QMCLOUD
  • What is QMCLOUD
  • Overview
    • Component Details
    • Security and RBAC
    • Dependencies
  • Architecture
  • Main features
  • Installation and Configuration
    • QMCLOUD SaaS
      • SaaS Registration
    • AWS Marketplace
    • Self-hosting
  • User Interface and Navigation
    • Main menu
    • Dashboard
    • General action buttons
    • Stack and Canvas
    • Stack Details
  • Getting started
    • Pre-requisites
    • Login to QMCLOUD
    • Create organization
    • Add Role
    • Add User
    • Add Components
    • Add Stack Profile
    • Add Workspace
    • Add Stack
    • Compose Infrastructure Using the Canvas
    • Add AWS Vpc
    • Add Subnets
    • Connect VPC and Subnets
    • Save Canvas State
    • Deploy the Infrastructure
  • AI Copilot
    • Example deployment using AI Copilot
    • AI Copilot pre-defined prompts
  • Additional resources
    • Explainer video
    • Short video on AI Copilot
    • Quick walkthrough videos
    • Walkthrough of deployment of AWS EKS
  • Examples
    • Deploy AWS Firewall and Networking with QMCLOUD
      • Application and landing zone components
      • List of landing zone components
      • Deployment steps
      • VPC configuration details
      • Routing configuration details
      • Firewall configuration
      • Additional components configuration
    • Securing applications in AWS using Palo Alto firewall
  • Templates
    • AWS Landing Zone
    • AWS EKS
    • Azure Web App
Powered by GitBook
On this page

Was this helpful?

  1. Examples
  2. Deploy AWS Firewall and Networking with QMCLOUD

VPC configuration details

The following VPC configuration was used in the sample deployment

PreviousDeployment stepsNextRouting configuration details

Last updated 2 years ago

Was this helpful?

CIDR Block - 172.21.0.0/19

Three subnets (private, DMZ and Firewall) in us-east-1c

Private - 172.21.18.0/23 (EC2 Instance)

DMZ - 172.21.30.0/23 (NAT GW and NLB)

Firewall Subnet - 172.21.0.0/23 (Firewall)

All traffic inbound and outbound is filtered via the firewall

Connections:

Connect each of the subnets to the VPC using the connector (Select the VpcId property end point on the subnet component represented by the red dot and connect to the VPC component represented by green end point on the Vpc shape). The following diagram depicts the VPC and Subnet components and the connection.