CloudGuard WAF
  • Documentation Overview
  • What is CloudGuard WAF?
  • Getting started
    • Prepare key information
    • Log in to the Infinity Portal
    • Protect a Web Application / API
    • Deploy Enforcement Point
      • Gateway/Virtual Machine
        • AWS
          • Store Certificates in AWS
          • Store certificates on Gateway
        • Azure
          • Store Certificates in Azure
          • Store Certificates on Gateway
        • VMware
          • Store Certificates on Gateway
          • Configure networking in VMware Deployments
      • WAF as a Service
        • Certificates Managed by Check Point
        • Bring Your Own Certificate
      • Kubernetes Ingress
        • Kong Application Security
        • Istio Application Security
      • Docker
        • Single Docker
          • Deployment using 'docker' command
            • Store Certificates Locally on Docker
          • Deployment in Azure App Services
        • Dual Docker: NGINX/Kong/Envoy + Security Agent
      • Linux / NGINX / Kong
    • Monitor Events
  • Concepts
    • Gateways & Agents
    • Management & Automation
    • Security Practices
    • Contextual Machine Learning
  • Additional Security Engines
    • Anti-Bot
    • API Protection
      • API Discovery
      • Track API Discovery Learning
      • Enforce API Schema
    • File Security
    • Intrusion Prevention System (IPS)
    • Rate Limit
    • Snort Rules
  • SETUP INSTRUCTIONS
    • Setup Custom Rules and Exceptions
    • Setup Web User Response Pages
    • Setup Log Triggers
    • Setup Report Triggers
    • Setup Notification Triggers
    • Setup Behavior Upon Failure
    • Setup Agent Upgrade Schedule
  • HOW TO
    • Edit Web Application/API Settings
    • Edit Reverse Proxy Advanced Settings for a Web Asset
    • Protect an existing production site with CloudGuard WAF's Gateway
    • View Policy of all your Web Applications/APIs
    • Add Data Loss Prevention (DLP) rules
    • Configure Contextual Machine Learning for Best Accuracy
    • Track Agent Status
    • Track Learning and Move from Learn/Detect to Prevent
    • Rotate profile authentication token
    • Upgrade your Reverse Proxy when a Linux/NGINX agent is installed
    • Use Terraform to Manage CloudGuard WAF
    • Authorize Temporary Access for Check Point Support
    • Restrict Access to Backend Servers from CloudGuard WAF as a Service IPs Only
  • Troubleshooting
    • WAF Gateway / Virtual Machine
      • Azure
        • "Unable to find a tag containing the vault's name in the VMSS" Error
        • How To: Configure Key Vault for a Single Gateway
      • NGINX Error: Upstream Sent Too Big Header While Reading Response Header from Upstream
      • How To: Compare Between the Gateway's Certificate and the Upstream Certificate
    • Linux
      • SELinux: Checking Status and Disabling
    • WAF as a Service
      • Certificate Validation Failed: Adjusting CAA Record
      • How To: Redirect a Root Domain to a Subdomain Protected by WAF SaaS
      • How To: Extend Connection Timeout to Upstream
      • How To: Update Expired Certificates
  • references
    • Agent CLI
    • Management API
    • Event Query Language
    • Writing Snort Signatures
    • Events/Logs Schema
    • CVE-2022-3786 and CVE-2022-3602: OpenSSL X.509 Email Address Buffer Overflows (HIGH)
    • CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974: Ingress NGINX Controller RCE (Critical)
  • Resources
    • GitHub
    • Docker Hub
Powered by GitBook
On this page

Was this helpful?

  1. Getting started
  2. Deploy Enforcement Point
  3. Gateway/Virtual Machine

AWS

PreviousGateway/Virtual MachineNextStore Certificates in AWS

Last updated 1 month ago

Was this helpful?

Overview

If you are deploying a CloudGuard WAF AppSec Gateway to protect an existing production website, we recommend you also read the .

CloudGuard WAF can be deployed as either a single virtual machine or Auto-Scaling Group in AWS. It acts as a reverse proxy where before / after you can deploy AWS Load Balancers:

When deploying an auto-scaling group, the external load balancer is deployed automatically

Installation

Follow these steps to deploy CloudGuard WAF in AWS using a supplied CloudFormation Template:

Step 1: AWS Console Log in

Log in to AWS Console and select the relevant region.

Step 2: Activate CloudGuard WAF through the AWS Marketplace (Once per Region)

Step 3: Verify required permissions

Verify that you have the required IAM permissions:

IAM permissions

CloudFormation::DescribeStackEvents

CloudFormation::DescribeStacks

CloudFormation::ListStacks

CloudFormation::ListStackResources

CloudFormation::CreateStack

elasticloadbalancing::DescribeLoadBalancers

elasticloadbalancing::DescribeListeners

elasticloadbalancing::DescribeTargetGroups

elasticloadbalancing::CreateTargetGroup

elasticloadbalancing::CreateListener

elasticloadbalancing::CreateLoadBalancer

elasticloadbalancing::ModifyTargetGroupAttributes

elasticloadbalancing::ModifyLoadBalancerAttributes

SNS::CreateTopic

SNS::GetTopicAttributes

SNS::Subscribe

IAM::GetRolePolicy

IAM::PutRolePolicy

IAM::CreateInstanceProfile

IAM::CreateRole

IAM::AddRoleToInstanceProfile

EC2::DescribeInternetGateways

EC2::DescribeLaunchTemplates

EC2::DescribeLaunchTemplateVersions

EC2::DescribeKeyPairs

EC2::DescribeSecurityGroups

EC2::DescribeSubnets

EC2::DescribeVpcs

EC2::DescribeAccountAttributes

EC2::CreateTags

EC2::AuthorizeSecurityGroupIngress

EC2::CreateLaunchTemplate

EC2::CreateSecurityGroup

EC2::RunInstances

CloudWatch::PutMetricAlarm

Health::DescribeEventAggregates

If you want AutoScaling setup:

AutoScaling::UpdateAutoScalingGroup

AutoScaling::CreateAutoScalingGroup

AutoScaling::DescribeAutoScalingGroups

AutoScaling::DescribeScalingActivities

AutoScaling::PutScalingPolicy

AutoScaling::PutNotificationConfiguration

If you want to store certificates in AWS:

KMS::CreateGrant

KMS::DescribeKey

Step 4: Deployment using CloudFormation

Choose one of three deployment options :

Choose the correct fulfillment option in the Marketplace offer:

VPC Network Configuration

  • Availability Zone - The availability zone in which to deploy the instance.

  • VPC CIDR - If you launched the CloudFormation template to create a new VPC - The CIDR of the new VPC.

  • Public Subnet CIDR - The Public (Frontend) subnet of the CloudGuard WAF's Gateway.

  • Private Subnet CIDR - The Private (Backend) subnet of the CloudGuard WAF's Gateway.

EC2 Instance Configuration

  • Gateway Name - EC2 name.

    • Minimum requirements: c5.large

  • Key name - The EC2 Key Pair you created for this region.

  • Auto Assign Public IP - If selected Yes, then the solution has a public IP address.

Check Point Settings

  • Gateway’s Password hash – The hashed password for the Gaia Administration Portal. User is set to ‘admin’. Use this command to create the hash: openssl passwd -1 <password>. It is also possible to create a password using the SHA512 algorithm as follows: openssl passwd -6 <password>.

  • Infinity Next Agent Token - The token copied from the profile.

  • Fog Address (optional) - Not used in production installations. The production cloud address is determined automatically.

Advanced Settings

  • Gateway Hostname (Optional) - The Gaia Hostname.

  • Bootstrap Script (Optional)

The default Security Group associated to the created VPC is defined with these ports for Inbound traffic:

  • TCP Port 22 - for SSH.

  • TCP Port 443 - for HTTPS.

  • TCP Port 30443 - The CloudGuard WAF Gateway's Web UI.

  • TCP Port 80 - for HTTP.

Choose the correct fulfillment option in the Marketplace offer:

VPC Network Configuration

  • VPC - Select an existing Virtual Private Network from your region.

  • Public Subnet CIDR - Select the Public (Frontend) subnet of the CloudGuard WAF's AppSec Gateway from the available list.

  • Private Subnet CIDR - Select the Private (Backend) subnet of the CloudGuard WAF's AppSec Gateway from the available list.

  • Internal route table (optional) - keep empty.

EC2 Instance Configuration

  • Gateway Name - EC2 name.

    • Minimum requirements: c5.large

  • Key name - The EC2 Key Pair you created for this region.

  • Auto Assign Public IP - If selected Yes, then the solution has a public IP address.

Check Point Settings

  • Gateway’s Password hash – The hashed password for the Gaia Administration Portal. User is set to ‘admin’. Use this command to create the hash: openssl passwd -1 <password>.

  • Infinity Next Agent Token - The token copied from the profile.

  • Fog Address (optional) - Not used in production installations. The production cloud address is determined automatically

Advanced Settings

  • Gateway Hostname (Optional) - The Gaia Hostname

  • Bootstrap Script (Optional)

A security group with the name suffix "*_PermissiveSecurityGroup" will be created and associated with the existing VPC. This security group is defined with these ports for Inbound traffic:

  • TCP Port 22 - for SSH.

  • TCP Port 443 - for HTTPS.

  • TCP Port 30443 - The CloudGuard WAF AppSec Gateway's Web UI.

  • TCP Port 80 - for HTTP.

Choose the correct fulfillment option in the Marketplace offer:

VPC Network Configuration

  • VPC - Select an existing Virtual Private Network from your region.

  • Gateways subnets – Select at least two subnets in your VPC.

    The subnets must allow outbound traffic to the internet for communicating with CloudGuard WAF's Cloud.

EC2 Instance Details

  • Auto Scaling Group name - The name of the Auto Scaling Group. This name determines the VM's hostname prefix.

  • Volume encryption - EBS encryption of the instances volumes using AWS managed KMS key. Custom KMS keys are not supported. If regional encryption is used then both AWS managed and Custom KMS keys are supported.

  • Allow access from - Specifies the client IP addresses that can reach your instance. This IP address range must be in CIDR notation.

