WP Aws Reference Architecture
WP Aws Reference Architecture
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Subnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Network ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Security groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Route tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Internet gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
NAT gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
AWS VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Customer gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Transit gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
FortiManager VM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Fortinet Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2
FortiGate launch on AWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Design Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Executive Summary
The public cloud, often referred to as “the cloud,” continues to be a popular model of cloud computing. Cloud service
providers leverage the internet and make resources such as infrastructure, storage, and servers available for businesses.
Third-party providers own and operate the shared physical hardware and offer it to companies based on their needs.
Companies around the globe adopt the cloud to take advantage of core characteristics:
Cost-effectiveness. Cloud infrastructure means customers do not need to spend money on purchasing and maintaining
equipment. This drastically reduces capital expenditure (CapEx) costs, saving companies the resources and time to invest in
hardware, facilities, and utilities, or to build out a large data center to grow their business.
Scalability. Cloud-based solutions are ideal for businesses with growing and fluctuating bandwidth demands. If business
demands increase, customers can easily increase their cloud capacity without investing in more physical infrastructure. This
level of agility provides businesses a key advantage over competitors.
Disaster recovery. Data loss is a major concern for all organizations. Storing customer data in the cloud guarantees that data
is always available, even if equipment such as laptops or PCs is damaged. Cloud-based services provide quick data recovery
for emergency scenarios—from natural disasters to power outages.
Increased agility. Today, businesses need to be more dynamic to be productive. They need to continuously evolve and
improve their processes, tools, technologies, and policies. Being agile enables businesses to make faster decisions, prioritize
the work, and ensure customer satisfaction. With the cloud, businesses experience better delivery, better collaboration, and
faster rollouts of new business initiatives.
4
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Cloud providers operate, manage, and control the components from the host
operating system and virtualization layer down to the physical security of the
Terms to Know
facilities in which the service operates. However, customers retain ownership and
control of their data and are responsible for configuring and deploying security n Availability Zones: One or more
baselines within their environments. discrete data centers, each with
redundant power, networking,
Amazon Web Services (AWS) is one of the most popular cloud providers that and connectivity, that are
businesses use to run their applications. The Fortinet FortiGate Next-Generation housed in separate facilities.
Firewall (NGFW) on AWS leverages its powerful automation capabilities to help
n AWS Region: A physical location
customers protect their workloads against sophisticated cyberattacks.
in the world where there are
In the next section, the main AWS constructs that are relevant to this design guide multiple Availability Zones.
are explained.
Each Amazon Region is designed to be completely isolated from the other Amazon Regions. This achieves the greatest
possible fault tolerance and stability. Each AZ is isolated, but the AZ in a Region are connected through low-latency links.
AWS provides the flexibility to place instances and store data within multiple geographic regions as well as across multiple
AZ within each AWS Region. Each AZ is designed as an independent failure zone. This means that AZ are physically
separated within a typical metropolitan region and are in lower-risk flood plains.
5
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
To take advantage of the fault tolerance and isolation offered by the AZ, it is
necessary to distribute applications as well as security services that are deployed
to protect them across multiple AZ. Tech Tip #1
Note that Amazon VPC does
Virtual Private Cloud (VPC) not support modification of the
primary CIDR.
Amazon Virtual Private Cloud (Amazon VPC) enables customers to launch AWS
resources into a virtual network that they have defined. This virtual network closely
resembles a traditional network that customers can operate in their own data
center, with the benefits of using the scalable infrastructure of AWS. Amazon VPC
Consider the overall network
lets customers provision a logically isolated section of the AWS Cloud where they
map before creating VPCs and
can launch AWS resources in a virtual network that they define. Customers have
defining CIDRs to them in the
complete control over their virtual networking environment, including selection of same manner when assigning
their own IP address range, creation of subnets, and configuration of route tables CIDRs in physical data centers.
and network gateways. VPC networking supports both IPv4 and IPv6 addresses. This will help avoid problems
such as IP address overlapping
Most AWS accounts come with a default VPC that has a default subnet in each AZ.
after instances are deployed in
Customers can launch instances into their default VPC without knowing anything
the AWS account.
about Amazon VPC. However, AWS allows customers to create their own VPC
known as nondefault VPC. This gives greater flexibility to customers who desire to
customize configuration of VPC Classless Inter-Domain Routing (CIDR), subnetting,
network configuration, etc.
