Inbound SSLo and AWS notes - part 2
This is 3-part blog post:
- Part One - intro
- Part Two - rough notes taken during troubleshooting
- Part Three - working lab overview and conclusion
Since writing my first post about setting up SSLo in AWS, I have come to deploy a security device in the service chain and thought to make a few notes.
-
In AWS, I’ve deployed a Fortinet Firewall with 2x data plane NIC’s. (One in the same subnet as my SSLo egress NIC on BIG-IP, the other in the same subnet as my SSLo ingress NIC on BIG-IP.)
-
In the end, I didn’t use Route Tables in AWS to direct traffic. Because the Fortinet and BIG-IP were in the same 2 subnets, I did this:
a. Fortinet NIC 2 had a Static Route pointing 0.0.0.0/0 to BIG-IP’s “SSLo egress” NIC IP address.
b. Fortinet NIC 3 had a Static Route pointing 10.1.10.0/24 to BIG-IP’s “SSLo ingress” NIC IP address. (This is the CIDR block that the destination IP addresses fall in as traffic traverses the Fortinet)
c. Fortinet NIC 1 was dedicated for mgmt console, which I access via a jump host in the same subnet.
- Command to change admin password, I found it here.
1 2
configure #set mgt-config users admin password
-
Deploy a Fortinet FW in AWS with multiple NIC’s.
This link taught me this command, to disable anti-spoofing measures that were interfering with my testing.
1 2 3 4
# config system interface edit <interface> set src-check disable end
- Another link for disabling anti-replay. I don’t need to know what it is, I just disabled it to get a basic routing demo working.
1 2 3
# config system global set anti-replay disable end
- This link explained how to show the route table for the whole device and some other commands. Since I don’t know Fortinet products at all, this was helpful.
1
# get router info routing-table all