AWS Gateway Loadbalancer East West inspection with Fortigate Firewall

Sdílet
Vložit
  • čas přidán 15. 07. 2021
  • AWS Gateway Loadbalancer East West inspection using Fortigate Firewall and Transit gateway hands on demo
    This is a step by step configuration of the following components:
    1. Fortigate firewall to represent any virtual appliance of your choice behind a gateway loadbalancer
    b) Enabling Geneve on the fortigate appliance
    2. AWS Gateway loadbalancer and service endpoint setup
    3. Transit gateway attachments and routing tables
    4. Testing and troubleshooting traffic flow via the central security VPC
    Although the demo shows only a single appliance ,a robust production environment will have more than one which might even be in an auto-scaling group.
    Below is the debug command i used on the Fortigate :
    That my is my favorite command for this device as it call tell you almost anything in relation to traffic flow be it routing or access issues.
    Simply paste all lines on your cli
    ##########################
    diagnose debug flow trace stop
    diagnose debug enable
    diagnose debug flow filter addr 172.31.100.15
    diagnose debug flow show function-name enable
    diagnose debug flow trace start 10
    ###############
    and to stop the debug : diagnose debug flow trace stop
    or If you do not specify a number 10 in the last line for packets to be captured, the command will continue to capture packets until you press Control + C
    You may check for more options that you may use with it in Fortigate documentation.
    For the above you only need to replace 172.31.100.15 with the ip address that you need to track.
    If my video helps you ,show with that subscribe TAB and many more will come
  • Jak na to + styl

Komentáře • 56

  • @ItIsFullyFaltu
    @ItIsFullyFaltu Před rokem

    I searched whole internet but couldn't find a proper video explaining the GWLB in detail and how to use it with Appliances. This video is far most the best today and thank you for the help

    • @tendaimusonza9547
      @tendaimusonza9547  Před rokem

      Glad to hear the material is helpful ,thank you for your support.

  • @mohammedmustafaali1049

    very very awesome, I have truly enjoyed this more than anything. Thanks very much for your time putting all this together and waiting for more.

  • @davidsonjrg
    @davidsonjrg Před 3 lety

    Really liking the new content. Thank you Tendai, it's very detailed.

  • @lewismangwanda5329
    @lewismangwanda5329 Před 2 lety

    I really enjoyed this, well done Tendai .....

  • @aravindviswanathan6884
    @aravindviswanathan6884 Před 6 měsíci

    Really an informative one buddy. Thanks a lot

  • @mosesg45
    @mosesg45 Před 3 lety

    Awesome Mrr T.. Nicely done with a gentle introduction to the Gateway Load Balancer..

  • @CyberPolice911
    @CyberPolice911 Před 2 lety

    Thanks for the video. It's really helpful.

  • @kkinyanjui1
    @kkinyanjui1 Před 2 lety

    Very helpful my leader!!

  • @shepherdmagumo9361
    @shepherdmagumo9361 Před 3 lety

    Always enjoy content. Excellent knowledge and delivery 👏👏

  • @daphenom
    @daphenom Před 2 lety

    Thank you for sharing this video! It definitely helps us in our AWS journey!

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      Glad you liked it ,thanks for the feedback

    • @daphenom
      @daphenom Před 2 lety

      @@tendaimusonza9547 do you have any vids on inbound traffic from the internet that passes through the firewall? We have a multi account, multi vpc setup with a central security account/vpc where the firewall lives. Every account/vpc goes through a transit gateway which decides where to route traffic. We want to be able to make public services available to the internet and still traverse the firewall. thanks in advance!

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      @@daphenom .Thanks for Checking ,I currently do not have a video specifically on both north south and east west inspection however for internet you have to use ingress routing the same way i did on my AWS Network firewall Video ,and this ingress routing is per each VPC to route incoming traffic to the gateway load-balancer endpoint.

  • @andrenelson424
    @andrenelson424 Před rokem

    Greetings excellent overview thank you.. I'm building a proof of concept 3 Pairs of Fortigate Firewalls in HA mode Active/Active, across 3 Availability Zones, with AWS load balance, Transit Gateway, FortiManager for centralised management and a FortiAnalyzer as part of the SIEM. (APP VPC, SEC VPC, TRANS VPC)

  • @hellosouvik
    @hellosouvik Před rokem

    excellent video, many thanks for sharing with us. one thing which is bugging me is route-table entry for "GWLB-Subnet", why we have to provide two transit gateway entry for both spoke vpc? is it really required for E-W traffic.