Contrary to physical data center networks where extending CIDR blocks is a daunting task, VPC allows customers to define
their CIDR block at the time of VPC creation and later extend the range by simply adding a secondary CIDR to take advantage
of the dynamic nature of the cloud. Although customers are free to define and allocate any CIDR when creating a VPC, it is
highly recommended to use CIDRs according to RFC 1918, “Address Allocation for Private Internets.”
By default, every instance in a VPC has a route to all other instances within that VPC. However, internet connectivity is not
enabled by default even if the defined CIDR is a publicly routable IP address range. To establish connection to the internet,
an internet gateway must be created and then attached to the VPC. Instances that require internet connectivity can then be
assigned public IP addresses. Elastic IP address can also be associated to an instance. Customers who need connectivity
between their VPC and on-premises location can create a VPN gateway device and attach it to their VPC. IPsec VPN
connections can then be established between the VPN gateway and the on-premises customer gateway.
Subnets
After creating a VPC, one or more subnets can be added in each AZ. To create a subnet, a CIDR block for the subnet that is a
subset of the VPC CIDR block needs to be specified. Each subnet must reside entirely within one AZ and cannot span zones.
If a subnet’s traffic is routed to an internet gateway, the subnet is known as a public subnet. If a subnet does not have a route
to the internet gateway, the subnet is known as a private subnet.
The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC), or a subset of the
CIDR block for the VPC (for multiple subnets). The allowed block size is between /28 netmask and /16 netmask and subnets’
CIDR within a VPC cannot overlap. For example, if the VPC CIDR block is 10.0.0.0/24, two /25 CIDR subnets can be created
within that VPC. Note that the first four IP addresses and the last IP address in each subnet CIDR block are not available
for customers to use and cannot be assigned to an instance. If, for example, a subnet CIDR is 10.0.0.0/24, the following five
addresses are reserved:
6
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Network ACL
A network access control list (ACL) is an optional layer of security for a VPC that What to Know Before Using
acts as a stateless L4 firewall for controlling traffic in and out of one or more a Network ACL
subnets. Since inter-subnet routing is available in a VPC by default, network ACL n All VPCs automatically come
can be used to prevent a subnet from accessing other subnets in a VPC. with a default NACL that allows
all inbound and outbound
Security groups
IPv4 traffic.
A security group acts as a virtual Layer 4 firewall for instances to control both inbound n A network ACL contains a
and outbound traffic. Security groups are applied at an instance’s network interface; numbered list of rules that are
therefore, each instance in a subnet could be assigned to a separate set of security evaluated in order, starting with
groups. By default, AWS allows customers to apply up to five security groups to a the lowest numbered rule, to
network interface. determine whether traffic is
allowed in or out of any subnet
Contrary to network ACLs, security groups are stateful and do not support deny
associated with the network ACL.
actions.
n A network ACL has separate
Security groups only function as Layer 4 firewalls and cannot inspect packets for inbound and outbound rules,
application layer visibility. Therefore, an NGFW should be added as another security and each rule can either allow or
layer to detect and prevent advanced cyberattacks. deny traffic.
n Network ACLs are stateless;
Route tables
responses to allowed inbound
A VPC has an implicit router and each subnet within the VPC must be associated traffic are subject to the rules for
with a route table, which specifies the allowed routes for outbound traffic leaving outbound traffic.
the subnet.
Default route table. When a VPC is created, it automatically comes with a default
route table. The default route table controls the routing for all subnets that are not
Main Attributes of a
explicitly associated with any other route table. Routes in the default route table can
be removed, added, and modified. However, the default route table cannot be deleted. Security Group
n “Allow” rules can be applied but
Custom route table. Customers can create additional route tables in addition to
no “deny” rules are permitted.
the main route table. By associating each new subnet with a custom route table,
customers can ensure that they explicitly control each subnet route’s outbound traffic.
n Separate rules can be specified
for inbound and outbound traffic.
All Amazon VPC route tables come with a default local route entry that cannot
n All “allow” rules must be
be removed.
explicitly added to the security
group. Otherwise, the default
AWS action is to block all traffic.
n Security groups are stateful. If a
request is sent from an instance,
the response traffic for that
request is allowed regardless
of the inbound rules of the
associated security group (and
vice versa).
n No inbound traffic originating
from another host to an instance
is allowed until a security group’s
inbound rules are updated. This
is due to the fact that AWS by
default does not create any
inbound rule.
