- 9
- 75 577
Tendai Musonza
เข้าร่วมเมื่อ 4 ต.ค. 2011
Terraform Code Auto Generation on import
How to Generate terraform code for manually created resources
Apologies for the background noise , major construction going on in the area
Apologies for the background noise , major construction going on in the area
มุมมอง: 326
วีดีโอ
Gateway Load balancer Terraform Implementation
มุมมอง 1.4K2 ปีที่แล้ว
Implement Central Security VPC powered by AWS Gateway Load Balancer with Terraform Code repo; github.com/tendai-lino/training Related information on transit gateway appliance mode : docs.aws.amazon.com/vpc/latest/tgw/transit-gateway-appliance-scenario.html#transit-gateway-appliance-support
AWS Gateway Loadbalancer East West inspection with Fortigate Firewall
มุมมอง 11K3 ปีที่แล้ว
AWS Gateway Loadbalancer East West inspection using Fortigate Firewall and Transit gateway hands on demo This is a step by step configuration of the following components: 1. Fortigate firewall to represent any virtual appliance of your choice behind a gateway loadbalancer b) Enabling Geneve on the fortigate appliance 2. AWS Gateway loadbalancer and service endpoint setup 3. Transit gateway atta...
AWS vpc and vpn automation with Terraform
มุมมอง 3.2K3 ปีที่แล้ว
AWS deployment automation with terraform This is a Terraform demo on how to deploy a new VPC plus AWS VPN. The aim is to show the beauty of infrastructure as code. view code used in demo below: resource "aws_vpc" "teravpc" { cidr_block = "10.0.0.0/16" tags = { Name = "Terraform_vpc" } } resource "aws_route_table" "tera-route" { vpc_id = aws_vpc.teravpc.id tags = { Name = "terraform-route-table"...
AWS BGP VPN to ASA (CiscoASAv)
มุมมอง 8K4 ปีที่แล้ว
Step by Step Simplified demo on how to configure an AWS BGP VPN to Cisco ASA firewall /ASAv. Routes between your VPC and on-premise network are exchanged via BGP which is the recommended way for more granular control of your VPN tunnels as far as path manipulation is concerned.
AWS Site to Site VPN with Checkpoint Firewall
มุมมอง 17K4 ปีที่แล้ว
Hands on demo on how to configure a VPN between AWS and Checkpoint firewall clearly showing configurations done on AWS end and also on-premise firewall then running test traffic across the tunnel.
checkpoint firewall in aws
มุมมอง 7K4 ปีที่แล้ว
This introductory Video demonstrates manual deployment of Checkpoint Firewall in AWS and provide an understanding of using AWS ingress routing concept with Third-party firewalls. The video does not show use of automation tools like cloud formation as that the helps you do labs at a lower cost since with manual setup you only deploy the components that you require to learn and test saving you co...
AWS Network firewall
มุมมอง 24K4 ปีที่แล้ว
This is practical introductory demo on how to setup the newly launched AWS Network firewall. The video shows how to configure ingress routing to force traffic from the IGW to the network firewall and also routing back from the protected subnet to the firewall endpoint after the firewall launch is completed. A simple IP rule is added to the firewall to test functionality
aws client vpn made easy
มุมมอง 4K4 ปีที่แล้ว
This Tutorial simplifies AWS client VPN creation by use of my a custom script freely available for you from my github repository . git clone github.com/tendai-lino/easyrsa-automation.git The script removes about 9 steps which you need to do manually when normally setting up your easyrsa pki environment and simplifies certificate uploads to to AWS ACM before you setup your AWS client VPN end poi...
when you doing Edge associations that mena you are by passing firewall , what is the actual work of IGW-RTB route table
Awesome video
Terrible accent makes video unwatchable!
Awesome, thank you so much for making this video. Please make more videos.
Thank you, I will
This is great!!! If you get some free time, can you please teach how to create BGP over IPSEC in VSX with R81.10 ?
Perfect ! Thanks for a great video Tendai . Thumbs up !!
Thank you , that motivates me to keep sharing
You have great potential in teaching, Tendai . It would be great if you made a video about VPN setup between Checkpoint on aws and check point on-prem .
