Amazon Web Services
This article describes how to import an Airlock Gateway cloud image and deploy it as a VM on Amazon Web Services (AWS).
Cloud image import
Before starting, make sure the following prerequisites are met:
- You have downloaded the Airlock Gateway cloud image in VMDK format from the Airlock Gateway download page on Techzone. This image file will be uploaded to Amazon S3 and then imported as an Amazon Machine Image (AMI).
- An S3 bucket exists for storing the Airlock Gateway cloud image.
- The IAM role
vmimportexists with the correct trust and permission policies (for details, see the Required service role section of the VM Import/Export User Guide).
Creating an AMI
To deploy Airlock Gateway on AWS, the Airlock Gateway cloud image must first be converted into an Amazon Machine Image (AMI). This requires uploading the Airlock Gateway cloud image to Amazon S3 and then importing it into Amazon EC2.
- Upload the disk image to Amazon S3:
- Create a
containers.jsondescriptor: - Import the image into EC2 as an AMI:
Note: If the import fails, verify that the
vmimportrole was created and granted access to the S3 bucket.
After the import task completes, the new AMI is available in your account and can be used to launch Airlock Gateway instances on Amazon EC2.
For further details, refer to the AWS EC2 documentation article about AMI image creation.
Instance creation
Example of a full aws ec2 run-instances command
Opening the required ports
In AWS, inbound and outbound traffic is controlled through security groups. By default, a new EC2 instance is only accessible via SSH on port 22. To make Airlock Gateway fully usable, additional inbound security rules covering the following ports must be added to the security group associated with the instance:
8443for the Airlock Gateway Configuration Center80and/or443for virtual hosts (HTTP/HTTPS)Those required inbound ports correspond to the port assignment recommended for the Airlock network setup.
For step-by-step instructions on managing security group rules, refer to the security groups section of the EC2 User Guide.