7
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Internet gateway
VPC routing is designed such that no instance in a VPC, in a private subnet or in Possible ENI Attributes
a public subnet, can communicate over the internet without an attached internet n A primary private IPv4 address
gateway. An internet gateway performs network address translation for instances
n One or more secondary private
that have been assigned public IPv4 addresses.
IPv4 addresses
After creating and attaching an internet gateway to a VPC, a route that directs n One elastic IP address (IPv4) per
internet-bound traffic to the internet gateway must be added to the route private IPv4 address
table associated with the public subnet, as shown in Figure 3. Also, to enable
n One public IPv4 address
an instance to communicate over the internet, it must be assigned a public IP
address or an elastic IP address that is associated with a private IP address.
n One or more security groups
Because instances are only aware of their private IP addresses, the internet n A MAC address
gateway is also required to provide logical one-to-one network address translation n A source/destination check flag
(NAT) on behalf of the instances, so that the return traffic is destined to the public
IP address of an instance.
NAT gateway
A NAT gateway is a managed AWS service that can be used by customers to
enable instances in a private subnet to connect to the internet. It also prevents
unsolicited internet traffic to reach the private instances. When traffic goes to
the internet, the source IP address is replaced with the NAT gateway’s public IP
address and similarly, when the response traffic goes to those instances, the NAT
gateway translates the address, back to those instances’ private IP addresses.
After a NAT gateway is created, the route table(s) associated with private
subnet(s) must be updated to point internet-bound traffic to the NAT gateway.
This enables instances in the private subnets to communicate with the internet.
For example, the route table associated with the private subnet in Figure 3 has a
route entry for the default route that has the NAT gateway as its target. This route
ensures that all internet-bound traffic is routed through the NAT gateway.
AWS offers two kinds of NAT devices—NAT instance and NAT gateway. However,
NAT gateway is the recommended option as it is managed by AWS and saves
customers from administration efforts.
Every instance comes with at least one network interface after it is launched. This
primary interface cannot be detached. All other ENIs can be detached from an
instance and attached to another instance if the ENI and the interface that the ENI
is being attached to reside in the same AZ.
8
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Tech Tip #2
If ASN is not specified during
creation of the virtual private
gateway, AWS by default assigns
ASN 64512.
AWS VPN
AWS VPN (Site-to-Site) extends a customer’s data center or branch office to AWS cloud via IPsec tunnels and supports
connecting both virtual private gateway and AWS Transit Gateway. Customers can optionally run Border Gateway Protocol
(BGP) over IPsec tunnels.
After a virtual private gateway is created and attached to a VPC, and a VPN connection is established, the virtual private gateway can
function as a gateway to the customer’s on-premises data center. It can either be statically added to the route table as the target for
remote routes or is automatically added to the route table once remote routes are learned via BGP. For example, in the route table
shown in Figure 6, the route to 10.17.0.0/16 has been dynamically learned and populated.
9
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
VPN connection. Note that an existing ASN assigned to the network can be Tech Tip #4
used when creating a customer gateway device. Alternatively, one can use a
To establish IPsec tunnels,
private ASN within the 64512-65534 range. Once created, administrators need customer gateways must initiate
to configure the customer gateway to establish a VPN connection. Fortinet the tunnel.
has worked with the AWS team to provide a configuration template directly
downloadable from AWS.
Transit gateway
Until recently, there were limited options for organizations that wanted to
interconnect their VPCs. They could create point-to-point peering to manage
networking at each VPC, which added a great deal of complexity. Or they could
create IPsec tunnels from each VPC to third-party router and firewall appliances in a
shared VPC. This results in a hub-and-spoke topology called “transit VPC.”
10
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
While transit VPC deployments, such as Fortinet Transit VPC, have become a
preferred approach to address inter-VPC connectivity and security requirements, Key Characteristics of
an AWS virtual private gateway—deployed at each VPC spoke to terminate VPN
Transit Gateways
connections—has serious bandwidth restrictions, thus limiting network performance.
n Customers can attach a VPC
The AWS Transit Gateway resolves this issue through a distributed service that allows or VPN connection to a transit
connectivity at scale. Because it supports equal-cost multi-path (ECMP) routing, gateway.
traffic can be equally distributed over two or more VPN connections that propagate n A transit gateway has a default
the same IP prefix. route table and can optionally
A transit gateway works across AWS accounts but can only attach to VPCs that are have additional route tables.
within the same Region. n By default, the VPCs and VPN
connections that attach to a
transit gateway are associated
with the default transit gateway
route table.
n Each transit gateway attachment
is associated with exactly one
route table.
n Each route table can be
associated with zero to many
attachments.
n Only one transit gateway
attachment can be attached to an
Availability Zone within a VPC.
n A VPC or VPN connection can
dynamically propagate routes to a
transit gateway route table.
