| Multicloud Defense Gateway Enforcement Information |
| Deployment |
Click Centralized or Distributed to select the deployment type. Centralized allows the selection of only a Service VPC. Distributed allows the selection of only a regular VPC/VNet. If you select a Service VPC, the deployment operates in Hub mode. If you select a regular VPC or VNet, the deployment operates in Edge mode. |
| VPC/VNet |
You can select an existing Service VPC/VNet from the drop-down list or click + Create SVPC to create a new one.
You cannot create a new Service VPC/VNet if you selected Distributed earlier.
After you create and activate the service, the wizard automatically fills in the related network fields. This step can take up to 3 to 4 minutes.
|
| Resource Group |
Select the resource group that owns the deployment resources. |
| Mgmt. Security Group |
Select the security group to associate with the management interface. |
| Datapath Security Group 1 |
Select the security group to associate with the datapath interface. |
| Availability Zone |
(Optional) Select the specific availability zone within a cloud region where a particular Multicloud Defense gateway instance is deployed. Click + Add Availability Zone to add a new availability zone. |
| Management Subnet |
(Optional) Select the subnet for the management interface in the selected availability zone. |
| Datapath Subnet |
(Optional) Select the subnet for the primary datapath interface in the selected availability zone. |
| Gateway Configuration |
| Instance Type |
Select the VM size used for the gateway instances. |
| Minimum Instances |
(Optional) Enter the minimum number of instances you plan to deploy. This must be at least one. |
| Maximum Instances |
(Optional) Enter the maximum number of instances you plan to deploy. This is the maximum number that is used for autoscaling in each availability zone. This number must be greater than or equal to minimum instances. |
| Health Check Port |
Enter the port number that the load balancer uses to check instance health. Datapath security groups assigned to the instance(s) must allow traffic on this port. The default port is 65534, and the valid range is from 1 to 65535. |
| Gateway Image Group |
Select the logical grouping of available gateway images from the drop-down list. |
| Gateway Image |
Select the exact gateway image/version to deploy from the drop-down list. |
| Policy Ruleset |
Select the Multicloud Defense policy ruleset to attach to the gateway. |
| Azure Configuration |
| Key Selection |
You can either provide an SSH Public Key directly or select an existing SSH Key Pair from the drop-down list. |
| Username |
The default SSH username is centos. |
| User Assigned Identity ID |
(Optional) Used for accessing Key Vault or writing PCAP files to Blob Storage. |
| Disk Encryption |
(Optional) Select the disk encryption type from the drop-down list |
| Multicloud Defense Profiles |
| Packet Capture Profile |
(Optional) Select the packet capture profile for threat and flow PCAPs. |
| Log Forwarding Profile |
(Optional) Select the log forwarding profile used to forward Events/Logs to a security information and event management (SIEM) system. |
| Metrics Profile |
(Optional) Select the metrics profile. |
| NTP Profile |
(Optional) Select the Network Time Protocol (NTP) for time synchronization. |
| Advanced Settings |
| Management DNS Server |
(Optional) Enter the IP address of a DNS server reachable by the gateway for management traffic. |
| Attach Additional Load Balancer |
(Optional) Click + Add to associate Azure Load Balancers with this gateway for advanced traffic distribution. Select the Azure LB Name from the drop-down list and enter the Backend Pool Name and Resource Group. |
| Disable Public IP |
By default, the Multicloud Defense gateway enables the use of the public IP of the router available. If you do not want this enabled, check the Disable Public IP check box. This reduces the exposure of your network to external threats. |
| Use Internal Load Balancer |
To reduce the exposure of your network to external threats, you can use an internal load balancer instead of a public one for the gateway front end (Ingress only). While the Multicloud Defense gateway enables a public router IP by default, you can opt for a private configuration by checking the Disable Public IP check box. |