image
Features of AWS Network Firewall

Contents

VPC Fundamentals
2
What is a VPC?
PREVIEW2m 25s
VPC Security and Control
VPC Connectivity
VPC Sharing using the AWS Resource Access Manager
Feature Spotlight:
Start course
Difficulty
Advanced
Duration
3h 12m
Students
534
Ratings
4.6/5
starstarstarstarstar-half
Description

In this section of the AWS Certified Advanced Networking - Specialty learning path, we introduce you to the various networking and VPC services currently available in AWS that are relevant to the ANS-C01 exam.

Learning Objectives

  • Identify and describe the various networking services available in AWS
  • Describe how to configure an Amazon Virtual Private Cloud (VPC)
  • Understand how to control network traffic via Security Groups and Network Access Control Lists (NACLs)
  • Describe options for VPC connectivity, subnets, and routing
  • Understand how to share VPC resources using the AWS Resource Access Manager (RAM)
  • Identify how to evaluate the configuration of VPC resources using the VPC Reachability Analyzer

Prerequisites

The AWS Certified Advanced Networking - Specialty certification has been designed for anyone with experience designing, implementing, and operating complex AWS and hybrid networking architectures. Ideally, you’ll also have some exposure to the nuances of AWS networking, particularly regarding the integration of AWS services and AWS security best practices. Many exam questions will require advanced level knowledge of many AWS services, including AWS networking services. The AWS Cloud concepts introduced in this course will be explained and reinforced from the ground up.

Transcript

There are a number of features natively supported and available when implementing AWS Network Firewall. The features that are automatically available when deploying AWS Network Firewall include high availability and automated scaling, stateful firewall, web filtering, IPS or intrusion prevention, central management and visibility, alert and flow logs, and rule management and customization, plus a diverse ecosystem of partner integrations. How about we talk about each feature to gain a better understanding of all the capabilities of AWS Network Firewall?

The first feature is that the AWS Network Firewall is fully managed, highly available, and with automated scaling. AWS supports a service level agreement, or SLA, that is committed to an uptime of 99.99%. The next three features allow for more granular enforcement and policy controls, including encryption and detection capabilities.

They are stateful firewall, web filtering, and intrusion prevention. First, stateful means that the session connection is saved or remembers the communication that took place. This allows for more granular policy enforcement, including filtering common protocols without a specific port, not just TCP and UDP traffic. Moving onto web filtering, the AWS Network Firewall supports unencrypted web traffic that is either destined in or outbound. Or, if using encryption, the SNI, or server name indication, is used for specific sites. Typically, you'll use an SNI with a WAF, or in this case, AWS WAF. For more information on AWS WAF, please see our existing course here. The final feature in this set is IPS, or intrusion prevention system, that allows inspection of real-time network traffic at the application layer, including protection against vulnerability, exploits, and brute force attacks. AWS Network Firewall won't be complete without providing a place for central management, visibility, alerts, and flow logs.

The AWS Network Firewall provides the flexibility of a single deployment, or essentially deployed environment, to manage security policies across all of your apps, VPCs, or AWS organization. Grouping rules together, aggregating views of policy compliance, including automated remediation, bringing new accounts, resources, and network components into compliance immediately. What about alerts and flow logs? Alerts are configured for specific rules and provide data on which rule was triggered. And with the flow logs, it provides state information about all the traffic that passes through the Firewall. All this data can be stored in Amazon S3, used with Amazon Kinesis, or configured with CloudWatch alerts. The next feature is rule management and customization.

AWS has started to include more open-source functionality within its services and enables customers to run compatibility rules sourced internally. From in-house development or externally from third party vendors. With a diverse ecosystem of partner immigrations, AWS Network Firewall supports a number of managed threat intelligence feeds for customers who prefer to leverage their existing providers. Additionally, the AWS Network Firewall logs any and all security event information can be sent to third party analytics solutions.

 

About the Author
Students
228694
Labs
1
Courses
215
Learning Paths
178

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.