The transit gateway in Figure 7 is attached to two VPCs in two different AWS accounts. All attachments are associated with the
default transit gateway route table. The route table in the VPC for the second account has been updated to include routes to
the transit gateway. One transit gateway attachment object of type VPN in account one has been created to connect the transit
gateway to the FortiGate NGFW in the hub VPC. Also, two transit gateway attachments, one per each AZ, have been created to
ensure high availability of the connection between the spoke VPC in account one and the transit gateway.
11
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Gateway Load Balancer shown here with transit gateway for multi-VPC inspection capabilities, across accounts
GWLB
When you create a VPC endpoint service, you specify the GWLB. Other AWS principals access the endpoint service by
creating a GWLB endpoint. This allows for connectivity from VPCs to the GWLB.
EKS
Amazon Elastic Kubernetes Service (Amazon EKS) is a managed Kubernetes service that makes it easy for you to run
Kubernetes on AWS and on-premises. Kubernetes is an open-source system for automating deployment, scaling, and
management of containerized applications. Amazon EKS is certified Kubernetes-conformant, so existing applications that run
on upstream Kubernetes are compatible with Amazon EKS.
Auto-Scale
AWS Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance
at the lowest possible cost. Using AWS Auto Scaling, it’s easy to set up application scaling for multiple resources across
multiple services in minutes. The service provides a simple, powerful user interface that lets you build scaling plans for
resources including Amazon EC2 instances and Spot Fleets, Amazon ECS tasks, Amazon DynamoDB tables and indexes,
and Amazon Aurora Replicas. AWS Auto Scaling makes scaling simple with recommendations that allow you to optimize
performance, costs, or balance between them. If you’re already using Amazon EC2 Auto Scaling to dynamically scale your
Amazon EC2 instances, you can now combine it with AWS Auto Scaling to scale additional resources for other AWS services.
With AWS Auto Scaling, your applications always have the right resources at the right time.
12
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
FortiManager virtual security management appliances for AWS offer the same n Natively integrate with AWS
powerful network security management features as FortiManager hardware-based accounts using the Fortinet
appliances, with the addition of a stackable license model that enables easy growth fabric connector to dynamically
enforce security policies
with your network environment. Fortinet virtual appliances allow you to deploy a
across customers’ multi-cloud
mix of hardware and virtual appliances, operating together and managed from a
environments
common, centralized FortiManager platform.
FortiADC-VM on AWS
FortiADC provides unmatched application acceleration, load balancing, and web
security, regardless of whether it is used for applications within a single data center
or serves multiple applications for millions of users around the globe. FortiADC
includes application acceleration, WAF, IPS, SSL inspection, link load balancing, and
user authentication in one solution to deliver availability, performance, and security
in a single, all-inclusive license.
13
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
FortiWeb
Using a multilayered and correlated approach, FortiWeb intelligently and accurately protects your web applications from the
OWASP Top 10 threats. Combined with Fortinet Web Application Security Service from FortiGuard Labs, FortiWeb keeps your
applications safe from vulnerability exploits, bots, malware uploads, denial-of-service (DoS) attacks, advanced persistent
threats (APTs), and zero-day attacks. Available as hardware, VMs, and as-a-Service, FortiWeb provides world-class WAF
protections in the deployment model your enterprise needs.
FortiCNP
FortiCNP, Fortinet’s cloud-native protection solution, helps security practitioners prioritize risk management activities
based on a broad set of security signals across their cloud environment. FortiCNP includes cloud security posture
management (CSPM) services that continuously discover, monitor, and detect cloud risk across multi-cloud environments.
FortiCNP collects information from cloud-native vulnerability scanning, permissions analysis, threat detection, and other
security services as well as Fortinet Cloud Security products to calculate an aggregate risk score for cloud resources,
so customers can prioritize risk management work based on the context-rich Resource Risk Insights (RRI) that FortiCNP
produces. Unlike traditional cloud security posture management (CSPM) and cloud workload protection platform (CWPP)
products, by integrating with cloud-native security services and other Fortinet Security Fabric products, FortiCNP
provides broad security visibility across your cloud footprint and helps you prioritize security workflows for effective risk
management.
