The Verify network asset page in the Get Started wizard provides a list of prerequisite
               items that you must meet in your AWS environment before you can create a CloudFormation
               deployment script and deploy Network Security to protect your Cloud assets.
The following table provides a detailed description of all of the prerequisite items
               that
               must be met before you can deploy Network Security with Edge protection deployment.
               Most
               of these prerequisites should be completed from the management console in your AWS
               account.
NoteOnly the prerequisites that have not been met will appear on the Verify network asset
                              page. 
 | 
| 
 Prerequisite 
 | 
 Detailed description 
 | 
 To meet the requirement 
 | 
|
| 
 1 
 | 
 An Internet gateway is attached to VPC 
 | 
 Because this deployment option primarily protects traffic from the
                              Internet, this prerequisite ensures that an Internet gateway is
                              attached to the VPC, and that the Internet gateway can be
                              protected. 
 | 
 Attach an Internet gateway to the VPC you want to
                              protect. 
 | 
| 
 2 
 | 
 The public subnet in the AZ includes an Internet gateway
                              route 
 | 
 This deployment option requires that the Internet traffic of
                              public subnets routed from the Internet gateway is re-routed to the
                              Network Security virtual appliance for inspection. This prerequisite
                              ensures that the VPC contains at least one public subnet with an
                              Internet gateway route in each AZ where the appliance will be
                              deployed. 
 | 
 Add at least one public subnet that has an associated route table
                              with a route to the Internet gateway. 
 | 
| 
 3 
 | 
 IPv6 CIDR blocks are not included in this VPC 
 | 
 Network Security does not support IPv6 CIDR blocks. This
                              prerequisite ensures that the selected VPC does not have IPv6 CIDR
                              blocks configured. 
 | 
 If the VPC that you selected contains IPv6 routes, you must select
                              a different VPC to continue with deployment. 
 | 
| 
 4 
 | 
 IPv6 routes are not include in the public subnet route
                              table 
 | 
 This prerequisite ensures that the public subnet route tables in
                              this VPC do not contain IPv6 routes. This deployment option does not
                              support IPv6. 
 | 
 Remove any IPv6 routes from the route table or select a VPC that
                              does not include IPv6 routes. 
 | 
| 
 5 
 | 
 An SSH key pair is created for this region 
 | 
 This prerequisite ensures that there is at least one SSH key pair
                              in the same region as the VPC that needs protection so that the
                              Network Security virtual appliance is accessible. 
 | 
 Create an SSH key pair in the same region as the VPC. 
 | 
| 
 6 
 | 
 There is sufficient CIDR space in this VPC 
 | 
 For this deployment option, CloudFormation creates two subnets in
                              the VPC, the inspection and management subnet, so the VPC needs to
                              have at least two /28 CIDR blocks available. This prerequisite
                              ensures that the VPC includes enough CIDR space to create the
                              inspection and management subnets, which are required for this
                              deployment. 
 | 
 Create additional CIDR space for the VPC. 
 | 
| 
 7 
 | 
 Network Security AMIs are available in this region 
 | 
 This prerequisite ensures that the Network Security virtual
                              appliance AMI is published and available in the same region as this
                              VPC. 
 | 
 If the Network Security AMI is not already available in your
                              region, contact the Trend Micro support team to share AMIs in this
                              region. From the Network Security management interface, click
                              Help → Support. 
 | 
| 
 8 
 | 
 There is a NAT gateway in each AZ 
 | 
 For this deployment option, traffic from the management subnet is
                              routed through a NAT gateway. This prerequisite ensures that the VPC
                              contains a NAT gateway in each AZ that contains a public subnet. A
                              NAT gateway is needed for the Network Security virtual appliance to
                              be able to communicate. 
 | 
 Create a NAT gateway for each AZ with a public subnet. 
 | 
| 
 9 
 | 
 Edge association is disabled for the route table 
 | 
 For this deployment option, the routes for the Internet gateway
                              are modified to send traffic to an inspection subnet instead of the
                              public subnet. Because an edge association between the route table
                              and the Internet gateway cannot be removed during CloudFormation,
                              this prerequisite ensures that the VPC does not use an edge
                              association for the route table that routes Internet traffic to the
                              public subnets. 
 | 
 Remove the route table edge association with the Internet gateway.
                              A new route table is associated during CloudFormation. 
 | 
| 
 10 
 | 
 The Internet Gateway route is not in the main route
                              table 
 | 
 For this deployment option, the routes that send traffic from the
                              public subnets to the Internet gateway are modified so that Internet
                              traffic is sent to an inspection subnet instead of the public
                              subnet. This prerequisite ensures that the VPC does not use the main
                              route table to route Internet traffic to the public subnets. If the
                              main route table includes the Internet gateway route, the VPC is not
                              completely protected when new subnets are created. 
 | 
 If the main route table includes a route of Internet traffic to
                              the public subnets, remove this route, or designate a different
                              route table as the main route table. 
 | 
| 
 11 
 | 
 The Trend Micro Cloud One account is below the maximum virtual
                              appliance limit 
 | 
 For this deployment option, a Network Security virtual appliance
                              is deployed in each AZ that needs to be protected, but there is a
                              limit to how many virtual appliances can be deployed in each
                              account. This prerequisite ensures that deployment will not create
                              more virtual appliances than the maximum number allowed for this
                              Trend Micro Cloud One account. 
 | 
 From the Network Security management interface, click Help →
                                 Support to contact the Trend Micro support team to
                              request a limit increase. 
 | 
| 
 12 
 | 
 IP addresses are available in each public subnet 
 | 
 For this deployment option, Network Security creates an ENI within
                              each public subnet to route Internet traffic to the virtual
                              appliance for inspection. This prerequisite ensures that the public
                              subnets contain at least one IP address so that an ENI can be
                              attached to the subnet. 
 | 
 Create a new public subnet, use a different public subnet, or
                              delete unused resources from the subnet. 
 | 
| 
 13 
 | 
 The provided AZs contain public subnets 
 | 
 This prerequisite ensures that each AZ in the provided list of AZs
                              that need protection includes a public subnet. 
 | 
 Only include AZs with public subnets in the provided list of AZs
                              that need protection. 
 | 
		