This lab assumes you have deployed AWS Network Firewall using
Distributed Deployment Model Setup. Same steps are applicable for Centralized Deployment Model. Resource names may vary depending on the CloudFormation stack name you provided.
In this lab, we’ll verify that AWS Network Firewall and other resources previously provisioned as part of
Since we have already provisioned an AWS Network Firewall as part of our Setup instructions, let’s verify the policy and rule groups created by CloudFormation template.
AWS Network Firewall is listed under VPC in the AWS Web console:
In the AWS Web Console, click on VPC -> Firewalls to list the currently provisioned Firewalls.
aws-network-firewall-anfw-distributed-demo Firewall to see more details.
At this step, review following information :
Click on the
Firewall details tab :
The Firewall details tab provides the following details :
Click on the
This tab provides details on Firewall metrics e.g.:
CloudFormation stack for
Distributed Deployment Model Setup creates EC2 instances
test-instance-* in Private Subnet in each AZ. In this step, we will EC2 instance details.
EC2 instances are listed under EC2 in the AWS Web console. Launch Amazon EC2 console in the region where you have created your
Distributed Deployment Model Setup and verify EC2 instance is listed and running.
Verify you can connect to the EC2 instance:
test-instance-2-anfw-distributed-demo(instance name may vary depending on the CloudFormation stack name you provided) and cick on connect:
Now we are ready to proceed with next exercise. Press Next (the right arrow) on this page.