Composed of security threat researchers, engineers, and forensic specialists, FortiGuard Labs collaborates with the world’s
leading threat-monitoring organizations and other network and security vendors, as well as law enforcement agencies.
Fortinet Licensing
With a multitude of deployment methods supported across various private and public cloud deployments, Fortinet
Security Solutions for AWS supports on-demand pay-as-you-go (PAYG) and bring-your-own-license (BYOL) models.
BYOL is annual perpetual licensing available for purchase from resellers or distributors. It provides the same ordering
practice across all private and public clouds, no matter what the platform is. Customers must activate a license the first
time they access the instance before using various features. It is ideal for migration use cases, where an existing private
cloud deployment is migrated to a public cloud deployment. When using an existing license, the only additional cost would
be the price for the AWS instances.
PAYG is a highly flexible option for both initial deployments and growing them as needed. With a wide selection of
supported instance types, there is a solution for every use case. This license offers FortiOS with the unified threat
management (UTM) bundle. To purchase PAYG, subscribe to the product on the AWS Marketplace.
SaaS offerings are also available on AWS Marketplace and are metered based on consumption. FortiCNP is metered by
protected hosts per month, while FortiWeb Cloud WAF-as-a-Service is metered by cumulative throughput per application.
SaaS licensing is available on AWS Marketplace, or through your preferred reseller.
14
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
C5.9xlarge 36 8
FG-VMUL or FG-VMULv
C5.18xlarge 72 15
C5d.9xlarge 36 8
FG-VMUL or FG-VMULv
C5d.18xlarge 72 15
C6i.xlarge (recommended
4 4 FG-VMO4 or FG-VM04v
by default)
C6i.8xlarge 32 8
C6i.24xlarge 96 15
15
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
C5.large 2 M5.large 2
C5.xlarge 4 M5.xlarge 4
C5.2xlarge 8 M5.2xlarge 8
R5.xlarge 4 M5.4xlarge 16
R5.2xlarge 8 M5.8xlarge 32
M5.12xlarge 48
FortiADC-VM Instance Type Support:
M5.16xlarge 64
Instance type vCPU
M5.24xlarge 96
C5.large 2
C5.xlarge 4
C5.2xlarge 8
C5.4xlarge 16
M5.large 2
M5.xlarge 4
M5.2xlarge 8
M5.4xlarge 16
Fortinet strongly recommends utilizing C5, M5, C6i, or C6g instance types to take advantage of AWS enhanced networking to
achieve the maximum network throughput. The C6g instances are powered by AWS Graviton, and currently only available for
FortiGate.
FG-VMO1 or 01v 1 1
FG-VMO2 or 02v 1 2
FG-VMO4 or 04v 1 4
FG-VMO8 or 08v 1 8
FG-VM16 or 16v 1 16
FG-VMUL or ULv 1 72
16
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Customers can create an Amazon S3 bucket and upload the license file for BYOL instances, as well as the day-zero
configuration file to the S3 bucket. Note that an identity and access management (IAM) role that allows access to the S3
bucket needs to be attached to the FortiGate instance at launch time. The following is an example of user data that is passed
to the FortiGate instance to bootstrap the instance at launch time:
{
“bucket” : ”unique-bucket-name”,
“region” : “us-west-2”,
“license” : “/FGVM020000000000 .lic”,
“config” : “/fgtconfig-init .txt”,
}
The adoption of hybrid cloud, which is isolated sets of public clouds, private clouds, and physical entities, requires different
security management methodologies, which have become burdens to administrators. Additionally, inconsistent security
management with an assortment of security solutions at different sites and tenants makes maintaining security posture
across different clouds a daunting task for any organization.
Fortinet Fabric Connectors feature APIs and other interfaces to make them highly extensible platforms. They provide out-of-
the-box or built-in integration mechanisms and orchestration of FortiGate or FortiManager with key software- defined network
(SDN) and public cloud solutions—including AWS.
Regardless of how objects change their forms and locations in elastic and volatile fashions, FortiGate identifies them as
address objects that can be used as sources and destinations. It then applies appropriate firewall policies automatically
without the administrator’s manual intervention.
17
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
FortiManager is an optional component. The remainder of this section assumes customers directly use FortiGate to set up
an address object and firewall policies.
To create a dynamic address object for AWS resources, an AWS connector must first be created using FortiGate CLI/API/GUI.
