Fortinet black logo

Administration Guide

Distributed inter-subnet east-west traffic between AZ Example

Distributed inter-subnet east-west traffic between AZ Example

Scenario objective

Traffic between two availability zones (AZ) in one VPC is inspected by a FortiGate CNF instance.

Before deployment of FortiGate CNF

The traffic in this scenario is east-west between two availability zones (AZ) in the same AWS region. All routes are local routes.

The Before deployment of FortiGate CNF traffic flow is as follows:

  1. Traffic originates from compute resources located in Private Subnet in Availability Zone 1 (10.1.3.0/24).

  2. Traffic goes to compute resources located inPrivate Subnet in Availability Zone 2 (10.1.4.0/24).

Routing tables

The routing tables are defined as follows.

Private Subnet (Availability Zone 1) route table
Destination Target
10.1.0.0/16 Local
Private Subnet (Availability Zone 2) route table
Destination Target
10.1.0.0/16 Local

After deployment of FortiGate CNF

The After deployment of FortiGate CNF topology traffic flow is as follows:

  1. Ttraffic goes from Private Subnet in Availability Zone 1 (10.1.3.0/24) to the GWLBe located in CNF Endpoint Subnet in Availability Zone 1 (10.1.1.0/24).

  2. Traffic is sent to the FortiGate CNF instance for inspection.

  3. FortiGate CNF sends traffic back to the GWLBe.

  4. The GWLBe forwards the traffic to Private Subnet in Availability Zone 2 (10.1.4.0/24).

To deploy the FortiGate CNF instance in this scenario:

  1. In AWS, add a subnet CNF Endpoint Subnet in one of the AZs along with the associated route table.

    Destination Target
    10.1.0.0/16 Local
  2. In FortiGate CNF, deploy a GWLBe to this subnet.

  3. In AWS, add a route to the Private Subnet in Availability Zone 1 route table to route all traffic going to Private Subnet in Availability Zone 2to the GWLBe.

    Destination Target
    10.1.0.0/16 Local

    10.1.4.0/24

    GWLBe

  4. In AWS, add a route to the Private Subnet in Availability Zone 2 route table to route all traffic to Private Subnet in Availability Zone 1 to the GWLBe.

    Destination Target
    10.1.0.0/16 Local

    10.1.3.0/24

    GWLBe

Distributed inter-subnet east-west traffic between AZ Example

Scenario objective

Traffic between two availability zones (AZ) in one VPC is inspected by a FortiGate CNF instance.

Before deployment of FortiGate CNF

The traffic in this scenario is east-west between two availability zones (AZ) in the same AWS region. All routes are local routes.

The Before deployment of FortiGate CNF traffic flow is as follows:

  1. Traffic originates from compute resources located in Private Subnet in Availability Zone 1 (10.1.3.0/24).

  2. Traffic goes to compute resources located inPrivate Subnet in Availability Zone 2 (10.1.4.0/24).

Routing tables

The routing tables are defined as follows.

Private Subnet (Availability Zone 1) route table
Destination Target
10.1.0.0/16 Local
Private Subnet (Availability Zone 2) route table
Destination Target
10.1.0.0/16 Local

After deployment of FortiGate CNF

The After deployment of FortiGate CNF topology traffic flow is as follows:

  1. Ttraffic goes from Private Subnet in Availability Zone 1 (10.1.3.0/24) to the GWLBe located in CNF Endpoint Subnet in Availability Zone 1 (10.1.1.0/24).

  2. Traffic is sent to the FortiGate CNF instance for inspection.

  3. FortiGate CNF sends traffic back to the GWLBe.

  4. The GWLBe forwards the traffic to Private Subnet in Availability Zone 2 (10.1.4.0/24).

To deploy the FortiGate CNF instance in this scenario:

  1. In AWS, add a subnet CNF Endpoint Subnet in one of the AZs along with the associated route table.

    Destination Target
    10.1.0.0/16 Local
  2. In FortiGate CNF, deploy a GWLBe to this subnet.

  3. In AWS, add a route to the Private Subnet in Availability Zone 1 route table to route all traffic going to Private Subnet in Availability Zone 2to the GWLBe.

    Destination Target
    10.1.0.0/16 Local

    10.1.4.0/24

    GWLBe

  4. In AWS, add a route to the Private Subnet in Availability Zone 2 route table to route all traffic to Private Subnet in Availability Zone 1 to the GWLBe.

    Destination Target
    10.1.0.0/16 Local

    10.1.3.0/24

    GWLBe