How to Configure Route 53 for F-Series Firewalls in AWS

Similar documents
Overview. AWS networking services including: VPC Extend your network into a virtual private cloud. EIP Elastic IP

NGF0502 AWS Student Slides

How to Add Domains and DNS Records

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

The Bomgar Appliance in the Network

Load Balancing Overview

Securely Access Services Over AWS PrivateLink. January 2019

Barracuda Link Balancer

The Privileged Remote Access Appliance in the Network

The Privileged Access Appliance in the Network

Introduction to Cloud Computing

Writing Assignment #1. A Technical Description for Two Different Audiences. Yuji Shimojo WRTG 393. Instructor: Claudia M. Caruana

AWS Reference Architecture - CloudGen Firewall Auto Scaling Cluster

Training on Amazon AWS Cloud Computing. Course Content

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

ForeScout CounterACT Resiliency Solutions

Device Management Basics

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo

Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager

Load Balancing For Clustered Barracuda CloudGen WAF Instances in the New Microsoft Azure Management Portal

Anti-DDoS. User Guide. Issue 05 Date

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Virtual Private Cloud. User Guide. Issue 03 Date

"Charting the Course... MOC 6435 B Designing a Windows Server 2008 Network Infrastructure Course Summary

Lesson 9: Configuring DNS Records. MOAC : Administering Windows Server 2012

Office and Express Print Release High Availability Setup Guide

High Availability Options

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

LINUX, WINDOWS(MCSE),

Realms and Identity Policies

AWS Course Syllabus. Linux Fundamentals. Installation and Initialization:

Best Practice - Allow Aerohive Access Points Behind a CloudGen Firewall Access to Hive Manager NG

Amazon Virtual Private Cloud. Getting Started Guide

Amazon Web Services Training. Training Topics:

How to Configure Azure Route Tables (UDR) using Azure Portal and ARM

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

SmartDNS. Speed: Through load balancing, FatPipe's SmartDNS speeds up the delivery of inbound traffic.

Introducing the Global Site Selector

Identity Firewall. About the Identity Firewall

Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

SQL Server AlwaysOn setup on ObserveIT environment

ForeScout CounterACT. Controller Plugin. Configuration Guide. Version 1.0

How to Configure a Remote Management Tunnel for an F-Series Firewall

Enroll Now to Take online Course Contact: Demo video By Chandra sir

Page 1 of 7 SUMMARY MORE INFORMATION. Windows 2000 DNS Event Messages 1616 Through Microsoft resource record (RR) problems.

High Availability Deployment

MCSA Windows Server A Success Guide to Prepare- Networking with Windows Server edusum.com

User Identity Sources

McAfee Network Security Platform

Load Balancing Technology White Paper

Immersion Day. Creating an Elastic Load Balancer. September Rev

How to Configure the DNS Server

Managing Caching DNS Server

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

Agha Mohammad Haidari General ICT Manager in Ministry of Communication & IT Cell#

Deploy Webex Video Mesh

Pexip Infinity and Amazon Web Services Deployment Guide

ForeScout CounterACT. Configuration Guide. Version 1.2

Pexip Infinity and Amazon Web Services Deployment Guide

vrealize Orchestrator Load Balancing

What s in Installing and Configuring Windows Server 2012 (70-410):

Load Balancing FreePBX / Asterisk in AWS

Junos Security (JSEC)

How to Deploy the Barracuda NG Firewall in an Amazon Virtual Private Cloud

Device Management Basics

Elastic Load Balancing

MCSA: Windows Server MCSA 2016 Windows 2016 Server 2016 MCSA 2016 MCSA : Installation, Storage, and Compute with Windows Server 2016

Cloud Computing /AWS Course Content

AWS Solution Architecture Patterns

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

Correct Answer: C. Correct Answer: B

BIG-IP DNS: Implementations. Version 12.0

Amazon Route 53. Developer Guide API Version

Designing Windows Server 2008 Network and Applications Infrastructure

How to host and manage enterprise customers on AWS: TOYOTA, Nippon Television, UNIQLO use cases

Pulse Secure Desktop Client

Advanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD.

Manage Your DNS In The Cloud Get Started With Route 53

Course No. MCSA Days Instructor-led, Hands-on

How can you implement this through a script that a scheduling daemon runs daily on the application servers?