The next step in the process is to define an address object using the AWS connector. Customers can define address objects
based on different AWS attributes such as instance ID, instance type, subnet ID, etc. Address objects can also be defined based
on tags associated with the resources.
18
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
In this example, the customer wants to block all engineering resources tagged with Dept=Eng from accessing audio/video
streaming websites. After a dynamic address object group with “tag .Dept=Eng” filter rule is created, it initially contains two
EC2 instances (10.0.1.9 and 10.0.1.10). A firewall policy with that address object as the source address is created. This policy
blocks all accesses originating from the address object destined to the audio/video streaming websites (such as Netflix.
com). Thus, when a new EC2 instance is launched by the engineering team, that instance will automatically join that address
object if the instance is tagged appropriately. Any attempt to connect to a streaming website from the new instance will be
blocked without requiring the administrator to manually configure the firewall.
All traffic destined to the web server is inspected by the FortiGate-VM. The internet gateway (IGW) attached to the VPC
enables internet connectivity and also performs network address translation for the private IP address of FortiGate’s ENI-0
and the EIP associated with that interface.
19
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Figure 11 illustrates the incoming traffic packet flow as well the path for the return traffic.
Inbound traffic. IGW translates the destination IP address (which is the EIP associated with the FortiGate’s ENI-0) to the
private IP address of FortiGate’s ENI-1. The FortiGate NGFW will again apply destination NAT to change the destination IP
address to the IP address of the back-end web server.
Return traffic. Traffic returning from the web server will follow the private subnet’s route table, which includes a route entry
to point all internet-bound traffic to the FortiGate. As shown in Figure 11, both FortiGate and IGW apply source NAT to the
return traffic to change the source IP to a publicly routable IP address (EIP associated with the FortiGate NGFW’s ENI-0).
To enable FortiGate-VM to forward traffic, it is required that the source/destination check flag is disabled at the network
interface level, as explained earlier in this document.
In the example shown in Figure 12, the web server in the private subnet needs to initiate an internet-bound request to download
an OS patch. As illustrated in the figure, both FortiGate-VM and IGW apply source NAT to the outbound traffic. Also, they apply
destination NAT to the response traffic to translate the EIP and the private IP address of the FortiGate’s ENI-0.
Multi-VPC design. AWS recommends segmenting networks at the VPC level. In this approach, workloads are grouped together
at the VPC level instead of the subnet level. All traffic between VPCs will be inspected by network security virtual firewalls at
each VPC or at a shared VPC. Design patterns such as Transit VPC or AWS Transit Gateway can be used to achieve this in an
automated and scalable fashion.
20
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Although AWS virtual private gateways can be used to terminate VPN tunnels in AWS VPCs, it is highly recommended to use
FortiGate NGFWs instead, as they can support much higher bandwidth than AWS virtual private gateways.
Figure 13 illustrates two FortiGate-VMs deployed in two different AZ to provide resiliency. Each private subnet has a route table
that contains a route that points to the ENI-1 of the FortiGate in its respective AZ. In the event of downtime in an AZ, this design
ensures that workloads in the other AZ have continued outbound connectivity.
Because FortiGate NGFWs support BGP, they can learn routes dynamically from the on-premises network if the customer
gateway also supports BGP. Additionally, each FortiGate can act as a default gateway for all internet-bound traffic.
In order to support a similar deployment in AWS where a pair of FortiGate instances can synchronize sessions, Fortinet has
designed Unicast HA to provide an active-passive clustering solution for deployments in AWS. This solution works with two
FortiGate instances configured as a collaborative pair and requires that the instances are deployed in the same subnets and
same AZ within a single VPC. These FortiGate instances act as a single logical instance and share interface IP addressing.
Configuration synchronization allows customers to configure a cluster in the same way as a standalone FortiGate unit. If a
failover occurs, the cluster recovers quickly and automatically and can also send notifications to administrators so that the
problem that caused the failure can be corrected and any failed resources restored.
21
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
22
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
The solution shown in Figure 18 is very similar to the Lambda-based active- passive deployment covered in the previous
section. They are both composed of the same components.
The main difference, however, is that route tables in two AZ have a route entry that points to a different FortiGate private
interface. This enables both FortiGate instances to be utilized based on the AZ in which the resource that originates the traffic
resides. Figure 19 depicts the failover process in this design. Outbound failover is provided by updating any routes currently
targeting FortiGate 1’s private interface to target FortiGate 2’s private interface (ENI1).
