North-south security inspection to customer VPC
This guide assumes that the following are already created and in place as the diagram shows:
- Customer VPC and subnets in all zones to be load balanced
- Security VPC and subnets in all zones to be load balanced
- FortiGate with at least one management network interface and elastic IP address assigned
- Application instances
The guide describes configuring additional network interfaces to handle data traffic. The following describes the two VPCs in this deployment:
VPC |
Description |
---|---|
Customer |
Where customer workloads are deployed. The customer VPC has four subnets (two in each availability zone (AZ)). Each AZ has an application-purposed subnet and a GWLB endpoint subnet:
|
Security |
Where the FortiGate is deployed. You create the GWLB in this VPC. |
The following describes the traffic flow in this deployment:
Traffic flow |
Description |
---|---|
Inbound traffic |
With this configuration, the FortiGate inspects traffic that is destined for the application instances. The Internet gateway in the customer VPC is associated with an ingress route table. The route table directs the traffic for the application subnets through the GWLB endpoints (GWLBe) in its dedicated subnets. The traffic then goes through the GWLB in the security VPC, where it is encapsulated with Geneve protocol and sent to the FortiGate. The FortiGate inspects the traffic and redirects it to the application instances. |
Outbound traffic |
The route tables that the application subnets are associated with have a default route through the GWLB endpoints in their AZ. The traffic originating from the application instances is forwarded to the FortiGate through the GWLB. After inspection, the FortiGate sends the traffic to the Internet. You set static routes for all of these traffic redirects after deployment. See Post-deployment configuration. |
To add support for IPv6:
See New – Gateway Load Balancer support for IPv6 for extending a current or new deployment to support IPv6.
The following provides an overview of steps that you must complete:
- VPCs subnets that the GWLB exists in and that you will deploy the GWLBe to must have IPv6 enabled and a CIDR assigned. This means that your VPC and subnets must have IPv6 enabled before configuring GWLB IPv6 settings.
- GWLB must be in dual stack mode.
- Endpoint services must support IPv4 and IPv6.
- Endpoint must be in dual stack mode.
- FortiGates are not assigned an IPv6 address as they use IPv4 to send and receive traffic from the GENEVE tunnel.