It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure an Elastic Load Balancer for CloudGen Firewalls in AWS

  • Last updated on

The Elastic Load Balancer (ELB) is a managed layer 4 load balancer by AWS. The ELB can be deployed as a public-facing load balancer or internally in your VPC. Instances are added either manually or, if associated with an Auto Scaling group, automatically. The load balancer continuously checks the health of the instances and takes unhealthy instances out of rotation.

AWS Reference Architectures

This article is used in the following AWS reference architectures:

Create an AWS Network Load Balancer

  1. Log into the AWS console.
  2. In the upper right, click on the datacenter location, and select the datacenter you want to deploy to from the list.    
    aws_nlb_01.png 
  3. Expand Services and select EC2.
    aws_nlb_02.png
  4. In the left menu, expand Load Balancing and select Load Balancers.
  5. The Load balancers window opens. Click Create load balancer.
    aws_nlb_03.png 
  6.  Under Network Load Balancer click Create
     aws_nlb_04.png
  7. The   Basic configuration window opens. Enter a unique Load balancer name.
  8. Select a Scheme for your load balancer. For the external load balancer, select Internet-Facing.

  9. Select the VPC the firewalls are deployed to from the list.
  10. In the Mappings section, select one or more availability zones and define subnets for each zone from the Subnet selection menu.
    aws_nlb_05.png
  11. Select one or more Security groups for your load balancer.
    aws_nlb_06.png
    If you wish to create a security group, click create a new security group and define the following settings:
    1. Enter a Security group name.
    2. Click Add rule for each additional security group rule required.
      • Type / Protocol – Select the protocol or type of traffic. E.g., Custom TCP for TCP, or HTTPS for TLS-encrypted web traffic.
      • Port range – Enter the port. E.g., 691 for TINA VPN
      • Source  Select the source of the traffic. For Internet traffic, select Anywhere and enter 0.0.0.0/0.
        aws_nlb_07.png
    3. Click Create security group.
  12. In the Listener and routing section, select TCP, and enter 807 in the Port field. Port 807 is used for Firewall Admin access.

    Ports for listening and health checks must provide the same service. When using port 807 as a listener, do NOT use another port, for example 22 (SSH), as target for health checks!

  13. Click the Create target group link.
    aws_nlb_08.png
  14. The Specify group details window opens. Specify the following settings:
    1. Select IP addresses as target type. (When selecting Instances, you must select instances as targets instead of IP addresses later.)
      aws_nlb_09.png
    2. Enter a Target group name, for example: FWAdmin
    3. From the Protocol : Port list, select TCP 807.

      This port must provide the same service as the listening port. Do NOT select port 22 (SSH) as a target when using port 807 as listener for the network load balancer. 

      aws_nlb_10.png

    4. Select the VPC the firewalls are deployed to from the list.
  15. In the Health checks section, expand Advanced health check settings and configure the following parameters:
    • Health check protocol – select TCP.
    • Health check port – select Override and enter 691. This is the VPN port on the firewall and will be used for probing.
      aws_nlb_11.png
    • Leave the other settings as default.
  16. Click Next.
  17. The Register targets window opens. Specify the following settings:
    • Network – Select the VPC the firewalls are deployed to from the list.
    • Define subnet IP addresses that should be used as probing targets. For example, enter 10.0.0.6 and 10.0.0.8 for a 10.0.0.0/24 network. (If you have selected Instances, select the instances used as targets.)
    • Ports – Enter the port used for probing. In this case, enter 807 for Firewall Admin.
      aws_nlb_12.png
  18. Click Include as pending below to add your targets. IP addresses (or instances) and port are then listed in the lower section with Health status shown as Pending.
    aws_nlb_13.png
  19. Review the targets and click Create target group.

The target group is now is now deployed with the network load balancer and ready for use.

aws_nlb_14.png

When a health check is performed in a HA setup, the active unit is reachable via probing and shown as healthy. As soon as a failover happens and the unit goes down, the secondary unit becomes reachable and shows up as healthy in the Targets list.

aws_nlb_15.png

Create an AWS Classic Load Balancer

If your setup requires a legacy load balancer configuration, for example, when you have an existing application running in an EC2-Classic network, you can create a classic load balancer. The classic load balancer can be deployed as an external or internal load balancer. By enabling cross-zone loadbalancing, the load balancer spreads out the load evenly over multiple availability zones.

  1. Log into the AWS console.
  2. In the upper right, click on the datacenter location, and select the datacenter you want to deploy to from the list.    
    aws_nlb_01.png 
  3. Expand Services and select EC2.
    aws_nlb_02.png
  4. In the left menu, expand Load Balancing and select Load Balancers. The Load balancers window opens.
  5. Click Create load balancer.
    aws_nlb_03.png 
  6.  Expand Classic Load Balancer and click Create
    aws_clb_01.png 
  7.  Enter the Basic configuration settings:
    • Load balancer name – Enter name for the load balancer.
    • Select a Scheme for your load balancer. 

      Internal load balancers are reachable from within the VPC and do not have a public IP address.

    • VPC – Select the VPC the firewalls are deployed to from the list.
    • Select one or more Availability Zones and define subnet for each zone from the Subnet selection menu.
      aws_clb_02.png
  8. in the Security groups section, select one or more security groups for your load balancer, or
    click Create a new security group to create a group:
    1. Enter a Security group name.
    2. Click Add rule for each additional security group rule required.
      • Type / Protocol – Select the protocol or type of traffic. E.g., Custom TCP for TCP, or HTTPS for TLS-encrypted web traffic.
      • Port range – Enter the port. E.g., 691 for TINA VPN
      • Source  Select the source of the traffic. For Internet traffic, select Anywhere and enter 0.0.0.0/0.
        new_sg.png
    3. Click Create security group.
  9. For each load balancer listener, click Add listener and enter:
    • Listener protocol – Select the protocol from the list. Supported protocols: HTTP, HTTPS, TCP, TLS (Secure TCP).
    • Listener port – Enter the external port.
    • Instance protocol – Enter the protocol. In most cases, this is the same protocol as the Load Balancer Protocol. To offload TLS encryption to the ELB, different protocols can be selected (e.g, HTTPS to HTTP).
    • Instance port – Enter the port number of the service on the instance. 
    aws_clb_03.png
  10. Define a Security policy for the load balancer listeners, create a Rule
  11. Configure the Health checks:
    • Ping protocol Select the protocol from the list. When using HTTP/HTTPS, enter a Ping path for the destination
    • Ping port – Enter the port. E.g, 691 for TINA VPN, or 443 for HTTPS
    • Response Timeout  – Enter the number of seconds the probe waits for an answer.
    • Interval – Enter the number of seconds between two probes.
    • Unhealthy threshold Enter the number of failed heath checks for the instance to be considered unhealthy. Unhealthy health checks are taken out of rotation until healthy again.
    • Healthy threshold – Enter the the number of successful heath checks for the instance to be considered healthy.
    aws_clb_04.png 
  12. (optional) If the firewall EC2 instances are already deployed, select the EC2 instances. To add EC2 instances, click Add instances.
  13. Select Enable Cross-Zone Load Balancing  
    aws_clb_05.png 
  14. (optional) Add Key / Value tags to the resource. Click Create Add new tag to add additional tags.
  15. Review your settings and click Create load balancer
    aws_clb_06.png 
  16. Review the settings and click Create load balancer.

The classic load balancer is now deployed and ready for use.

aws_clb_07.png