Adam Divall

Walkthrough Guides and Other Useful Information on AWS

AWS Landing Zone Accelerator - Part 4: Networking

2025-02-13 16 min read Walkthroughs Adam Divall

Welcome back to my deep dive into the AWS Landing Zone Accelerator (LZA)!

We’ve made some good progress. In Part 1, we introduced the LZA and its benefits for building a well-managed AWS environment. Part 2 walked through setting up your AWS Organisation and creating new accounts. Then, in Part 3, we explored the LZA’s global settings, which allow for standardised configurations across your entire AWS organisation, ensuring consistency and simplified management.

Now, I’m going to shift our focus to a critical aspect of any AWS environment: networking. This part of the series will delve into the network configurations provided by the LZA, exploring how it helps you establish a secure, scalable, and well-structured network foundation for your AWS workloads.

IP Address Management (IPAM)

IP Address Management (IPAM) is the administration of IP address space. It encompasses the planning, tracking, and management of the IP addresses used in a network. In essence, it’s about knowing which IP addresses are available, which are assigned to which devices, and ensuring that IP addresses are used efficiently and without conflicts. IPAM is crucial because it prevents IP address overlaps, simplifies network troubleshooting, improves security by identifying unauthorised devices, and enables better capacity planning for future network growth. Without IPAM, managing IP addresses becomes a complex and error-prone manual process, especially in large and dynamic environments like cloud deployments.

Update the LZA configuration:

  • Open the network-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the ipams section and make sure it looks something like this:
centralNetworkServices:
  delegatedAdminAccount: Network
    ipams:
      - name: Organization-IPAM
        region: eu-west-1
        description: Enterprise IPAM for managing IP address space
        operatingRegions:
        - eu-west-1
        scopes: []
        pools:
      - name: Top-Level-Pool
        description: Top level pool for the organization
        provisionedCidrs:
          - '{{top-level-cidr}}'
      - name: eu-west-1-pool
        description: Regional pool for eu-west-1
        sourceIpamPool: Top-Level-Pool
        locale: eu-west-1
        provisionedCidrs:
          - "{{eu-west-1-pool}}"
      - name: Development-eu-west-1
        description: Pool for Development Environments in eu-west-1
        sourceIpamPool: eu-west-1-pool
        locale: eu-west-1
        autoImport: true
        shareTargets:
          organizationalUnits:
            - Infrastructure
            - Non-Production
        provisionedCidrs:
          - "{{dev-eu-west-1-pool}}"
        allocationResourceTags:
          - key: SDLC
            value: Dev
      - name: Test-eu-west-1
        description: Pool for Test Environments in eu-west-1
        sourceIpamPool: eu-west-1-pool
        locale: eu-west-1
        autoImport: true
        shareTargets:
          organizationalUnits:
            - Infrastructure
            - Non-Production
        provisionedCidrs:
          - "{{test-eu-west-1-pool}}"
        allocationResourceTags:
          - key: SDLC
            value: Test
      - name: Pre-Production-eu-west-1
        description: Pool for Pre-Production Environments in eu-west-1
        sourceIpamPool: eu-west-1-pool
        locale: eu-west-1
        autoImport: true
        shareTargets:
          organizationalUnits:
            - Infrastructure
            - Non-Production
        provisionedCidrs:
          - "{{pre-prod-eu-west-1-pool}}"
        allocationResourceTags:
          - key: SDLC
            value: Pre-Prod
      - name: Production-eu-west-1
        description: Pool for Production Environments in eu-west-1
        sourceIpamPool: eu-west-1-pool
        locale: eu-west-1
        autoImport: true
        shareTargets:
        organizationalUnits:
          - Infrastructure
          - Production
        provisionedCidrs:
          - "{{prod-eu-west-1-pool}}"
        allocationResourceTags:
          - key: SDLC
            value: Prod
  • Open the replacements-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the following section and make sure it looks something like this:
  # Home Network CIDR
  - key: top-level-cidr
    type: String
    value: 10.0.0.0/8
  # IPAM Pools - eu-west-1
  - key: eu-west-1-pool
    type: String
    value: 10.0.0.0/12
  # Sub Pools
  - key: dev-eu-west-1-pool
    type: String
    value: 10.0.0.0/14
  - key: test-eu-west-1-pool
    type: String
    value: 10.4.0.0/14
  - key: pre-prod-eu-west-1-pool
    type: String
    value: 10.8.0.0/14
  - key: prod-eu-west-1-pool
    type: String
    value: 10.12.0.0/14