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

McAfee Network Security Platform 9.1

Network Security Platform 8.1

Configuring and Using Dynamic DNS in SmartCenter

Introducing the Global Site Selector

SEVENMENTOR TRAINING PVT.LTD. MCSA Server 2016 Syllabus

Device Management Basics

Amazon Route 53. API Reference API Version

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

ForeScout CounterACT. Configuration Guide. Version 1.2

How to Configure a High Availability Cluster in Azure via Web Portal and ASM

Domain Name System - Advanced Computer Networks

Infoblox Authenticated DHCP

DNS Management with Blue Cat Networks at PSU

Amazon Web Services (AWS) Training Course Content

Transcription:

How to Configure Route 53 for F-Series Firewalls in AWS If you are running multiple stacks in different AWS regions, or multiple deployments in a single region, you must configure AWS Route 53 to access your services behind the NextGen Firewalls. Also use Route 53 if you are using UDP-based services since the Elastic Load Balancer supports only TCP connections. To always route traffic to the active firewall in the HA cluster, define two record sets with a failover policy. The record set for the first firewall is combined with a health check. As long as the health check is valid, the DNS name for the firewall is resolved to the primary firewall. When the virtual server fails over to the secondary firewall, the health check for the primary firewall fails, and after the TTL of the DNS record has expired, the DNS name for the firewall cluster resolves to the IP address in the secondary record set. When the primary firewall is active again, the health check will again show a healthy state and the DNS record will point to the IP address of the primary firewall. Alternative If you are not using Elastic IP addresses for your firewalls, you can also use the DNS name of the firewall for the health check and create a CNAME DNS record. Before you begin Set up a domain or subdomain in Route 53 and create a public hosted zone. Deploy a high availability cluster. For more information, see How to Configure a High Availability Cluster in AWS using the Web Portal. Look up the DNS names, and public or Elastic IP address for the primary and secondary firewalls. Step 1. Create a Route 53 heath check for the primary firewall Configure the health check for a service running on the virtual server, such as the VPN service. Do not create a check for box-level services because these services will not fail over to the secondary firewall. 1. Log into the AWS console. 2. Click Services and select Route 53. 3. In the left menu, click Health checks. 4. Click Create health check. 1 / 7

5. 6. Enter a Name. From the What to monitor list select Endpoint. 7. Configure the service to be monitored: Specify and endpoint by Select IP address. Protocol Select TCP. IP address Enter the public IP address for the primary firewall. Port Enter 691 to monitor the VPN service. The VPN service must be running on your virtual server. Alternatively, you can also select another port on your firewall. 8. (optional) Expand the Advanced configuration section and adjust the following settings to improve failover times: Request interval Select Fast (10 seconds). Failure threshold Select 2. 9. Click Next. 10. (optional) Set Create alarm to yes and select an Existing SNS topic or create a New SNS topic to 2 / 7

receive a notification. 11. Click Create health check. The health check is now active. Depending on the request interval and failover threshold, the Status of the health check changes from Unknown to Healthy. Step 2. Create a failover record set for the primary firewall Create the DNS record for the primary firewall. Use a failover routing policy and add the health check you just created as a condition. 1. 2. 3. 4. Log into the AWS console. Click Services and select Route 53. In the left menu, click Hosted zones. Select your Domain Name and click Go to Record Sets. 5. Click Create Record Set. 6. In the right column, create the record set: Name Enter the DNS name. Type Select A - IPv4 address. Alias Select No. TTL (Seconds) Set the number of seconds the DNS records can be cached by non-authoritative DNS servers. Value Enter the EIP or public IP address for the primary firewall. 3 / 7

7. In the right column, configure the Routing Policy: Routing Policy Select Failover. Failover Record Type Select Primary. Set ID Enter a unique ID to differentiate from other failover record sets using the same name and type. 8. In the right column, configure the Health Check: Associate with Heath Check Select yes. Health Check to Associate Select the health check created in step 1. 9. Click Create. The record set for the primary firewall is now listed with the other DNS records of this hosted zone. Step 3. Create a failover record set for the secondary firewall Create the DNS record for the secondary firewall. Use a failover routing policy. 1. Log into the AWS console. 2. Click Services and select Route 53. 3. In the left menu, click Hosted zones. 4. Select your Domain Name and click Go to Record Sets. 4 / 7

5. Click Create Record Set. 6. In the right column, create the record set: Name Enter the DNS name you used for the primary firewall. Type Select A - IPv4 address. Alias Select No. TTL (Seconds) Set the number of seconds the DNS records can be cached by non-authoritative DNS servers. Value Enter the EIP or public IP address for the secondary firewall. 7. In the right column, configure the Routing Policy: Routing Policy Select Failover. Failover Record Type Select Secondary. Set ID Enter a unique ID to differentiate from other failover record sets using the same name and type. 8. In the right column, configure the Health Check: 5 / 7

9. Associate with Heath Check Select No. Click Create. Both record sets for the primary and secondary firewalls are now listed in the hosted zone. 6 / 7

Figures 7 / 7