Thank you for the motivating words ,much appreciated
@@tendaimusonza9547 He's right :) You do a great job!
So what is the reason why do we cant saw the log in the smart console . I had the similar issues , and cant resolve =))
Dear Tendai , One more question is if we have VM bastions in the Public subnet area, how can we let them go outside or inside the private subnet by passing through the check point firewall. Is there any way we can do that?
excellent desciption about Firewall Endpoint. Thank you Sir
Glad it was helpful!
Excellent video. Do you have the other video for Checkpoint in a cluster?
Really an informative one buddy. Thanks a lot
Thanks you help me a lot
Glad to hear , thank you for the feedback.
Still a GOAT!!
Awsome video 👏👏 Thank you so much for vreating such video
Can you help me understand the same for the check point configured in high availability
Clear and well explained...luving this
Excellent Video My Leader 😇 Thanks for sharing.
Thank you Devon
how does this change for subnet that is connected to nat-gateway and followed by internet gateway ?
man!!! Thank you soooo much!!! your time and effort to teach us this is truly appreciated.
The resolution sucks as does your third world nigger asshole accent.
Hi, need advise, I have configured VPN as described, tunnel is UP, I see traffic towards AWS in logs as encrypted but still cant access AWS server? What cloud be the problem? Any idea?
Hello ,do you have the route back towards VGW in AWS for VPN traffic ,also did you add the static route on the actual vpn tunnel back to checkpoint , also take note if the server you are testing with is windows only test with RDP since windows firewall drops the other protocols . you can also add flow logs to confirm traffic in AWS and let me know what you see . you can also test traffic in the opposite direction and see if there any decrypts as another of verifying route back to checkpoint form AWS
@@tendaimusonza9547 Hi, we dont have access to AWS site, AWS is build by 3rd party. From checkpoint we have static route towards Azure routed via tunnel interface. I can ask if they see traffic in AWS, not sure if I can do something more on checkpoint. Just wanted to by 100% sure that traffic is leaving checkpoint FW, all I see is logs that traffic towards Azure is hitting VPN community with description Encrypted in community AWS-xxxxx. We testing only HTTPS traffic.
On 7:08, you mentioned about the auto-created GatewayLoadBalancer Endpoint, however on my end, it isn't auto created and I can't seem to be able to create the Endpoint as I am unsure what Service Name to select. I have 2 VPCs, in one - it auto-created, in another one - it didn't auto-create. Not too sure why. The only thing that was auto-created is the Gateway Endpoint with service name '.....s3'.
Hello ,Thanks for reaching out to me . Please note that the AWS Network Firewall is powered by the AWS Gateway loadBalancer behind the scene and its not you who set this endpoints up but AWS process does it for you since this is a managed service. after you create the AWS Network firewall you go search under endpoints and should see a gateway loadbalancer endpoints whose ID's you can use as next hop for your routing .adding the next hop use using the ENI or endpoint ID has the same effect .You do not need to create an endpoints as you mentioned ,all you do is to provision the firewall and that will do endpoints for you.
@@tendaimusonza9547 Stupid me! Now the Endpoint popped up after I created the firewall. The order of setting up I did for my other VPC was wrong; Subnet/RTB > Firewall instead of Firewall > Subnet/RTB. Tysm for the clarification nonetheless.
@user-ie9nb5nt6b Glad you are sorted ,thanks for the feedback
@@tendaimusonza9547 Also, an additional question - I am used to Cisco Firewall stateful way of listing permitted ports/traffic on the top and just ending it with deny tcp any any to ensure other than eg. 5 permitted ports/traffic allowed, the others will be denied. However in AWS case for Stateful rules, the rule groups get rather confusing as first, only 3 rules are allowed in each group and secondly I then have to group the ports accordingly. So in each group, do I have to put tcp deny any any? And in my case the only egress and ingress traffic I am allowing is only email-related ports (25, 465, 587) and internet access to websites. No SSH,RDP, FTP, etc. allowed in or out as only my email server resides in public subnet. Other than these, the other communications are between EC2s in the private subnets (other than needing to go internet via NAT Gateway), communications to Managed AD and SSM which I don't think is required to be put in Network Firewall as its internal communications. How would you then suggest I implement my rules/rule groups? Sorry for the very long question. Tried to read AWS documentations, but it ain't that helpful to me. Appreciate any help you can give. Thank you.