This configuration sets up AWS IPAM to manage IP addresses in your LZA. It creates a hierarchy of IP pools: a top-level pool for the whole organization, a regional pool for eu-west-1, and separate pools for development, test, pre-production, and production environments within that region. This allows IPAM to automatically assign addresses from the correct pool based on the environment, preventing conflicts and ensuring efficient IP usage.

The IPAM configuration leverages the replacements-config.yaml file to define variables for the CIDR blocks of each pool (e.g., top-level-cidr, eu-west-1-pool, dev-eu-west-1-pool). This keeps your configuration organized and allows you to easily manage these values in a central location.

Save your changes:

  • Use these commands to save your changes and update the LZA configuration:
git add .
git commit -m "Updating the IPAM Configuration"
git push

Transit Gateway

A Transit Gateway is a network hub that connects your Amazon Virtual Private Clouds (VPCs) and on-premises networks. It simplifies network management, improves scalability, and centralises control over your cloud network traffic.

Benefits of Transit Gateway:

  • Simplified Network Architecture: Connect everything to the Transit Gateway, eliminating complex peering relationships.
  • Scalability: Easily add or remove connections without disrupting the network.
  • Centralised Management: Provides a single point of control for managing network traffic.
  • Improved Security: Enhances security by consolidating connections and enabling consistent security measures.
  • Cost Optimisation: Optimises network traffic flow and reduces the need for complex configurations.

Update the LZA configuration:

  • Open the network-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the transitGateways section and make sure it looks something like this:
transitGateways:
  - name: Network-eu-west-1-TGW
    description: Transit Gateway in eu-west-1
    account: Network
    region: eu-west-1
    shareTargets:
      organizationalUnits:
        - Root
    asn: 64512
    dnsSupport: enable
    vpnEcmpSupport: enable
    defaultRouteTableAssociation: disable
    defaultRouteTablePropagation: disable
    autoAcceptSharingAttachments: enable
    routeTables:
      - name: Network-External-eu-west-1
        routes: []
      - name: Network-Shared-Services-eu-west-1
        routes: []
      - name: Network-Shared-Services-eu-west-1-Inspection
        routes: []
      - name: Network-Dev-eu-west-1
        routes: []
      - name: Network-Dev-eu-west-1-Inspection
        routes:
          - destinationCidrBlock: 0.0.0.0/0
            attachment:
              account: Network
              vpcName: Network-Dev-eu-west-1-Inspection-VPC
      - name: Network-Test-eu-west-1
        routes: []
      - name: Network-Test-eu-west-1-Inspection
        routes:
          - destinationCidrBlock: 0.0.0.0/0
            attachment:
              account: Network
              vpcName: Network-Test-eu-west-1-Inspection-VPC
      - name: Network-Pre-Prod-eu-west-1
        routes: []
      - name: Network-Pre-Prod-eu-west-1-Inspection
        routes:
          - destinationCidrBlock: 0.0.0.0/0
            attachment:
              account: Network
              vpcName: Network-Pre-Prod-eu-west-1-Inspection-VPC
      - name: Network-Prod-eu-west-1
        routes: []
      - name: Network-Prod-eu-west-1-Inspection
        routes:
          - destinationCidrBlock: 0.0.0.0/0
            attachment:
              account: Network
              vpcName: Network-Prod-eu-west-1-Inspection-VPC

This configuration defines a Transit Gateway in the eu-west-1 region, deployed within an AWS Landing Zone Accelerator (LZA) framework. Residing in the Network account and shared across the organisation, the Transit Gateway supports DNS and VPN ECMP. It uses separate route tables for Dev, Test, and Prod environments, plus dedicated inspection route tables that enforce security by routing all traffic through inspection VPCs. Environment-specific route tables are currently empty, relying on route propagation from connected VPCs.