    • @tendaimusonza9547
      @tendaimusonza9547  Před rokem

      I provided the TGW as the next hop for both Spoke CIDRS since it is the TGW which knows route back for both spokes in this centralized config ,thank you for your comment , hope i managed to answer your question

  • @autoholic_rider
    @autoholic_rider Před rokem

    Very nice step by step walk through.. keep it up. Any idea on how the set up will look like if we have muti AZ Fortigate HA deployment.. I have issues with LB and endpoints when i have multi AZ and the application VPC are in different VPC, it creates issue.. I am checking further on the set up but with Primary works but failover doesn't.

    • @tendaimusonza9547
      @tendaimusonza9547  Před rokem

      Thank you Hitesh ,I am not sure if HA will work in conjunction with a GWLB since the health checks have no visibility to HA status since works only by probing tcp port ,I have used HA in a central security VPC using partly the steps in on fortinet link although this link is just for general HA setup not specific for central security VPC ;docs.fortinet.com/document/fortigate-public-cloud/7.2.0/aws-administration-guide/229470/deploying-fortigate-vm-active-passive-ha-aws-between-multiple-zones .I used with a transit gateway .hope you will find this helpful

  • @elamateurtube
    @elamateurtube Před 2 lety

    Hello Tendai, very useful the explanation in this video. Great! We do you find all the docs and examples for th forti and ENDPOINT and GLWN implemantation? How do i add more fortis to the main as in an HA? thnak you man!

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      Glad you liked the material and supported the channel with your subscription. Thank you .As far as HA is concerned ,you do it differently from the usual way we do on premise .you can take advantage of the fact that the firewalls are behind a Load balancer and hence with health check mechanism traffic can the be send to only health appliances and if your transit gateway is in appliance mode you will not have asymmetrical routing challenges. The firewalls can also be in an auto scaling group .I also find the following links helpful .aws.amazon.com/blogs/networking-and-content-delivery/introducing-aws-gateway-load-balancer-supported-architecture-patterns/ ,docs.fortinet.com/document/fortigate-public-cloud/6.4.0/aws-administration-guide/249812/creating-the-gwlb-and-registering-targets .Hopefully i have given you some clarity. I have not found a complete end to end documentation which shows the fort config scenarios however for multiple firewalls you will need a central manager if policies are to be in sync.

    • @elamateurtube
      @elamateurtube Před 2 lety

      @@tendaimusonza9547 Thank you so much for your answers. My future goal is to use a VPC for security to allow the forti inspect all trafic (north-south and east-west) and a the same time use HA using (i guess) the port1 to go internet trough a IGW. i dont have so clear all details of the implementation. Thank you man!!

  • @hirenpatel2678
    @hirenpatel2678 Před 2 lety

    What if I want to use this for north-south traffic? tye default route towards geneve won't help there

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      Hello Hiren ,Thank you for view the content. As for North south scenario ,the routing needs to change a bit ,in this case default route to geneve up to the TGW is on assumption that its only east-west traffic involved ,however for North south you may choose to have a gateway load balancer route table to send default traffic to a Nat Gateway as illustrated in North south deployment model on link :aws.amazon.com/blogs/networking-and-content-delivery/introducing-aws-gateway-load-balancer-supported-architecture-patterns/ .Hopefully I managed to answer your question.

  • @sreyanshbhupal9900
    @sreyanshbhupal9900 Před 2 lety

    Great video!! The only thing which is confusing here is the interface. It would great if you specify which is the interface you are using as Target and which one is used for public access. If they are the same then why creating a new interface in a different subnet? Also, the specific Availability zone is not highlighted here. Although it is visible that you have built the complete setup in a single AZ (af-south-1a) but briefly mentioning the limitations of AZ (if any) would be great.
    Additionally, the purpose of adding static routes on the Fortigate was not clear. If the firewall is going to receive traffic on GENEVE port (UDP/6081) then what role will the static routes play here? The Primary_ENI(Port1) subnet RTB already has the required routes.

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      Thank you for the feedback. l see your point here, l decided to use the same subnet that was sitting on the gateway load balancer subnet to keep the config short and simple even though the initial plan was to use different subnets for Geneve and for admin. You may also test my setup without adding a route and let me know the outcome ,that decision came after running some debugs and checks on the routes populated automatically after running the get router info on fortigate

    • @sreyanshbhupal9900
      @sreyanshbhupal9900 Před 2 lety

      @@tendaimusonza9547 Thanks. I will try it once and see how the Fortigate local routes influence the GENEVE behavior. I have seen this with PA but no such routing was required. Hence, the question.