    • To add IP addresses after the deployment:

      1. Go to your deployed Stack > Resources or go to Services > EC2 > Security Groups and select the relevant Security Group.

      2. Click Edit inbound rules.

      3. Below the Source field, enter a list of IP addresses.

  • Key name - The EC2 Key Pair you created for this region.

  • Gateway’s Password hash (Optional) – This relates to Check Point Gaia administration portal. Read the next section for further explanation.

Check Point Related Settings

  • Gateway’s Password hash (Optional, appears in EC2 instance details section) – The hashed password for the Gaia Administration Portal. User is set to ‘admin’.

    Use this command to create the hash:

    openssl passwd -1 <password>.

  • Infinity Next Agent Token - The token copied from the profile.

  • Fog Address (optional) - Not used in production installations. The production cloud address is determined automatically.

  • Specify an S3 bucket for scaling events - This option allows defining an S3 bucket (a new or existing one) which allows scaling events to occur without the need to connect to Check Point's cloud. It is recommended to use an S3 bucket so scaling events will be not be disrupted by temporary Internet connectivity issues, for example, as the new instance must get its software and policy.

  • Specify an S3 bucket name - If you selected "existing S3 bucket" or "new S3 bucket", you must specify the name of the S3 bucket here.

Auto Scaling Group Settings

  • Type of the Load Balancer - Choose whether you want to deploy a solution with network or application load balancer.

Note - For application load balancer, in order to configure the HTTP health checks the following settings must be added to the Infinity Next profile:

Key: agent.rpmanager.nginxIncludeLines

Value: server {listen 8117; return 200;}

Key: agent.config.orchestration.healthCheckProbe.enable

  • Scheme of the Load Balancer - Choose if the load balancer should be Internal or External.

  • Initial number of gateways – The initial number of EC2 instances that is deployed together with the Auto Scaling Group.

  • Maximum number of gateways – The maximum number of EC2 instances the Auto Scaling Group can scale to.

  • Bootstrap script (Optional) - An optional script to run on the initial boot.

  • Administrator email address (Optional) - An email address to notify users about scaling events.

Troubleshooting Tips
  • After launching the CloudFormation, you can monitor AWS resources creation progress in AWS console under the 'Resources' tab of the deployed parent and nested stacks. In any case of provisioning failure, the created resources will be deleted, and the reason of failure can be viewed under 'Events' tab of the failed stack.

  • Verify that you entered the correct Token taken from the profile page. Otherwise your AppSec Gateway will not be able to connect to Check Point cloud

  • Verify that the subnet where you deploy the AppSec Gateway have outbound internet connectivity

  • Verify that the chosen EC2 instance type is available in your region

  • Verify that you have sufficient IAM permissions as listed above to run the CloudFormation stack

Step 5: SSL Certificates

Choose the desired SSL Certificates storage method:

Step 6: Launch the stack

To launch the Stack, select these two checkboxes:

When deploying CloudGuard WAF Gateway without assets connected to the profile, the Gateway will be deployed with the Orchestrator nano-service only.

In this case, a manual change in the LB health check configuration will need to be changed manually from port 5555 to port 8117.

Search for . During activation, a form with a field to select one of the AWS regions, is shown. Select the region in which you wish to deploy CloudGuard WAF's Gateway.

Gateway Instance type - The machine size of the VM. Each machine size has its own compute price. See .

Enable AWS Instance Connect - Amazon EC2 Instance Connect is a simple and secure way to connect to your instances using Secure Shell (SSH). See the .

Make sure you obtain the <token> from the page, Authentication section.

To configure a single CloudGuard WAF gateway installation with SSL, refer to .

Gateway Instance type - The machine size of the VM. Each machine size has its own compute price. See .

Enable AWS Instance Connect - Amazon EC2 Instance Connect is a simple and secure way to connect to your instances using Secure Shell (SSH). See the .

Make sure you obtain the <token> from the page, Authentication section.

To configure a single CloudGuard WAF AppSec gateway installation with SSL, refer to .

Gateway Instance type - The machine size of the VM. Each machine size has its own compute price. See . Minimum requirements: c5.large

Enable EC2 Instance Connect - Amazon EC2 Instance Connect is a simple and secure way to connect to your instances using Secure Shell (SSH). See the .

Make sure you obtain the <token> from the page, Authentication section.

Value: false

Creating the stack in AWS takes about 6-8 minutes. When the CloudGuard WAF EC2 loads it will automatically connect to Check Point, register using the token you provided and fetch your policy. Then, either or . If successful, you will see a green notification bar in this portal with a message that your Agent/Gateway successfully connected.

CloudGuard WAF in AWS Marketplace
Amazon EC2 Instance Types
AWS EC2 User Guide
Enforcement Profile
Infinity Next Deployment and Configuration
Amazon EC2 Instance Types
AWS EC2 User Guide
Enforcement Profile
Infinity Next Deployment and Configuration
Amazon EC2 Instance Types
AWS EC2 User Guide
Enforcement Profile
Store Certificates in AWS
Store Certificates on the Gateway
Store Certificates in AWS
Store certificates on Gateway
HOW-TO guide for this particular deployment