2.2. Lab Scenario

Two AWS VPCs are connected by an AWS Transit Gateway, which routes traffic between the VPCs. The Application VPC contains a Wordpress application server instance. The Security VPC contains the BIG-IP (SSL Orchestrator) VE and inspection device instances. Users will connect to a Virtual Server on the BIG-IP to access the Wordpress application.

Inbound traffic will flow through one of two Service Chains before being forwarded to the application server. Two L3 inspection devices are configured. Service Chain 1 includes only the first inspection device. Service Chain 2 includes both inspection devices.

Clients connecting from the 10.0.0.0/8 CIDR range will be sent through Service Chain 1. These users are considered 'internal' clients with lower risk, so require less inspection.

../../_images/sslo-l3inbound-internal.png

Clients from all other source networks will be sent through Service Chain 2. These users are considered 'external' (Internet) clients with higher risk, so require more inspection.

../../_images/sslo-l3inbound-all.png

2.3. Target Infrastructure End-State

The Terraform configuration that you will use in this lab module deploys the following:

  • AWS networking resources
  • Wordpress application instance
  • Layer-3 (L3) inspection service instances
  • BIG-IP (F5 SSL Orchestrator) VE instance

SSL Orchestrator Network Diagram

../../_images/labinfo-12.png

The SSL Orchestrator interfaces are configured as follows:

Interface Descriptions
Interface Description
MGMT Dedicated out-of-band management interface
1.1 Connected to the Internet-facing subnet
1.2 Connected to the application-facing subnet
1.3 Connected to L3 Inspection Service #1 - "TO Service" subnet
1.4 Connected to L3 Inspection Service #1 - "FROM Service" subnet
1.5 Connected to L3 Inspection Service #2 - "TO Service" subnet
1.6 Connected to L3 Inspection Service #2 - "FROM Service" subnet

Note

For this lab, the L3 inspection devices are both Snort IDS devices. However, they could be a mix of the following types: Inline L3, HTTP, ICAP, or passive tap devices.

2.3.1. Virtual Lab Infrastructure Details (and Credentials)

The following tables provide device/service network configuration details. Login credentials are also provided for use as directed in the lab exercises.

F5 SSL Orchestrator
BIG-IP Management IP 10.0.1.11 - Associated Public IP address is provided in Terraform outputs
Login

Username: admin

Password: f5Twister!

The root account is disabled.

System DNS 169.254.169.253 (AWS DNS)
SSL Orchestrator Topology

Name: l3inbound

VS Destination: 10.0.2.200:443

SNAT: Automap

Pool member: 192.168.1.200:443

Service Chain 1: SNORT1

Service Chain 2: SNORT1, SNORT2

Security Policy Rule 1: Client subnet 10.0.0.0/8 - Intercept - Service Chain 1

Security Policy Rule 2: Everything - Intercept - Service Chain 2

Windows Jump Host (win2019)
Login

Username: user

Password: user

L3 Service 1 (SNORT1)
Login

Username: ubuntu

Password: f5Twister!

TO Service

Interface: 1.3

IP Address: 10.0.3.21/25

FROM Service

Interface: 1.4

IP Address: 10.0.3.149/25

L3 Service 2 (SNORT2)
Login

Username: ubuntu

Password: f5Twister!

TO Service

Interface: 1.5

IP Address: 10.0.4.21/25

FROM Service

Interface: 1.6

IP Address: 10.0.4.149/25

Warning

Simple passwords were used in this lab environment in order to make it easier for students to access the infrastructure. The jump host in this lab environment is only accessible to you after successfully authenticating to the UDF portal.

If deploying in your own lab, please follow recommended security practices of using strong passwords and restricting network access.