AWS Firewall- Samurai Warriors - DEVOPS DONE RIGHT (2024)

Table of Contents
Conclusion Related

Samurai are powerful warriors. We also need the same power in our infrastructure to get Control over Security threats over IP or URL Redirect attacks. So let me introduce to you the AWS Managed Firewall.

AWS Firewall- Samurai Warriors - DEVOPS DONE RIGHT (1)

Source: LinkedIn

In MNCs, we have separate Network and Security teams – which is good by the way. They have the proper tool to block incoming or outgoing traffic. For this, they set up a firewall on their side which helps them establish a Network Control Centre.

But managing this firewall is not easy and cheap because you have to purchase a license and to maintain that you need SMEs for particular that firewall. So to overcome all these issues we now have a managed service that is AWS Firewall.

So what were the current Requirements that help me go deep-dive into this?

  1. We need to block some Public URLs for our egress traffic.
  2. We want to do so with a managed service.
  3. It should be quite easy to implement
  4. No Hustle and Bustle is required for setting and maintaining the firewall
  5. It should be a centralized Service. Should have control over your multiple accounts. Ex- It would be treated as Single Control Network for multi Accounts

So, to fulfill all these requirements. The first fully managed service that came to my mind is the AWS firewall.

AWS Firewall- Samurai Warriors - DEVOPS DONE RIGHT (2)

Source

Well, don’t be afraid this document look difficult but quite easy to implement. So let’s start.

Basic Requirements:

  1. AWS Account
  2. Basic knowledge of the Creation of VPC and Subnets and EC2 and transit Gateway
  3. Please read the first Blog Transit Gateway Setup on AWS

The Diagram has some basic terms:

  1. Hub VPC: It’s a VPC in which your transit gateway is residing
  2. Spoke VPC: It’s your VPC that has to be exposed to the firewall
  3. Availability Zones: It’s your isolated location in which you have made your VPC
  4. VPC: Virtual Private Cloud is like your data-center
  5. Public/Private subnet: Public are those which are exposed to Internet and Private are not exposed
  6. NAT/Internet gateway: They are just like your routers which help you to connect to the outer world

We will do implementation in 4 Steps:

First, we will set up Transit Gateway:

  1. Click on Create Transit GATEWAY: Select NAME > SELECT DESCRIPTION > CREATE TRANSIT GATEWAY
  2. Now CREATE two ROUTE TABLE :
    • FIREWALL-ROUTE-TABLE
    • SPOKE-ROUTE-TABLE
  3. Now Create a TGW attachment for the VPC which you want to peer
  4. If you want to peer VPC in the different account you just need to share that Transit gateway to a particular Account and create a new attachment from that account

For more information refer to this blog transit gateway

Now next setup would be configuration of your Hub/Spoke/Inspection VPC

Note: We will not discuss the creation of VPC. For VPC creation we can refer to this AWS Documentation

https://docs.aws.amazon.com/directoryservice/latest/admin-guide/gsg_create_vpc.html

Creation of Spoke VPC:

As told earlier, Spoke VPC are those whose traffic has to be filtered through the firewall. You can use your existing VPC or create a new one with tgw-subnet in each availability zone

Now create Inspection VPC

Inspection VPC is in which you will have your Firewall setup.

  1. Inspection VPC will be having subnet name TGW subnet
Now create central Egress VPC

Central Egress VPC will be forwarding your Traffic which is getting filtered from Inspection(Firewall) VPC

  1. Central Egress VPC will have TGW Subnet/Public Subnet
  2. NAT Gateway
  3. Internet Gateway
After setting up Transit Gateway and 3 VPCs we will be moving towards our third step, setup of Firewall

Firewall Setup is easy we will follow bottom to above approach

FIREWALL RULES –> FIREWALL POLICIES —-> FIREWALL

We will first setup Rules

AWS Firewall- Samurai Warriors - DEVOPS DONE RIGHT (3)
  1. Go to AWS Firewall > Select Firewall Rules
  2. Choose action RULE GROUP TYPE > Forward to stateful groups
  3. Choose Stateful Group Option > DOMAIN LIST
  4. Select Stateful Rule Order > Strict
  5. Now create Rule Groups
    • Group Name: Opstree
    • Capacity 10000
    • List the number of Domains you want to allow
    • Choose a rule to ALLOW
    • Traffic to Inspect HTTP/HTTPS
    • Under Source IP Types: You can also choose Source IPs from where you are allowing the traffic to be going through firewall Here you can enter your VPC Ranges
Now Create the firewall Policy
AWS Firewall- Samurai Warriors - DEVOPS DONE RIGHT (4)
  1. Select > Firewall Policies
  2. Choose Name > Opstree Firewall
  3. Select > Select Exception policy (Drop)
  4. Select Default Actions
    • Fragmented packets > Use same actions for all packets
    • Action > Forward to stateful rule groups
  5. In stateful rule evaluation
    • Rule order > Strict
    • Default Action > Drop established
    • Now Add Stateful rule group you have created before in firewall rules by the names Opstree

Now create the BIG FISH FIREWALL

  1. Enter the Name > Opstree-Firewall
  2. Chose your VPC > Inspection VPC
  3. Choose Firewall Subnets > Select all the three Subnets you have created for Firewall
  4. Associated Firewall Policy > Select your existing policy > opstree-Firewall
  5. Enable Delete protection and Subnet change protection
Now you are all ready to block any Website on your Infrastructure

NOTE: Deploying Firewall in different subnet create different VPC endpoints.

We will not go deep Dive into VPC endpoints. It established private endpoint to connect with any AWS service within that VPC.

So now all the 3 Steps are done Let’s move towards the final step that Adding routes of tgw-id replacing your NAT Id in your spoke VPCs

When you have created TGW in our first step you have got a tgw-id just replace it with the NAT id in your route table of your Spoke VPC subnets

Now the Egress traffic flow will be like this in your VPCs.
  1. Now traffic coming from Spoke VPC will have an entry for Transit gateway id for the traffic 0.0.0.0/0 in the route tables
  2. Traffic will be from SPOKE to TRANSIT GATEWAY Spoke VPC Route table
  3. Spoke VPC Route table in Transit Gateway has entry to enter route coming from spoke VPC to Inspection VPC
  4. After traffic is entered into Inspection VPC it now has an entry over the firewall endpoint
  5. The firewall Endpoint will filter the traffic according to the rules
  6. Now it will throw back traffic to TGW Firewall TGW Route table
  7. Now TGW has filtered traffic, Now it will throw traffic to Central Egress VPC
  8. Where traffic goes to the outer world. Like if you have not allowed xyz.com into your firewall rules. you will not be able to access that into your Instance from where there the traffic is being originated

The same can be created for ingress traffic also you just need to add one more VPC Central-ingress VPC

Conclusion

I hope I could shed some light on the role and importance of the managed service – AWS Firewall. If you guys enjoyed reading this and found it insightful do share it amongst your community. Want to give any feedback or suggestions, you can reach out to me. If you have any interesting use-case for AWS Firewall, do share them in the comments section.

Blog Pundits: Sanjeev Pandey and Sandeep Rawat

OpsTree is an End-to-End DevOps Solution Provider.

Connect with Us

Related

AWS Firewall- Samurai Warriors - DEVOPS DONE RIGHT (2024)
Top Articles
Latest Posts
Article information

Author: Stevie Stamm

Last Updated:

Views: 6676

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Stevie Stamm

Birthday: 1996-06-22

Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

Phone: +342332224300

Job: Future Advertising Analyst

Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.