Inbound SSLo and AWS notes - part 2

This is 3-part blog post:

Since writing my first post about setting up SSLo in AWS, I have come to deploy a security device in the service chain and thought to make a few notes.

  1. In AWS, I’ve deployed a Fortinet Firewall with 2x data plane NIC’s. (One in the same subnet as my SSLo egress NIC on BIG-IP, the other in the same subnet as my SSLo ingress NIC on BIG-IP.)

  2. In the end, I didn’t use Route Tables in AWS to direct traffic. Because the Fortinet and BIG-IP were in the same 2 subnets, I did this:

    a. Fortinet NIC 2 had a Static Route pointing 0.0.0.0/0 to BIG-IP’s “SSLo egress” NIC IP address.

    b. Fortinet NIC 3 had a Static Route pointing 10.1.10.0/24 to BIG-IP’s “SSLo ingress” NIC IP address. (This is the CIDR block that the destination IP addresses fall in as traffic traverses the Fortinet)

    c. Fortinet NIC 1 was dedicated for mgmt console, which I access via a jump host in the same subnet.

  3. Command to change admin password, I found it here.
    1
    2
    
    configure
    #set mgt-config users admin password
    
  4. Deploy a Fortinet FW in AWS with multiple NIC’s.

    This link taught me this command, to disable anti-spoofing measures that were interfering with my testing.

    1
    2
    3
    4
    
    # config system interface
    edit <interface>
    set src-check disable
    end
    
  5. Another link for disabling anti-replay. I don’t need to know what it is, I just disabled it to get a basic routing demo working.
    1
    2
    3
    
    # config system global
    set anti-replay disable
    end
    
  6. This link explained how to show the route table for the whole device and some other commands. Since I don’t know Fortinet products at all, this was helpful.
    1
    
    # get router info routing-table all
    

Updated: