It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

This Firmware Version Is End-Of-Support

Documentation for this product is no longer updated. Please see End-of-Support for CloudGen Firewall Firmware for further information on our EoS policy.

How to Deploy a Volume-Based (Metered) PAYG CloudGen Firewall Image in AWS

  • Last updated on

When deploying a PAYG CloudGen Firewall in AWS, you can pay for your firewall licenses per hour or per amount of traffic handled by the firewall. The volume-based PAYG CloudGen Firewall image is deployed just like the other CloudGen Firewall images in the AWS Marketplace, with one additional IAM policy to allow the firewall to report the data usage to the AWS Marketplace. Failing to include the required IAM role policies causes the firewall license to switch to Grace Expired mode. To safeguard against unexpected high traffic usage, Barracuda Networks recommends to configure CloudWatch alarms to monitor traffic passing through the firewall.

For more information on volume-based PAYG licensing, see Public Cloud Licensing.

aws_report_traffic.png

Before You Begin

(optional) Identify the AWS reference architecture and download the template you want to deploy. For more information, see Implementation Guide - CloudGen Firewall in AWS.

Step 1. Create an IAM Role for the Firewall

Create an IAM role for your firewall instance. Verify that all the IAM policies required for the selected reference architecture are included in the IAM role. The following IAM policies are required:

  • AWS Marketplace Metered Billing
  • AWS CloudWatch

aws_IAM_role_12.png

For step-by-step  instructions, see How to Create an IAM Role for a CloudGen Firewall in AWS.

Step 2. Deploy the Firewall

Deploy the CloudGen Firewall via AWS Console or CloudFormation template. For template deployments, verify that the correct volume-based PAYG firewall IAM is used for your region.

Your CloudGen Firewall is now reporting the traffic metrics every full hour to the AWS Marketplace.

Next Steps

Configure CloudWatch alarms to monitor traffic to and from the firewall to safeguard against unexpected high traffic usage.