It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure AWS Route Tables for Firewalls with Multiple Network Interfaces

  • Last updated on

AWS Reference Architectures

This article is used in the following AWS reference architectures:

Before You Begin

Step 1. Create an AWS Route Table

Create an AWS route table for each private subnet.

  1. Log into the AWS console.
  2. Click Services and select VPC.
  3. In the Virtual private cloud section of the left menu, click Route tables.
  4. Click Create route table
    create_rt.png
  5. The Create route table window opens. Configure the route table:
    • Name tag – Enter the name for the route table.
    • VPC – Select the VPC from the list.
    add_rt.png
  6. Click Create route table.

Step 2. Associate the Private Subnet with the Route Table

If the subnet is not explicitly associated with a route table, the main route table for the VPC is used.

  1. Log into the AWS console.
  2. Click Services and select VPC.
  3. In the Virtual Private Cloud section of the left menu, click Route Tables.
  4. Select the route table created in step 1.
  5. In the lower half of the screen, click on the Subnet associations tab.
  6. Click Edit subnet associations.
    rd_ass.png
  7. Select the subnet you want to associate with this route table.
    ass_subnet.png
  8. Click Save associations.

The private subnet is now associated with the route table.

Step 2. Add a Default Route with the Network Interface of the Firewall as the Target

Locate the elastic network interface identifier (eni-12345678) for the network interface in this subnet.

  1. Log into the AWS console.
  2. Click Services and select EC2.
  3. In the Instances section of the left menu, click Instances
    select_inst.png
  4. Select the firewall instance.
  5. Click the Networking tab for the firewall instance.
    net_if.png
  6. Locate the Interface ID and copy the entry.
    if_id.png
  7. In the AWS console, click Services and select VPC.
  8. In the Virtual Private Cloud section of the left menu, click Route tables.
  9. Select the route table created in step 1.
  10. In the lower half of the screen, click on the Routes tab.
  11. Click Edit routes.
    edit_routes.png
  12. The Edit routes window opens. Click Add route.
  13. Configure the route:
    • Destination – Enter 0.0.0.0/0.
    • Target Enter the ID for the firewall network interface located in this subnet.
    add_route_if.png
  14. Click Save changes.

All traffic leaving the VPC from the associated subnet is now sent through the firewall. The status of the route must be Active.

active_rt_eni.png