Centralized ingress: inspection after load balancer Example
Scenario objective
Inbound traffic is inspected by a FortiGate CNF instance after passing through the load balancer.
Before deployment of FortiGate CNF
In this scenario, there is a dedicated VPC called Inspection VPC that contains the load balancer. The workloads are in different VPCs (VPC A and VPC B), and traffic between VPCs is routed through a transit gateway.
The Before deployment of FortiGate CNF traffic flow is as follows:
-
Traffic originates from an external user and enters through the
Internet Gateway. -
The Internet Gateway sends the traffic to the
Load Balancerlocated inPublic Subnet(10.1.2.0/24). -
The
Load Balancersend the traffic to theAWS Transit Gatewaylocated inTGW Subnet(10.1.6.0/24). -
The
AWS Transit Gatewayforwards the traffic toVPC A(10.2.0.0./16) orVPC B(10.3.0.0/16).
Routing tables
The routing tables are defined as follows.
Internet Gatway route table
| Destination | Target |
|---|---|
| 10.1.0.0/16 | Local |
Public Subnet route table
| Destination | Target |
|---|---|
| 10.1.0.0/16 | Local |
|
10.0.0.0/8 |
AWS Transit Gateway |
TGW Subnet route table
| Destination | Target |
|---|---|
| 10.1.0.0/16 | Local |
AWS Transit Gateway route table
| Destination | Target |
|---|---|
| 10.1.0.0/16 | Inspection VPC |
| 10.2.0.0/16 | VPC A |
| 10.3.0.0/16 | VPC B |
After deployment of FortiGate CNF
The After deployment of FortiGate CNF traffic flow is as follows:
-
Traffic originates from an external user and enters through the
Internet Gateway. -
The Internet Gateway sends the traffic to the
Load Balancerlocated inPublic Subnet(10.1.2.0/24). -
The
Load Balancersends the traffic to theGWLBelocated inCNF Endpoint Subnet(10.1.1.0/24). -
GWLBe sends traffic to the FortiGate CNF instance for inspection.
-
FortiGate CNF sends traffic back to the
GWLBe. -
GWLBe sends traffic to the
AWS Transit Gatewaylocated inTGW Subnet(10.1.6.0/24). -
The
AWS Transit Gatewayforwards the traffic toVPC A(10.2.0.0./16) orVPC B(10.3.0.0/16).
To deploy the FortiGate CNF instance in this scenario:
-
In AWS, add a subnet
CNF Endpoint SubnetinInspection VPCalong with the associated route table.Destination Target 10.1.0.0/16 Local 10.0.0.0/8 AWS Transit Gateway -
In FortiGate CNF, deploy a GWLBe to this subnet.
-
In AWS, add a route to the
Public Subnetroute table where the load balancer resides to route all traffic to 10.0.0.0/8 to the GWLBe.Destination Target 10.1.0.0/16 Local 0.0.0.0/8
Internet Gateway
10.0.0.0/8
GWLBe
-
In AWS, add a route to the
Transit Gateway Subnetroute table to route all traffic to theLoad Balancerlocated inPublic Subnetto the GWLBe.Destination Target 10.1.0.0/16 Local 10.1.2.0/24 GWLBe