrivateLink endpoint (in a third subnet). You need to ensure that the return routes follow the reverse path (PrivateLink->Network Firewall endpoint->original source subnet).

That said: What's the purpose for doing this? If the traffic is encrypted (which it should be as per best practice recommendations) then inspecting the traffic with Network Firewall isn't going to help much unless you're using the ingress inspection feature which assumes that you have the private keys (from the "far end" of the PrivateLink endpoint) - and if you have those then why use Network Firewall at all?

profile pictureAWS
전문가
답변함 10달 전
profile picture
전문가
검토됨 10달 전
  • thanks for answering the question and for the inputs, the question was part of a discussion for a very early stage proof of concept, your inputs have given me something to think about

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