Protect Egress Forwarding Proxy for Subnets
Procedure
1 |
From the Multicloud Defense Controller, navigate to Infrastructure > Gateway. |
2 |
Select the egress gateway from the list of gateways and click Action. |
3 |
Select Manage Spoke Subnets from the drop-down list. The list of route tables inside the Bring Your Own VPC is displayed in the subnets within the same VPC section. |
4 |
Set the toggle to Enabled to protect the subnet that you want. The route table and associated subnets are protected. |
5 |
Select the Subnets in different VPC tab, if your instance resides in a different VPC and you want to protect those subnets. |
6 |
Select the VPC and click View/Edit. The Protect VPC/VNet page is displayed. |
7 |
In the Route Table section, select the route table to Add Default Route to all. This action ensures the protection of the VPC by routing the traffic through the gateway. The routes tables are updated automatically. In your cloud service provider console, you can also set the default route to 0.0.0.0 in the gateway load balance (GWLBe). Similarly, you can protect a subnet inside the gateway for another VPC. |
8 |
Click Save. A fully configured Multicloud Defense gateway is deployed in your VPC. |