Save your changes:

  • Use these commands to save your changes and update the LZA configuration:
git add .
git commit -m "Updating the Transit Gateway Configuration"
git push

Network Orchestrator for Transit Gateway

Network Orchestrator for Transit Gateway simplifies the management and automation of complex network configurations involving Transit Gateways. It acts as a central control plane, allowing you to define, deploy, and manage network connectivity across multiple AWS accounts, regions, and on-premises environments.

Benefits of Network Orchestrator:

  • Automation: Automates network configuration tasks, reducing errors and speeding up deployments.
  • Centralised Management: Provides a single pane of glass for managing your entire Transit Gateway network.
  • Consistency: Ensures consistency across your network by defining configurations as code.
  • Scalability: Enables easy network scaling by automating provisioning and configuration of new connections.
  • Improved Agility: Respond to changing needs quickly with automation and centralised management.

Update the LZA configuration:

  • Open the customizations-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the transitGateways section and make sure it looks something like this:
customizations:
  cloudFormationStacks:
    - name: STNOOrganizationRole
      description: Deploy Network Orchestrator (STNO) Organization IAM Role
      deploymentTargets:
        accounts:
          - Management
      regions:
        - eu-west-1
      template: custom-config-templates/network-orchestration-organization-role.yaml
      runOrder: 2
      terminationProtection: true
      parameters:
        - name: HubAccount
          value: "{{account Network}}"
    - name: STNOHubEUWest1
      description: Deploy Network Orchestrator (STNO) Hub Config for eu-west-1
      deploymentTargets:
        accounts:
          - Network
      regions:
        - eu-west-1
      template: custom-config-templates/network-orchestration-hub.yaml
      runOrder: 4
      terminationProtection: true
      parameters:
        - name: DeployWebUi
          value: "No"
        - name: AllowExternalPrincipals
          value: "No"
        - name: ExistingTransitGatewayId
          value: "{{resolve:ssm:/accelerator/network/transitGateways/Network-Prod-eu-west-1-TGW/id}}"
        - name: OrganizationManagementAccountRoleArn
          value: arn:aws:iam::{{account Management}}:role/STNO-Organization-Information-Role-eu-west-1
        - name: Principals
          value: arn:aws:organizations::{{account Management}}:organization/{{sra-organization-id}}
        - name: RegisterTransitGateway
          value: "Yes"
    - name: STNOSpokeAccounts
      description: Deploy Network Orchestrator (STNO) Spoke Config
      deploymentTargets:
        organizationalUnits:
          - Root
        excludedAccounts:
          - Management
          - Network
          - LogArchive
          - Audit
      regions:
        - eu-west-1
      template: custom-config-templates/network-orchestration-spoke.yaml
      runOrder: 6
      terminationProtection: true
      parameters:
        - name: HubAccount
          value: '{{account Network}}'
        - name: HomeRegion
          value: eu-west-1

This customization implements a Network Orchestrator (STNO) within the AWS Landing Zone Accelerator (LZA) using three CloudFormation stacks. These stacks automate network connectivity setup and management across the AWS Organization.

  • STNOOrganizationRole: Deployed to the Management account, this stack creates an IAM role (STNO-Organization-Information-Role-eu-west-1). This role provides the STNO with the necessary permissions to manage network resources across the entire organization. It’s a foundational component for centralized network control.
  • STNOHubEUWest1: Deployed to the Network Production account (Network) in the eu-west-1 region, this stack configures the central STNO hub. It performs several key actions:
    • Connects the STNO hub to an existing Transit Gateway (Network-Prod-eu-west-1-TGW), retrieved from SSM Parameter Store. This Transit Gateway serves as the core of the network connectivity.
    • Configures STNO settings, including options like deploying a web UI and allowing external principals.
    • Registers the Transit Gateway with the STNO, enabling the STNO to manage routing and connectivity through the gateway.
    • Links the STNO to the organization using the organization ID.
    • References the organization-wide IAM role created by the STNOOrganizationRole stack.
  • STNOSpokeAccounts: Deployed to all accounts within the Root OU except Management, Network, Log Archive, and Audit, this stack configures the STNO spoke components. This enables the STNO to manage network connectivity for all workload accounts. These spoke configurations connect back to the central STNO hub in the Network Production account (Network) within the eu-west-1 region.

