Description
AWS Cloud WAN simplifies the process of creating, overseeing, and optimizing a unified global network, streamlining the connection between customers’ cloud-based and on-premises infrastructure for enhanced speed, security, and convenience. To help secure network traffic, organizations use the combination of FortiGate Next Generation Firewall as part of their defense-in-depth strategy and Secure SD-WAN.
AWS Cloud WAN offers a comprehensive range of connectivity, routing, and security services. It is specifically designed to facilitate seamless integration with on-premises SD-WAN and SASE technologies and services. As many enterprise organizations transition from traditional private WAN to SD-WAN and SASE, FortiGate Secure SD-WAN leverages the full capabilities of AWS's global network when interconnected with AWS Cloud WAN.
This article describes how to architect with FortiGate and AWS Cloud WAN Tunnel-less technology that addresses the following use cases:
Figure-1 – Cloud WAN and Fortinet Secure SD-WAN.
Scope
FortiGate Secure SD-WAN, AWS Cloud WAN, FortiGate Next Generation Firewall.
Solution
To get the most from this article, it is necessary to understand some of the fundamental concepts used by Cloud WAN. Check the Cloud WAN documentation to learn more about Cloud WAN concepts.
In this article, the primary focus will be on establishing a global FortiGate-VM within a Security VPC to enhance and secure connectivity for remote branch locations. The Security VPC can also be used as a centralized outbound network traffic inspection from AWS workloads in a Cloud WAN network, commonly referred to as north-south traffic. Note that filtering and inspecting traffic within a VPC or transit traffic between AWS Cloud WAN Segments (known as east-west traffic) is a valuable use case, but it will not be covered in this article.
The new Cloud WAN capability known as 'tunnel-less connect' will be used to achieve the desired solution. FortiGate-VM peers can employ BGP (Border Gateway Protocol) without the need for specialized tunneling protocols. The following advantages are provided by Tunnel-Less on Cloud WAN:
The FortiGate-VMs will be deployed in Active/Passive configuration to ensure high availability within the region.
FortiGate Secure SD-WAN with AWS Cloud WAN.
This setup will be created with a Cloud WAN Core Network with two edge locations and three network segments: Security, Production, and Development.
The VPCs are attached in the Edge Network as VPC attachments. The Prod VPC and Dev VPC each host a private workload deployed in a single availability zone (AZ), while FortiGate-VMs have been deployed in the Security VPC across multiple AZs. Figure 2 illustrates a high-level topology of the environment we will be constructing in this blog post.
Figure-2 – Multi-Region topology with 3 network segments and VPC attachments.
Figures 3 and 4 depict the FortiGate-VMs, subnets, and attachments in the Security in the region us-west-1 and eu-central-1:
Figure-3 – FortiGate-VMs in the central security VPC and Cloud WAN attachment in the region us-west-1.
Figure-4 – FortiGate-VMs in the central security VPC and Cloud WAN attachment in the region eu-central-1.
Figures 5 and 6 depict the attachment of VPC Production and Development into Cloud WAN segments in the region us-west-1 and eu-central-1.
Figure-5 – VPC Production and Development attached into Cloud WAN segments in the region us-west-1.
Figure-6 – VPC Production and Development attached into Cloud WAN segments in the region eu-europe-1.
The traffic from Production and Development VPC goes through the Cloud WAN Core Network to reach its respective local Security VPC, where the FortiGate-VMs filter and apply NAT to the egressing traffic. Figure 7 provides a comprehensive illustration of the packet flow, depicting the journey from VPC Prod-A to the internet, offering a detailed view of the data path.
Figure-7 – Packet flow from Prod-A to the internet going through centralized outbound traffic inspection in the region us-west-1.
Consider the packet flow and how traffic from the VPC-Prod-A is routed by the Cloud WAN Core Network, inspected by FortiGate-VM, and egresses to the internet:
Now, consider the key configuration on AWS Cloud WAN and FortiGate-VMs.