When FortiGate 1 comes back online and passes health checks, the list of routes for AZ1 will be updated to target FortiGate 1 as
it is the local instance for the AZ.
The AWS SDN and tag updates are performed by the Lambda function initiating API calls (from the ENI automatically created
by Lambda within the VPC) through the VPC endpoint interfaces. Reference the detailed step-by-step deployment guide for
more information.
23
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Figure 19: FortiGate active-active resiliency for outbound traffic failover process
In active-passive HA mode, one of the member instances will be selected as the master node, while the others are slaves. If the
master node fails, the slave takes over as the master. The FortiWeb-VMs run heartbeats between dedicated UDP-tunnel and
synchronize the master node’s configuration to all the members in the HA group. Only the master instance processes traffic. We
associate an EIP (Elastic IP address) to the master instance. When the master node fails, the slave immediately takes the master
role and processes traffic. The EIP is switched to the new master.
24
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
In high-volume active-active HA mode, all of the instances in the HA group process traffic. We use an external Elastic Load
Balancer (ELB) to distribute traffic to all of the HA members. If an instance is down, it will be ignored by the load balancer for
traffic distribution. If the failed instances are the master node, one of the slave instances immediately takes its role to become
the new master.
Other Architectures
FortiADC Ingress Controller
The FortiADC Ingress Controller fulfills the Kubernetes Ingress resources and allows you to manage FortiADC objects from
Kubernetes. It is deployed in a container of a pod in an EKS Kubernetes cluster. The list below outlines the major functionalities
of the FortiADC Ingress Controller:
n To list and watch Ingress-related resources, such as Ingress, Service, Node, and Secret
n To convert Ingress-related resources to FortiADC objects, such as virtual server, content routing, real server pool, and more
n To handle Add/Update/Delete events for watched Ingress resources and automatically implement corresponding actions on FortiADC
25
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
FortiGate delivers high-performance, low-latency SAP security through the deep-packet and content inspection specific to
SAP services. The FortiGate, combined with FortiGuard threat intelligence, delivers validated industry-leading IPS technology.
FortiGuard Labs provides SAP threat intelligence to the FortiGate’s IPS engine to protect from well-known and emerging threats.
FortiADC is an advanced application delivery controller that enhances SAP applications’ security, scalability, and performance.
FortiADC provides WAF, IPS, SSL inspection, link load balancing, and user authentication in one solution, whether SAP
applications are hosted on-premises or in the cloud. FortiADC secures SAP both with SAP connector and by integrating
application delivery into the Fortinet Security Fabric. The SAP connector gets changes from the SAP Message Server. All
SAP web traffic to the SAP Application Servers is protected with end-to-end encryption using the FortiADC. An intuitive
user interface streamlines the configuration of CLI and APIs. Automated configuration gathers information from the SAP ICM
configuration (HTTP/HTTPs ports, virtual hosts, etc.) and additional application server instances. The SAP connector provides
a topology view of the SAP landscape within the network for easier management and unified visibility for multi-cloud and on-
premises SAP deployments.
Design Patterns
In the previous sections of this document, AWS key concepts as well as FortiGate deployment models were discussed in detail.
This section focuses on how different AWS services and design patterns can be utilized to deliver scalable and automated
security solutions for customers who have decided to migrate their physical data center, partially or entirely, to an AWS
environment. When designing security for your infrastructure, take the following into consideration:
Scale. Depending on the number of VPCs in the customers’ environment, a design pattern such as Transit VPC, transit gateway,
or a single VPC design may be the best option. Also, routing requirements can influence the design decision.
Automation. Due to the distributed and dynamic nature of the cloud (including AWS), utilizing Infrastructure-as-a-Code (IaaC)
tools such as Terraform and CloudFormation is of paramount importance. Additionally, native AWS services such as AWS Auto
Scaling can help customers efficiently and automatically take advantage of AWS elasticity.
High availability and resiliency. Customers who have workloads in production environments ideally require resilient and highly
available security solutions to protect their data and applications. FortiGate resilient deployment options and AWS managed
services can help achieve this goal.
