Skip to content

Self-service sandbox demo for an AWS NAT to Aviatrix Secure Egress migration

License

Notifications You must be signed in to change notification settings

AviatrixSystems/aviatrix-nat-to-egress-demo

Repository files navigation

AWS NAT to Aviatrix Secure Egress Gateway Demo

Description

This terraform repository serves as the infrastructure as code (IaC) for a demonstration on how to implement Cloud Perimeter Security by migrating from an AWS NAT Gateway to an Aviatrix Secure Egress Gateway without incurring network downtime.

Diagram

Initial topology: Topology

Prerequisites

A deployed and configured Aviatrix Controller (v7.1+) and CoPilot

Compatibility

Terraform version Controller version Aviatrix terraform provider version
>= 1.5.0 >= 7.1 ~>3.1.0

Steps

  1. The first terraform apply deploys:

    • A vpc with 1 public and 1 private subnet.
    • An AWS NAT gateway.
    • An Aviatrix Secure Egress gateway.
    • A test instance in the private subnet that is generating traffic to the Internet via the NAT gateway.
  2. After setting the local variable avx_egress from false to true, the second terraform apply:

    • Instructs the Aviatrix controller to remove the 0.0.0.0/0 route on the private subnet that points to the AWS NAT and add a 0.0.0.0/0 route to the Aviatrix Secure Egress Gateway.
    • Using CoPilot you now have visibility into the Internet-bound traffic flows traversing the Aviatrix egress gateway. Navigate to Security-->Egress-->Monitor and select the avx-egress VPC to view the logs.
    • The same as with AWS NAT gateway, all access to the Internet is being allowed. Topology
  3. After setting the local variable aws_nat from true to false, the third terraform apply:

    • Removes the aws nat gateway and its eip.
  4. After updating the local variable avx_security_enforce, from false to true the fourth terraform apply:

    • Creates a set of rules to block all Internet traffic, except that which is explicitly allowed.
    • Using CoPilot you now have visibility into the Internet-bound traffic flows being Permitted or Denied access to the Internet. Navigate to Security-->Distributed Cloud Firewall-->Rules to review the rules applied.

Demo

A video of this demo can be seen on youtube

** Note: This demo video was performed with Aviatrix's previous-gen Egress FQDN offering. The code in this repository implements Cloud Perimeter Security via an Aviatrix Secure Egress gateway.

Conclusion

In just the above few steps a VPC's Internet traffic can be discovered and secured using an Aviatrix Secure Egress Gateway without any network downtime.

About

Self-service sandbox demo for an AWS NAT to Aviatrix Secure Egress migration

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published