Lab 3 - FireNet - Interface

Lab 3 - FireNet - Interface#

1. SCENARIO#

BU1 and BU2 were able to communicate with each other as of Friday EOB (i.e end of LAB2).

However, the network team received a complaint from BU1 Frontend Team that the connectivity with BU2 Mobile App was no longer working.

Warning

The traffic between the two VPCs in AWS is inspected by a Firewall deployed through the Aviatrix FireNet feature.

The Inspection Policy had been already applied on each Spoke VPC in AWS, at the launch of the PODs. The traffic generating from or going to either of the AWS VPCs will be sent to the Firewall by the Transit FireNet Gateway for carrying out the Deep Packet Inspection.

../_images/lab3-policy2.png

Fig. 51 Inspection Policies on the FireNet Transit GW#

../_images/lab3-topology.png

Fig. 52 Lab 3 Topology#

2. TROUBLESHOOT REQUEST#

  • Verify that the connectivity between BU1 Frontend and BU2 Mobile App is actually broken.

    • SSH to BU1 Frontend and launch ping/ssh towards BU2 Mobile App.

../_images/lab3-pingfails.png

Fig. 53 Ping fails#

  • Check whether the relevant Spoke Gateways have the required routes installed on their routing tables or not.

Tip

Go to CoPilot > Cloud Fabric > Gateways > Spoke Gateways > select for example the gateway ace-aws-eu-west-1-spoke1 > Gateway Routes and search for the subnet 10.1.212.0/24, where BU2 Mobile App resides.

../_images/lab3-routecheck.png

Fig. 54 Filtering out#

From the outcome above, it is evident that Spoke1 in AWS has the destination route in its RTB. You can verify the inverse, inspecting the Routing Table of the Spoke2 in AWS.

  • Use Diagnostics Tools from the Spoke1 Gateway in AWS and try to ping/traceroute the instance behind the other spoke (i.e. BU2 Mobile App).

Tip

Retrieve the private IP address of the BU2 Mobile App from the Cloud Assets inventory, first!

Go to CoPilot > Cloud Resources > Cloud Assets > Virtual Machines and search for "mobile", then retrieve the private IP of the interested EC2 instance.

../_images/lab3-personalpod.png

Fig. 55 Private IP of BU2 Mobile App#

Tip

Go to CoPilot > Diagnostics > Diagnostics Tools then select the GW ace-aws-eu-west-1-spoke1 and ping the private IP of BU2 Mobile App

../_images/lab3-pingfailss.png

Fig. 56 Ping is unsuccessful#

From the outcome above you can notice that from the Spoke1 GW in AWS, the BU2 Mobile App is not reachable.

  • Now try to ping both workloads (i.e. BU1 Frontend and BU2 Mobile App) from the Transit GW in AWS.

../_images/lab3-bu1ping.png

Fig. 57 Ping is ok from the Transit GW towards BU1 Frontend#

../_images/lab3-bu2ping.png

Fig. 58 Ping is ok from the Transit GW towards BU2 Mobile App#

From the outcome above, you can notice that the Transit GW in AWS can ping both BU1 Frontend and BU2 Mobile App, successfully.

  • Let’s check the FireNet section!

Tip

Go to CoPilot > Security > FireNet

../_images/lab3-unreachable.png

Fig. 59 The FW is unreachable#

Click on the Firewall tab! You will notice that the Firewall turns out being down.

Important

The ICMP health check is initiated every 5 seconds from the Aviatrix Transit FireNet Gateway. The 5-second setting is the default and cannot be changed.

../_images/lab3-fwdown.png

Fig. 60 The FW is down#

  • Apply a quick workaround. Before exploring the firewall configuration, exclude from the East-West Inspection, either of the CIDRs of the two AWS Spoke VPCs.

Tip

Go to CoPilot > Security > FireNet > FireNet Gateways and click on the ace-aws-eu-west-1-transit1 GW.

Then click on Settings and insert the CIDR of the AWS ace-aws-eu-west-1-spoke2 VPC on the field "Exclude from East-West Inspection".

Do not forget to click on Save.

../_images/lab3-firenetgw.png

Fig. 61 The Transit FireNet GW#

../_images/lab3-excemption2.png

Fig. 62 Exclude the CIDR#

  • Issue the ping towards the BU2 Mobile App from the BU1 Frontend. This time the connectivity will work!

../_images/lab3-pingok2.png

Fig. 63 Ping is ok#

  • Launch a traceroute towards the Private IP address of the BU2 Mobile App.

../_images/lab3-traceroute.png

Fig. 64 Traceroute is ok#

Important

The traceroute outcome shows the whole path from the source, the BU1 Frontend, till the recipient, the BU2 Mobile App.

Undoubtedly, the Firewall is excluded from this path!

  • Now remove the workaround and explore the Firewall configuration!

Tip

Go to CoPilot > Security > FireNet > FireNet Gateways, click on the ace-aws-eu-west-1-transit1 GW, then click on Settings and remove the CIDR 10.1.212.0/24.

Do not forget to click on Save.

../_images/lab3-removeex.png

Fig. 65 Remove the exemption#

  • Log in to the FW (refer to your POD portal for the credentials) and explore the configuration.

Note

You can access the Firewall in two ways:

  1. From the URL available on the POD Portal.

  2. CoPilot > Security > FireNet > Firewall and click on the URL.

../_images/lab3-newportal.png

Fig. 66 POD Portal#

../_images/lab3-url.png

Fig. 67 FW URL from the FireNet section on the CoPilot#

  • Insert the credentials.

../_images/lab3-fw.png

Fig. 68 FW access#

Tip

Go to FW > Network > Interfaces and click the LAN interface (port2) and fix the issue!

The port was disabled to simulate a software failure of the FW…

Double click on the greyed-out interface LAN (port2), or alternatively, select the interface and click on the Edit button.

../_images/lab3-fwint.png

Fig. 69 FW interface#

Scroll down until you see the "Status" button of the interface and finally reactivate it.

Of course, then click on OK.

../_images/lab3-enableint.png

Fig. 70 Reactivate the LAN port#

Relaunch the ping from BU1 Frontend towards BU2 Mobile App, after having reactivated the LAN interface of the firewall.

../_images/lab3-pingworks.png

Fig. 71 Ping is ok!#

Relaunch also the traceroute from BU1 Frontend towards BU2 Mobile App.

../_images/lab3-traceroute2.png

Fig. 72 Ping is ok!#

Important

This time the traceroute outcome shows twice the IP address of the Transit FireNet GW (i.e. .134 as shown in the screenshot above) along the path, due to the fact that the traffic is now diverted towards the Firewall that, after the completion of the Deep Packet Inspection, sends the permitted traffic back to the Transit FireNet GW.