Steps to create a global and core network.
To get started with AWS Cloud WAN, it is first necessary to create the VPCs, Subnets, and Route Tables.
The following steps outline the procedures for setting up the structure of an AWS Cloud WAN global and core network. Select the document links to see more information.
To illustrate, the following Network Policy configurations will be used:
The Autonomous Systems Numbers (ASN) to assign to Core Network Edges. By default, the core network automatically assigns an ASN for each Core Network Edge.
The Classless Inter-Domain Routing (CIDR) block range is used to create tunnels for AWS Transit Gateway Connect and tunnel-less BGP peering with FortiGate-VMs.
Please note that in this example, attachment acceptance has been configured as 'false.' It is still essential to emphasize that attachment acceptance is considered a security best practice, necessitating network administrator approval for attachment requests.
The Production and Development segments share a connection with the Security Segment, enabling automatic propagation of routes between the Security Segment and the other two segments.
Ensure that the correct key name that defines the network segment is specified in the attachment tag value.
Having created the Cloud WAN resources, the next step is to attach the VPCs into the Cloud WAN. Follow these steps:
Next, configure the BGP peer between Core Network and FortiGate-VM in the Security-Segment as shown in the figure below.
Follow these steps:
Follow these steps:
Follow these steps:
Steps to deploy FortiGate-VM in Active/Passive.
It is necessary to deploy two FortiGate clusters: one located in us-west-1, and the other in eu-europe-1. The following steps provide examples of configuration specifically for the us-west-1 region.
config router static
edit 1
set dst 10.0.0.0 255.0.0.0
set gateway 10.111.2.1
set device "port3"
next
edit 2
set gateway 10.111.0.1
set device "port2"
next
end
config router bgp
set as 65515
set ebgp-multipath enable
set ibgp-multipath enable
set additional-path enable
set graceful-restart enable
config neighbor
edit "10.192.1.67" (IP Address from Cloud WAN)
set capability-graceful-restart enable
set capability-default-originate enable (Advertise the default route via FortiGates)
set ebgp-enforce-multihop enable
set soft-reconfiguration enable
set remote-as 64522 (AS Number from Cloud WAN)
set update-source "port3"
next
edit "10.192.1.9" (IP Address from Cloud WAN)
set capability-graceful-restart enable
set capability-default-originate enable
set ebgp-enforce-multihop enable
set soft-reconfiguration enable
set remote-as 64522
set update-source "port3"
next
end
After the FortiGate BGP configuration, BGP peering should be UP on the Cloud WAN.
config firewall policy
edit 2
set name "Egress-NAT"
set srcintf "port3"
set dstintf "port2"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set nat enable
next
end
Follow these steps:
Now, the FortiGates and Cloud WAN have complete routing configurations. It is now possible to configure SD-WAN on the FortiGates for remote branches, as demonstrated in the image below.
Conclusion.
The complimenting partnership between Fortinet and AWS Cloud WAN delivers a comprehensive WAN for massive scale. It empowers organizations to expand their networks globally with ease, accommodating the growing demands of modern business.
Consistent enforcement and visibility provide tools to enhance security and monitor network traffic consistently, ensuring that no potential threat goes unnoticed.
In conclusion, the information presented in this article is useful for those seeking to understand and experiment with Fortinet's solutions in AWS. These insights, tips, and best practices provide a foundation for testing and familiarizing oneself with the capabilities of Fortinet's products. It is essential to emphasize that the guidance shared here is intended exclusively for lab and testing purposes. When it comes to deploying these solutions in a production environment or implementing more advanced configurations tailored to the unique needs of an organization, it is strongly recommended to reach out to Fortinet's Cloud Consulting Services team at consulting@fortinet.com.
Fortinet’s Cloud Consulting experts bring a wealth of experience and expertise to the table, ensuring that cloud security solutions are not only deployed securely but are also optimized for peak performance and efficiency.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.