This post describes feature sof CIS Landing Zone Terraform configuration, which is retired as of May 2025. The last release of CIS Landing Zone Terraform configuration is Release 2.8.8.
 

 

In my prior blog CIS OCI Landing Zone Quick Start Template Version 2, I discussed how the Landing Zone has an updated networking module that allows the deployment of multiple network architectures. In this blog post I am going show you how to deploy the Landing Zone for network security partners.  Before we get to deployment let’s start with reviewing the below architecture.

When deploying network firewalls in the Landing Zone the DRG Attachments are not created for any of the VCNs (Virtual Cloud Network) because this is done by security partner Terraform code.  Their Terraform will create the DRG Attachments for the VCNs and route the traffic through the security partner network appliances creating a choke point. The only routing the Landing Zone will do is the spoke VCN routing. This choke point will be used to monitor traffic in and out of OCI as well as between VCN spokes. Each partner requires a different number of subnets in the DMZ VCN, you can use the below chart to determine how many subnets you will need in your DMZ VCN:

Security Partner Number of Subnets
 Check Point  2
 Cisco  5
 Fortinet  4
 Palo Alto Networks  4

Now we are ready to deploy!

First, we need download a copy of the Landing Zone code which is available here. For this blog post I am going to use Oracle Resource Manager and deploy the Landing zone in the root compartment, but you could also use another compartment as well as use the Terraform CLI. 

1. Go to the Resource Manager and select Stacks

Graphical user interface

Description automatically generated with low confidence

2. Click Create Stack

Graphical user interface, text, application, email

Description automatically generated

3. Select .zip file and upload the oci-cis-landingzone-quickstart-main.zip

Graphical user interface, text, application, email

Description automatically generated

4. Fill in a Name for the stack

A picture containing application

Description automatically generated

5. Click Next

Graphical user interface, text, application

Description automatically generated

6. Enter a Service Label

Graphical user interface, text, application

Description automatically generated

7.Enter one or more Spoke VCNs in List of CIDR blocks for the VCNs to be created

Graphical user interface, application

Description automatically generated

8. You can choose to fill in the Optional fields

Graphical user interface, text, application

Description automatically generated

9. Select Show Advanced Options

Graphical user interface, text, application, email

Description automatically generated

10. Select Deploy Hub & Spoke Architecture?

Graphical user interface, text, application, email

Description automatically generated

11. Enter a CIDR Block for the DMZ VCN

12. Select  Use DMZ VCN for 3rd party firewalls

13. Enter Number of subnets in the DMZ VCN (based on security partner requirements above)

Graphical user interface, text, application

Description automatically generated

14. Enter the rest of the required values

15. Click Next

16. Click Create

Graphical user interface, text, application, email

Description automatically generated

17. Click Apply

 

Graphical user interface, text, application, email

Description automatically generated

Once the Stack succeeds you are now ready to deploy the network security partner of your choice in the Landing Zone’s DMZ VCN.  To deploy your security partner read the blog Adding our security partners to a CIS OCI Landing Zone . If you want to learn more about how to configure the networking in the Landing Zone take a look at the VARIABLES.md.