In part 1 we discussed the architecture for the new IBM Cloud Virtual Fortigate offering. In this second part we will discuss some basic configuration steps needed to take advantage of the routing and firewall capabilities of the vFSA.
Order VSI’s and Configure the vFSA To Route Them
In this example I want to run 2 VSI’s in the same datacenter. Each VSI will be private only and will reside on a distinct subnet and premium VLAN that I have ordered. The goal will be to route and protect traffic to and from both VSI’s with the vFSA and to allow communication between the two VSI’s on the two distinct broadcast domains.
Order the VLANs and Devices
Order the Premium VLANs first. Place orders for a VSI on each of these VLAN’s.
Configure the Firewall Policies
Create policies to allow both ingress and egress traffic between the sub-interfaces and the private transit network (agg0). Note, by default the vFSA firewall policy allows all traffic on the private network so no policies are needed for ingress and egress on agg0 except for the new interfaces we just created.
config firewall policy
edit 4
set srcintf "VLAN_781"
set dstintf "VLAN_794"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
next
edit 5
set srcintf "VLAN_794"
set dstintf "VLAN_781"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
next
edit 6
set srcintf "agg0"
set dstintf "VLAN_781"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
next
edit 7
set srcintf "VLAN_781"
set dstintf "agg0"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
next
edit 8
set srcintf "agg0"
set dstintf "VLAN_794"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
next
edit 9
set srcintf "VLAN_794"
set dstintf "agg0"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
next
end
Try out Ping and SSH Between VSIs
Now that we have configured the vFSA to allow network traffic between these 2 VLANs let’s run some tests. Most accounts are VRF enabled for Classic. Therefore, all private VLANs within the account have network addressability to all other private VLANs. So out-of-the-box these 2 VSI’s can ping each other.
However, to protect these VSI’s we must route the 2 VLANs through the vFSA Gateway.
Let’s run some basic configuration to take advantage of the firewall policy built into the vFSA. We will setup a very simple policy to block ping requests from “VSI781” to “VSI794”. We can take advantage of the pre-defined firewall service named “PING” when we build the policy. Later we will create a custom firewall service for a specific policy.
config firewall policy
edit 10
set name "Block-PING-781-TO-794"
set srcintf "VLAN_781"
set dstintf "VLAN_794"
set srcaddr "VLAN_781 address"
set dstaddr "VLAN_794 address"
set schedule "always"
set service "PING"
set logtraffic all
next
end
The policy is now created, but it’s priority is lower than the base policy we created for these interfaces in the prior exercise so it will not be applied yet.
As we can see “VSI781” is blocked from pinging “VSI794” but we can still ping back to “VSI781” from “VSI794”.