

Route 53-hosted zone ID of the domain name If you provide a value for this parameter, you must also provide a corresponding HostedZoneID. If you don’t provide a value for ACMSSLCertificateArn, use the HostedZoneID. )įully qualified domain name for the Duo Network Gateway load balancerįully qualified domain name for the Duo Network Gateway load balancer. (Optional) S3 bucket path of the scripted configuration YAML file. S3 bucket path of the Duo Network Gateway config file For example, if the provided value is 'adminserver' and the DomainName parameter value is '', then the fully qualified domain name for the admin server will be '' Fully qualified domain name for the admin server will be created by adding the DomainName parameter value as a suffix. Always restrict traffic on the admin server’s port 8443 to authorized network ranges only and not widely to the internet. The allowed CIDR block for remote access to the Duo Network Gateway admin server. If you don’t provide values for DomainName and HostedZoneID, provide a value for ACMSSLCertificateArn.Īllowed CIDR block for external access to the load balancer Duo Network Gateway configuration Parameter label (name)ĪRN of the load balancer’s SSL certificateĪmazon Resource Name (ARN) of the load balancer’s SSL certificate.

Private subnet 2 CIDR for Duo Network Gateway serversĬIDR block for private subnet 2 located in Availability Zone 2. Private subnet 1 CIDR for Duo Network Gateway serversĬIDR block for private subnet 1 located in Availability Zone 1. Public subnet 2 CIDR for application load balancerĬIDR block for the public (DMZ) subnet 2 located in Availability Zone 2. Public subnet 1 CIDR for application load balancerĬIDR block for the public (DMZ) subnet 1 located in Availability Zone 1. Only two Availability Zones are used for this deployment, and the logical order of your selections is preserved. List of Availability Zones to use for the subnets in the VPC. VPC network configuration Parameter label (name)