Save your changes:

  • Use these commands to save your changes and update the LZA configuration:
git add .
git commit -m "Adding Network Orchestrator for Transit Gateway"
git push

VPC Provisioning via Service Catalog

AWS Service Catalog allows you to create and manage catalogs of approved services for use on AWS. This helps ensure that your VPCs are deployed in a consistent and compliant manner.

Benefits of Service Catalog for VPC Provisioning:

  • Standardised deployments: Create a portfolio of approved VPC configurations that meet your organisation’s requirements.
  • Consistent management: Deploy and manage the lifecycle of your VPCs (updates, deletion) through Service Catalog.

Update the LZA configuration:

  • Open the customizations-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the serviceCatalogPortfolios section and make sure it looks something like this:
customizations:
  serviceCatalogPortfolios:
  - name: "{{org-portfolio-name}}"
    provider: LZA
    account: Management
    regions:
      - eu-west-1
    shareTargets:
      organizationalUnits:
        - Root
    shareTagOptions: true
    portfolioAssociations:
      - type: Role
        name: AWSControlTowerExecution
        propagateAssociation: true
      - type: PermissionSet
        name: AdministratorAccess
        propagateAssociation: true
    products:
      - name: VPC
        description: VPC Deployment for Centralised Connectivity
        owner: LZA
        distributor: LZA
        versions:
          - name: v1
            description: VPC deployment - Product
            template: service-catalog-templates/vpc-with-tgw-ce-and-centralized-vpces-with-ipam.yaml
    tagOptions:
      - key: SDLC
        values: [Production,Development,Test,Pre-Production]

This configuration uses the LZA to create a Service Catalog portfolio containing a VPC product. This product, based on a CloudFormation template, provisions a complex VPC infrastructure. The portfolio is shared across the entire AWS organization and access is granted to the AWSControlTowerExecution role and AdministratorAccess permission set. The SDLC tag option allows for environment classification.

  - name: PortfolioAssociations
    description: Service Catalog Portfolio Associations config
    deploymentTargets:
      accounts:
        - Management
    regions:
      - eu-west-1
      - eu-central-1
      - ap-southeast-2
    template: custom-config-templates/custom-service-catalog-portfolio-associations.yaml
    runOrder: 3
    terminationProtection: true
    parameters:
      - name: pRoleNameForPortfolioShareAccess
        value: "{{org-portfolio-share-access-role}}"
      - name: pPortfolioNameForShareAccess
        value: "{{org-portfolio-name}}"
  • Open the replacements-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the following section and make sure it looks something like this:
  - key: org-portfolio-name
    type: String
    value: "Org-Portfolio"
  - key: org-portfolio-share-access-role
    type: String
    value: "DevOpsAdmins"

Because the LZA doesn’t directly support associating IAM Identity Center Permission Sets with Service Catalog portfolios (specifically, it lacks wildcard support), we’ve implemented a workaround. A Lambda function, triggered by a CloudFormation custom resource within the customizations-config.yaml template, programmatically adds the necessary Permission Set associations.

Save your changes:

  • Use these commands to save your changes and update the LZA configuration:
git add .
git commit -m "Adding Service Catalog Product for Amazon VPC"
git push

VPC Endpoints

VPC endpoints provide a secure and private connection between your VPC and supported AWS services without traversing the public internet.

Benefits of VPC Endpoints:

  • Enhanced Security: Isolates traffic within the AWS network.
  • Improved Performance: Reduces latency and potential network congestion.
  • Simplified Network Management: Eliminates the need for complex internet-facing configurations.

Centralising VPC endpoints offers further benefits:

  • Cost Optimisation: Minimises the number of endpoints.
  • Simplified Management: Easier to manage and maintain access to AWS services.
  • Consistent Security: Enforces consistent security policies.
  • Improved Efficiency: Reduces inter-VPC traffic.

