Task 4 - Verify Firewall

GoalEnsure proper traffic flow via FortiGate for North/South and East/West traffic from Application servers
TaskSSH to applications and run ping tests between local and remote servers. Configure FortiGate policies to allow the traffic
Verify task completionWhen complete, you should be able to ping between the application servers in different VPCs as well as ping the Remote Server from Application servers
Info

Prior to starting this section, log into FortiGate 1 and ensure that you turned the remote IPsec tunnel back up.

Verify traffic

  1. The Star topology in GCP NCC ensures that edge spokes can’t talk to one another directly. We set up the FortiGates as Center spokes, the application spokes must now traverse the Fortigate for inter-vpc communication or North/South connectivity to remote sites.

    • Navigate back to the application (peered) project
    • Using the Hambuger menu on the top left of the screen, navigate to Compute Engine > VM instances
    • Open the details for each VM and click on SSH to open SSH-in-browser sessions for both.
    • Start a ping from server 1 to server 2 ping 10.20.0.2 This should fail.
  2. Create Address objects for the subnets containing the two servers.

    • Navigate to Fortigate GUI https://<fortigate1 public ip>:8443 in your browser
    • Navigate to Policy & Objects > Addresses
    • Click Create and add an address for each Central CIDR

    app1 cidr app1 cidr

    app2 cidr app2 cidr

  3. Create a policy allowing the traffic

    • Navigate to Policy & Objects > Firewall Policy
    • Click Create new
    • Configure the policy as below. Anything not visible is left as default value

    East West Pol East West Pol

  4. Verify that ping is working from 1 to server 2

  5. Attempt connectivity to remote site from server 1

    • Start a ping from server 1 to server 2 ping 192.168.100.2 This should fail.
  6. Create a policy allowing the traffic on FortiGate1

    • Navigate to Policy & Objects > Firewall Policy
    • Click Create new
    • Configure the policy as below. Anything not visible is left as default value

    fgt remote fgt remote

  7. Create a policy allowing the traffic on Remote Fortigate

    • Navigate to Policy & Objects > Firewall Policy
    • Click Create new
    • Configure the policy as below. Anything not visible is left as default value

    fgt1 in fgt1 in

  8. Verify connectivity to remote site from server 1

    • Start a ping from server 1 to server 2 ping 192.168.100.2 This should now succeed.

Discussion

In this final hands-on task, we implemented the security policies that govern traffic flow. We started by demonstrating that, by design, all traffic between our application VPCs (East-West) and from our VPCs to the remote network (North-South) was blocked by the FortiGate. We then logged into the FortiGate appliances and created specific, granular firewall policies to explicitly permit this traffic. By successfully pinging between all locations after creating the policies, we have verified that our FortiGates are now acting as the central enforcement point for all traffic, securing our entire hybrid cloud network.

Chapter Summary

This chapter was dedicated to integrating our separate application VPCs into the secure transit hub we built.

  • Task 1: Configure Application VPC Spokes: We initiated the connection by creating VPC spoke proposals from within the application project, pointing them towards our central NCC hub.
  • Task 2: Accept Application Spokes: Acting as the network administrator, we switched back to the networking project and accepted the incoming spoke requests, officially activating the peering between the application VPCs and the hub.
  • Task 3: Verify Routing: We manipulated the VPC routing tables, removing the direct internet gateways and confirming that the application VPCs learned the new default route from the FortiGates, forcing all traffic through them for inspection.
  • Task 4: Verify Firewall: Finally, we configured the firewall policies on our FortiGates to allow the desired East-West and North-South traffic flows, completing the setup of our secure, centralized transit architecture.

You will be prompted for a username. Pick something fun!

🎮 Interactive CTF Challenge

Launch the Capture The Flag challenge in a new window to test your skills!



Opens in a new window for the best experience