The is a Do It Yourself (DIY) lab. It allows you create and configure required constructs using the knowledge that you have gained thus far in this workshop.
A given network architecture can be segmented into multiple zones. Resources deemed more risky like your Internet facing load balancers are placed in an untrusted zone or public subnet. Resource such as your applications, which you don’t want to be directly discovered from Internet, are placed in trusted zone or private subnet. Lack of inter-zone traffic inspection can pose a serious threat to resources in private subnet.
In this lab, you will create architecture that allows you to inspect ingress traffic between an Application Load Balancer (ALB) configured in a public subnet and its target configured in a private subnet.
If you are running this module at an AWS hosted event like re:Invent, resources depicted in Figure 1: ALB based architecture are already provisioned for you. If you are running this module in your own using your own AWS account, launch following CloudFormation template in a supported region of your choice to creates resources.
Verify you can access sample web service hosted behind an ALB. Use either a web browser or curl command from your terminal to access ALB’s Fully Qualified Domain Name (FQDN).
% curl http://alb-ext-xxx.us-west-2.elb.amazonaws.com/ <html> <head> <title>Test Web Server</title> <meta http-equiv='Content-Type' content='text/html; charset=ISO-8859-1'> </head> <body> <h1>Welcome to POC:</h1> <h2>This is a simple web server running in "us-west-2a". Happy Testing!</h2> </body> </html>
In this step you will create Firewall RuleGroup that allows HTTP traffic and alerts by logging it to CloudWatch Logs
POINTER: For guidance how to create firewall rulegroup, refer to Create Firewall RuleGroup.
In this step you will create Firewall Policy to filter network traffic. Associate Firewall RuleGroup created in Step 2 with this Firewall Policy.
POINTER: For guidance how to create firewall policy, refer to Create Firewall Policy
In this step you will create firewall to inspect/filter your network traffic. Firewall connects the inspection rules in the firewall policy to the VPC that the rules protect.
Helper: When you create AWS Network Firewall, you need to provide subnets. Network firewall service creates corresponding firewall endpoints in these subnets. For your architectures to function properly, you should dedicate subnets for AWS Network Firewall.Pointer: How to create Firewall:>Refer to Create Firewall RuleGroup
POINTER: For guidance on how to create network firewall, refer to Create Firewall
In this step you will edit route tables to route ingress traffic between ALB and its targets to Firewall configured in step 4 for inspection.
HINT - Once you have added/edited appropriate routes to appropriate route tables, you final topoloy will look like Figure 2: ALB based ingresss traffic inspection architecture
POINTER: For guidance on how to validate traffic is being logged to CloudWatch Logs, refer to Step 6 - Verify Alert Logs Captures in CloudWatch