26
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
The AWS Transit Gateway can help route traffic in all directions, including north- n In the public subnets, a FortiGate
south and east-west. The Fortinet Cloud Services Hub leverages the AWS Transit host in an auto-scaling group
Gateway service to enable and improve upon several critical use cases. complements AWS security
groups to provide Layer 7 security
Hybrid cloud. In a typical hybrid-cloud deployment, a large volume of data is features such as intrusion
continuously transferred between multiple remote branches, the corporate data protection, web filtering, and
center, as well as application VPCs. The Fortinet Cloud Services Hub creates a threat detection.
central hub VPC in the cloud to facilitate interconnectivity and traffic inspection. n In the public subnets, FortiGate
While application VPCs attach directly to the Transit Gateway, physical data center NGFWs that act as NAT
and remote branch locations can connect to the FortiGate NGFW in the Fortinet gateways, allowing outbound
Cloud Services Hub using ECMP in a scalable fashion. internet access for resources in
the private subnets. This also
Inbound application traffic with firewall resiliency. It’s often preferable to deploy
ensures that outbound traffic is
applications in private subnets in VPCs that do not require any public IP addresses.
inspected by the FortiGate NGFW
Yet, the need to protect applications from outside attacks is still present. The instance.
Fortinet Cloud Services Hub integrates with the AWS Transit Gateway, allowing
n An externally facing NLB. An
customers to conveniently deploy web applications in a private VPC while resilient
internally facing NLB is optional.
FortiGate NGFWs are provisioned in a public VPC to protect their applications.
Figure 24 depicts a scenario where two FortiGate NGFWs are fronted by an n Amazon API Gateway, which
internet-facing AWS load balancer. Back-end services are deployed in two spoke acts as a front door by providing
a callback URL for the FortiGate
VPCs that connect to a Transit Gateway.
auto-scaling group.
n Lambda functions are used to
handle auto scaling, failover
management, and configuration
for other related components.
n An Amazon DynamoDB database
that uses Fortinet-provided
scripts to store information about
auto-scaling condition states.
Figure 23: Transit Gateway with firewall resiliency for inbound traffic
27
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Figure 24: VPC-to-VPC traffic inspection with FortiGate NGFW and AWS Transit Gateway
28
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
FortiGates use API gateways to send API calls and to process FortiGate Config- Sync tasks to synchronize operating system
configuration across multiple FortiGate instances at the time of the auto-scaling event. This is currently only for internal use in
the VPC. There is no public access available.
Incoming requests to the web servers in the private subnets present in your existing VPC will go through a connection that
flows through the internet gateway, NLB, and the FortiGate auto-scaling group before reaching the web server. The web server
returns the response using the same connection.
Outgoing requests from the web servers go through the individual FortiGate NAT gateway and the internet gateway to the
external network. The external network returns the response using the same path.
This solution is fully automated and can be deployed to existing or new VPCs. It is available as an AWS Quick Start Guide.
GWLB is a fully managed service from Amazon, with support to include in your IaC deployments, along with the native visibility
of VPC flow logs and the full suite of AWS supporting services.
The first option is to use AWS Gateway Load Balancer Endpoints (GWLBE) from the customers’ VPCs. GWLBE makes it easy for
users to secure their internet-bound traffic without the hassle of having to set up and manage virtual firewalls and policies.
29
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
Figure 26: North-South Traffic Inspection with AWS Gateway Load Balancer
As shown in the diagram, all traffic in the VPC is destined for the GWLBE before it leaves the VPC. While the diagram shows
an internet gateway, the destination could just as easily be another VPC via transit gateway attachment, or over VPN to a
destination on-premises.
Figure 27: East-West VPC-to-VPC Traffic Inspection with AWS Gateway Load Balancer
30
WHITE PAPER | Amazon Web Services (AWS) Reference Architecture
This diagram highlights how leveraging GWLB with existing TGW deployments can allow for easy east-west inspection across
accounts and even in multi-tenant deployments.
Conclusion
As organizations adopt cloud deployments, it is of paramount importance to design a security architecture that fits their
requirements early in their cloud journey. Fortinet FortiGate-VM on AWS, FortiWeb-VM on AWS, FortiWeb Cloud WAF-as-a-
Service, FortiADC-VM on AWS, and FortiCNP support various deployments and design models to satisfy the scale, availability,
and resiliency requirements of AWS customers. Additionally, the integration with native AWS services and automation
frameworks allows Fortinet Security Services to scale dynamically and automatically to meet changing traffic volumes. Finally,
Fortinet Security Fabric Connectors natively integrate with AWS to create dynamic address objects that help network and
security administrators automatically manage and enforce security policies across your cloud footprint.
www.fortinet.com
Copyright © 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
381696-B-0-EN