This image shows the east-west traffic flow from the database to the web/application in a regional hub and spoke topology that uses Check Point CloudGuard Network Security. It includes 3 virtual cloud networks (VCNs):
-
Hub VCN (10.0.0.0/24): The Hub VCN houses the Check Point Security Gateway. The backend subnet uses vNIC2 for internal traffic to or from the Check Point Security Gateway. The hub VCN communicates with spoke VCNs through a local peering gateway (LPG).
-
Web/Application tier spoke VCN (192.168.0.0/24): The VCN contains a single subnet. A load balancer manages traffic to the web/application VMs. The application tier VCN is connected to the hub VCN over a local peering gateway.
-
Database tier spoke VCN (192.168.1.0/24): The VCN contains a single subnet that contains the primary database system. The database tier VCN is connected to the hub VCN over a local peering gateway.
- Traffic that moves from the database tier to the web/application load balancer (19.168.0.10) is routed through the database subnet route table (destination 0.0.0.0/0).
- Traffic moves from the database subnet route table to the LPG for the database tier spoke VCN.
- Traffic moves from the database LPG to the LPG for the hub VCN (destination 0.0.0.0/0).
- Traffic moves from the hub LPG to the Check Point Security Gateway in the backend subnet over vNIC2.
- Traffic from the Check Point Security Gateway is routed through the backend subnet route table (destination 192.168.0.0/16).
- Traffic moves from the backend subnet route table to the LPG for the hub VCN (destination 0.0.0.0/0).
- Traffic moves from the hub LPG to the LPG for the web/application tier spoke VCN.
- Traffic moves from the web/application LPG to the load balancer for the web/application.