Nice video
Thanks mdhara
its only a pleasure , you are welcome Robson
Hi, This is Pure GOLD!! Can you please post an video on Checkpoint Cluster especially with the application being on different VPC/subnet. This will help in gaining an better understanding of the routing/next-hop and so on.. Thanks for the great stuff.
Hello, one question - So does it mean that if I have an Existing VPC with 2 Public & 2 Private Subnets, IGW, NatGW, and have EC2s already setup on these private subnets, I'll have setup everything back from scratch due to the Firewall Subnets?
Hi Yoominbi ,thanks for reaching out ,my suggestion is that if you do not have available subnet ranges for these extra ones required you can extend your VPC with a secondary CIDR rather than destroying your setup , checkout this link aws.amazon.com/about-aws/whats-new/2017/08/amazon-virtual-private-cloud-vpc-now-allows-customers-to-expand-their-existing-vpcs/ . hope you will find this handy.
@@tendaimusonza9547 Thanks for the prompt reply! So if I have available subnets that can be used (as current VPC only using 10.x.x.x subnet), I do not need to destroy my current setup? Then how do you suggest I proceed - Create a new Firewall subnet, change the RTB to point existing IGW to Firewall Subnet, etc. ? (ie. play around with RTB)
@@yoominbi exactly that should work
excellent video, many thanks for sharing with us. one thing which is bugging me is route-table entry for "GWLB-Subnet", why we have to provide two transit gateway entry for both spoke vpc? is it really required for E-W traffic.
I provided the TGW as the next hop for both Spoke CIDRS since it is the TGW which knows route back for both spokes in this centralized config ,thank you for your comment , hope i managed to answer your question
Greetings excellent overview thank you.. I'm building a proof of concept 3 Pairs of Fortigate Firewalls in HA mode Active/Active, across 3 Availability Zones, with AWS load balance, Transit Gateway, FortiManager for centralised management and a FortiAnalyzer as part of the SIEM. (APP VPC, SEC VPC, TRANS VPC)
Great video! I love your voice!
Can i get the documents ,how you have configured all the vpc and subnet ..etc etc
Hi Rohit , if you have worked with Terraform you may find my configs here useful for VPC and subnet config , github.com/tendai-lino/training/tree/main/GWLB-DEMO ,i used this kind of setup in th-cam.com/video/2g59ihFy5HU/w-d-xo.html , Let me know if you require any further assistance
Just try to elaborate everything properly… Now I know why you have less subscribers. Lol
i can assist if you have a specific questions , Kindly note that i only share info here and there voluntarily and not a full time youtuber. its just to help people for free and not for a fee . feedback much appreciated
Did you deployed Fortigate on aws with HA active active in multi AZ environment? if yes can you help by a guide or video?
Hello Abdo , you do not need forti HA when using the gateway loadbalancer , the GWLB is doing HA for you in a way and you need to make sure the security VPC attachment is in appliance mode to avoid asymmetrical routing . See link : docs.aws.amazon.com/vpc/latest/tgw/transit-gateway-appliance-scenario.html . with a GWLB your Fortis can be in multiple AZ however use fortimanager to make sure your rules are in sync than adding rules manually on each device .hope i answered your question.
@@tendaimusonza9547 thanks for your reply I will try to make it using TG as I'm trying with GWLB and one fortigate only for now.
Thank you so much. This will help a lot.
Hello Sir, How could I renew Cerificate will expire pretty soon how could I renew without having to create new CRT or key for users
Hello Bernard ,unfortunately there is no other way that i am aware of except recreating new CRT and key , hopefully you still have your CA server intact
Please do more videos , very nice..
will owner the request ,thank you for the support . glad you liked the material
Hi Tendai how about Cloudguard VPN S2S to other firewall is it same setup as AWS VPN FW and will i still able to download the configuration file on my AWS dashboard to provide to remote site?
