Sorry if this sounds remedial as I'm a newbie to UTM. We are configuring the UTM as our perimeter firewall in AWS. In a traditional on-premise datacenter architecture, a Cisco ASA firewall provides the gateway for the public IP addresses, and performs the natting to the internal hosts along with the routing and firewall rules. How does this work in the AWS VPC configuration? For example, if we have 5 public IP addresses, 70.208.130.1-5, the Cisco ASA firewall would provide a gateway for the 5 addresses to the internal private network. How do we configure this in the UTM in AWS? Do we need a 1:1 NAT? Do we need to attach 5 eni's (network interfaces) to the UTM, and associate the 5 public IP's (EIP) to each eni? Do we add the 5 public IPs to the Additional Addresses to the External interface? Is there configuration on the UTM to do this without creating a 1:1 NAT?
Hopefully, I explained this correctly.
Thanks in advance!
This thread was automatically locked due to age.