
Answer-first summary for fast verification
Answer: Deploy a Gateway Load Balancer with the firewall appliances as targets. Configure the firewall appliances with a single network interface in a private subnet. Use a NAT gateway to send the traffic to the internet after inspection.
The most cost-effective architecture for deploying third-party firewall appliances for traffic inspection and NAT capabilities in a VPC, with the requirement to deploy these appliances behind a load balancer, involves using a Gateway Load Balancer (GWLB). The GWLB is specifically designed for deploying, scaling, and managing virtual appliances, such as firewalls, in the cloud. It simplifies the deployment and scaling of third-party virtual appliances by providing a single point of entry and exit for traffic that needs to be inspected. Option A is the correct choice because it suggests deploying a Gateway Load Balancer with the firewall appliances as targets, configuring the firewall appliances with a single network interface in a private subnet, and using a NAT gateway to send the traffic to the internet after inspection. This approach is cost-effective as it leverages the GWLB's capabilities to efficiently manage traffic to the firewall appliances without the need for additional network interfaces or complex configurations. It also utilizes a NAT gateway for internet-bound traffic, which is a managed service that simplifies NAT operations and reduces the operational overhead compared to configuring NAT on the firewall appliances themselves.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Which architecture will most cost-effectively meet the requirements of deploying third-party firewall appliances for traffic inspection and NAT capabilities in a VPC with private and public subnets, while placing the appliances behind a load balancer?
A
Deploy a Gateway Load Balancer with the firewall appliances as targets. Configure the firewall appliances with a single network interface in a private subnet. Use a NAT gateway to send the traffic to the internet after inspection.
B
Deploy a Gateway Load Balancer with the firewall appliances as targets. Configure the firewall appliances with two network interfaces: one network interface in a private subnet and another network interface in a public subnet. Use the NAT functionality on the firewall appliances to send the traffic to the internet after inspection.
C
Deploy a Network Load Balancer with the firewall appliances as targets. Configure the firewall appliances with a single network interface in a private subnet. Use a NAT gateway to send the traffic to the internet after inspection.
D
Deploy a Network Load Balancer with the firewall appliances as targets. Configure the firewall appliances with two network interfaces: one network interface in a private subnet and another network interface in a public subnet. Use the NAT functionality on the firewall appliances to send the traffic to the internet after inspection.