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      @@sreyanshbhupal9900 you are right for Palo it works without doing any of those steps. Give it a trial ,that's how we all learn thru sharing

  • @zeeshanishkay9268
    @zeeshanishkay9268 Před 2 lety

    how can we get fortiguar update in this scenario? port1 i have created geneve for data traffic so how i can communicate with fortiguard for update?? can u help?

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      Hi Zeeshan ,that's a valid point ,to get updates you have to change the routing ,instead of using default route to geneve use specific routes for VPCs cidrs and then default traffic to a different port with route to internet .i used 0.0.0.0/0 just for quick demo

  • @satdevlpr
    @satdevlpr Před rokem

    I am new to AWS VPC..can you make a video on what AWS services offer as network and security services and is there any free or trial lab on AWS cloud to test it

    • @tendaimusonza9547
      @tendaimusonza9547  Před rokem

      Thank you for the feedback ,that will help me in balancing content on my future videos .you may also open an aws free tier account for learning however exercise caution on usage since not everythung is free however aws documentation clearly states how you can stay within free tier

  • @abdomordy6935
    @abdomordy6935 Před rokem

    Did you deployed Fortigate on aws with HA active active in multi AZ environment? if yes can you help by a guide or video?

    • @tendaimusonza9547
      @tendaimusonza9547  Před rokem +1

      Hello Abdo , you do not need forti HA when using the gateway loadbalancer , the GWLB is doing HA for you in a way and you need to make sure the security VPC attachment is in appliance mode to avoid asymmetrical routing . See link : docs.aws.amazon.com/vpc/latest/tgw/transit-gateway-appliance-scenario.html . with a GWLB your Fortis can be in multiple AZ however use fortimanager to make sure your rules are in sync than adding rules manually on each device .hope i answered your question.

    • @abdomordy6935
      @abdomordy6935 Před rokem

      @@tendaimusonza9547 thanks for your reply I will try to make it using TG as I'm trying with GWLB and one fortigate only for now.

  • @rohitpundir348
    @rohitpundir348 Před rokem

    Can i get the documents ,how you have configured all the vpc and subnet ..etc etc

    • @tendaimusonza9547
      @tendaimusonza9547  Před rokem

      Hi Rohit , if you have worked with Terraform you may find my configs here useful for VPC and subnet config , github.com/tendai-lino/training/tree/main/GWLB-DEMO ,i used this kind of setup in czcams.com/video/2g59ihFy5HU/video.html , Let me know if you require any further assistance

  • @carlosemanuelbonilla904

    this same logic applied for North South traffic flow right?

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety +1

      That's correct its the same logic only that for north south you introduce ingress routing for the internet gateway

    • @carlosemanuelbonilla904
      @carlosemanuelbonilla904 Před 2 lety

      @@tendaimusonza9547 thanks sir, keep going with great content, greetings

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      @@carlosemanuelbonilla904 ,thanks for the support ,much appreciated

  • @randicalib
    @randicalib Před 2 lety

    is using transit gateway a must for GWLB ?

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      Hello Randy ,yes Transit Gateway a must only for east west inspection ,that is if you want to send traffic between VPCs thru central security VPC unlike when you do North South inspection i.e internet to VPC.

    • @randicalib
      @randicalib Před 2 lety

      thansk for your answer @@tendaimusonza9547 so if only 1 app VPC that need to go through security VPC via GWLB it does not need TGW, right?

    • @tendaimusonza9547
      @tendaimusonza9547  Před 2 lety

      @@randicalib ,that's right yes

    • @chileflake1656
      @chileflake1656 Před 2 lety

      The reason WHY a TGW is necessary for more than 2 VPCs (1 "users/servers" + 1 "Security with GWLB + FWs in it") is due to the non-transitive VPC peering rule docs.aws.amazon.com/vpc/latest/peering/vpc-peering-basics.html ["VPC peering does not support transitive peering relationships"].
      So, you either need a TGW or/and a Transit-VPC design (where NVAs act as the glue between different VPCs). A TGW has its limitations, for example if you need Advanced NAT and/or VRFs to segregate traffic, you would need to use a Transit-VPC with NVAs (Cisco CSRs for example).. or even a mix of both, in this case the "Security VPC" could be the "Transit-VPC" at the same time, with that GWLB too.

  • @tctfone1
    @tctfone1 Před 3 lety +1

    Can you now repeat this in Terraform ? :)

    • @tendaimusonza9547
      @tendaimusonza9547  Před 3 lety

      Thanks for the feedback ,will work out something as soon as i grab a moment