Hi Lee ,Thanks for reaching out. Plz note that VPN config download for sharing with remote site is only an AWS feature ,as for Cloudguard to other VPN device you will need to agree and share common parameters .Let me know if I have answered your question
I searched whole internet but couldn't find a proper video explaining the GWLB in detail and how to use it with Appliances. This video is far most the best today and thank you for the help
Glad to hear the material is helpful ,thank you for your support.
Ho we can create 100 VPN tunnels at once (which include onprem and AWS) for DR activities?? thanks this video is explaining nicely keep doing more please.
Thank you for the kind words ,I am encouraged if the content is helpful ,as for creating multiple resources with terraform you may use functions like for_each .I saw some good material on this link and hopefully it can be of help: developer.hashicorp.com/terraform/tutorials/configuration-language/for-each
Hi Tendai 1:01 how can i make my Checkpoint firewall to have this public ip ?
This checkpoint firewall is behind a NAT device and the public IP you see is NAT IP of the firewall hence does not show up on interface ip settings ,thanks for checking. l see you observed clearly .when you provision a checkpoint in aws assigning an Elastic IP to it is the same as putting a NAT device in front and that's effectively configuring a NAT address to it to be used as a public IP. let me know if l have managed to answer you clearly.
@@tendaimusonza9547 Can i still able to create tunnel between Remote site to AWS . I have public reachable ip address on remote site but my firewalls not NAT for this public ip address.
Hi tendai i would like to appreciate your work! I subscribe to your channel!
thanks, much appreciated
Very nice step by step walk through.. keep it up. Any idea on how the set up will look like if we have muti AZ Fortigate HA deployment.. I have issues with LB and endpoints when i have multi AZ and the application VPC are in different VPC, it creates issue.. I am checking further on the set up but with Primary works but failover doesn't.
Thank you Hitesh ,I am not sure if HA will work in conjunction with a GWLB since the health checks have no visibility to HA status since works only by probing tcp port ,I have used HA in a central security VPC using partly the steps in on fortinet link although this link is just for general HA setup not specific for central security VPC ;docs.fortinet.com/document/fortigate-public-cloud/7.2.0/aws-administration-guide/229470/deploying-fortigate-vm-active-passive-ha-aws-between-multiple-zones .I used with a transit gateway .hope you will find this helpful
Hi, Just wondering if multicast traffic work in this setup, with transit gateway inplace of VPN gateway ? Will it work ?
Hello Shravan, l bumped into an article which points out the the tgw supports multicast although l have never tried it to confirm, aws.amazon.com/blogs/networking-and-content-delivery/integrating-external-multicast-services-with-aws/#:~:text=In%202019%2C%20AWS%20announced%20multicast,multicast%20applications%20in%20the%20cloud.
I am new to AWS VPC..can you make a video on what AWS services offer as network and security services and is there any free or trial lab on AWS cloud to test it
Thank you for the feedback ,that will help me in balancing content on my future videos .you may also open an aws free tier account for learning however exercise caution on usage since not everythung is free however aws documentation clearly states how you can stay within free tier
thank you very much for the video, I was able to get it working without much of an issue
Glad to hear ,Thanks
I am beginner to ASA. I googled but no luck. I am facing this error: ciscoasa(config)# crypto ikev1 enable outside ^ ERROR: % Invalid input detected at '^' marker. ciscoasa(config)# Can you help me please? Thanks a lot!
Always here for the rescue,, thanks a million boss!!!!
this same logic applied for North South traffic flow right?
That's correct its the same logic only that for north south you introduce ingress routing for the internet gateway
@@tendaimusonza9547 thanks sir, keep going with great content, greetings
@@carlosemanuelbonilla904 ,thanks for the support ,much appreciated
how can we get fortiguar update in this scenario? port1 i have created geneve for data traffic so how i can communicate with fortiguard for update?? can u help?
Hi Zeeshan ,that's a valid point ,to get updates you have to change the routing ,instead of using default route to geneve use specific routes for VPCs cidrs and then default traffic to a different port with route to internet .i used 0.0.0.0/0 just for quick demo
Amazing explanation with live troubleshooting. Very clear and to the point. Thank you so much!
it's a pleasure, thanks
you always got me boss,,, thanks from my heart
I feel humbled ,thank you
this is neat,,, thanks boss