There is a cool Aviatrix feature on the Data Plane: the embedded L4 Stateful FW on every single Aviatrix Gateway!
You might say: 'Again another Security product..' or 'It is just a 'L4 Packet filtering FW'. 'What is so cool about it and even making a blog post on this specific?'
The answer is: 'You don't need to install anything if you need that capability!'
You might remember a recent post about AWS Network FW.. Remember all the complexity to make it work: so many different architectures, doing some routing manually, additional VPCs, etc..
Here nothing 😏. You start straight with the FW configuration.
Some facts about embedded L4 Stateful FW
- Filters on CIDRS, protocol & ports
- It is great to be used in the Aviatrix Transit GWs for Centralized packet filtering (we will test that even if it could have been an Aviatrix Spoke GW)
- Action can be 'Allow', 'Deny' or 'Force Drop'
- Deny: blocks the new connections but allows the existing
- Force Drop: Drop existing & new connections
- This feature is automatically used by Aviatrix platform to enforce the FW rules for
- Public Subnet Filtering (AWS Guard Duty Enforcement)
- Threat Guard to block the malicious IPs & being protected against Data Exfiltration, Bitcoin Mining, DDoS, etc..): this is called Cyber Threat Protection.
What will we test today ? 😺
You might remember Episode1 architecture.
Configuration
1. Create Tag & Tag objects (example for SpokeB but same applies for VNET1)
2. Select the GW (same policy applies for HA GW)
- Sources & Destinations are based on the TAGs previously created
- Protocol is ICMP
- Action for this rule is Deny (remember the purpose of the test), whereas the base policy is Allow all: this means that everything will be allowed except the rule specified (ie ICMP between TAGs SpokeB & VNET1)
Testing
Ping is blocked as expected.
NOTE: You can visualize the logs by enabling 'Packet Logging' and sending it to a Syslog Server.
Bottom Line
- Aviatrix embedded L4 Stateful FW is an easy feature to use
- No rearchitecture is needed
- It is free!
Next episodes foreseen:
Episode5: All you need to know about Aviatrix FQDN Filtering - Design Patterns
Episode6: Aviatrix Copilot Tour (including Cyber Threat Protection with ThreatIQ/ThreatGuard)
Episode7: How to spin up a fully resilient multicloud environment in minutes with Terraform
No comments:
Post a Comment