Update the LZA configuration:

  • Open the network-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Add the vpcs section and make sure it looks something like this:
vpcs:
  - name: Network-Prod-eu-west-1-Endpoints-Vpc
    account: Network
    region: eu-west-1
    ipamAllocations:
      - ipamPoolName: Production-eu-west-1
        netmaskLength: 22
    internetGateway: false
    enableDnsHostnames: true
    enableDnsSupport: true
    instanceTenancy: default
    defaultSecurityGroupRulesDeletion: true
    routeTables:
      - name: Network-Prod-eu-west-1-Endpoints-Tgw-Rtb-A
        routes: []
      - name: Network-Prod-eu-west-1-Endpoints-Tgw-Rtb-B
        routes: []
      - name: Network-Prod-eu-west-1-Endpoints-Tgw-Rtb-C
        routes: []
      - name: Network-Prod-eu-west-1-Endpoints-Private-Rtb-A
        routes:
          - name: TgwRoute
            destination: 0.0.0.0/0
            type: transitGateway
            target: Network-Prod-eu-west-1-TGW
      - name: Network-Prod-eu-west-1-Endpoints-Private-Rtb-B
        routes:
          - name: TgwRoute
            destination: 0.0.0.0/0
            type: transitGateway
            target: Network-Prod-eu-west-1-TGW
      - name: Network-Prod-eu-west-1-Endpoints-Private-Rtb-C
        routes:
          - name: TgwRoute
            destination: 0.0.0.0/0
            type: transitGateway
            target: Network-Prod-eu-west-1-TGW
    subnets:
      - name: Network-Prod-eu-west-1-Endpoints-Private-Subnet-A
        mapPublicIpOnLaunch: false
        availabilityZone: a
        routeTable: Network-Prod-eu-west-1-Endpoints-Private-Rtb-A
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 24
      - name: Network-Prod-eu-west-1-Endpoints-Private-Subnet-B
        mapPublicIpOnLaunch: false
        availabilityZone: b
        routeTable: Network-Prod-eu-west-1-Endpoints-Private-Rtb-B
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 24
      - name: Network-Prod-eu-west-1-Endpoints-Private-Subnet-C
        mapPublicIpOnLaunch: false
        availabilityZone: c
        routeTable: Network-Prod-eu-west-1-Endpoints-Private-Rtb-C
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 24
      - name: Network-Prod-eu-west-1-Endpoints-Tgw-Subnet-A
        mapPublicIpOnLaunch: false
        availabilityZone: a
        routeTable: Network-Prod-eu-west-1-Endpoints-Tgw-Rtb-A
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Endpoints-Tgw-Subnet-B
        mapPublicIpOnLaunch: false
        availabilityZone: b
        routeTable: Network-Prod-eu-west-1-Endpoints-Tgw-Rtb-B
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Endpoints-Tgw-Subnet-C
        mapPublicIpOnLaunch: false
        availabilityZone: c
        routeTable: Network-Prod-eu-west-1-Endpoints-Tgw-Rtb-C
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
    transitGatewayAttachments:
      - name: Network-Prod-eu-west-1-Endpoints-Vpc-Tgw-Attachment
        transitGateway:
          name: Network-Prod-eu-west-1-TGW
          account: Network
        routeTableAssociations:
          - Network-Shared-Services-eu-west-1
        routeTablePropagations:
          - Network-Shared-Services-eu-west-1
          - Network-Prod-eu-west-1
          - Network-Pre-Prod-eu-west-1
          - Network-Dev-eu-west-1
          - Network-Test-eu-west-1
        subnets:
          - Network-Prod-eu-west-1-Endpoints-Tgw-Subnet-A
          - Network-Prod-eu-west-1-Endpoints-Tgw-Subnet-B
          - Network-Prod-eu-west-1-Endpoints-Tgw-Subnet-C
    interfaceEndpoints:
      central: true
      defaultPolicy: Default
      subnets:
        - Network-Prod-eu-west-1-Endpoints-Private-Subnet-A
        - Network-Prod-eu-west-1-Endpoints-Private-Subnet-B
        - Network-Prod-eu-west-1-Endpoints-Private-Subnet-C
      endpoints:
        - service: ec2
          securityGroup: Network-Prod-eu-west-1-Endpoints-Private-Sg
        - service: ec2messages
          securityGroup: Network-Prod-eu-west-1-Endpoints-Private-Sg
        - service: ssm
          securityGroup: Network-Prod-eu-west-1-Endpoints-Private-Sg
        - service: ssmmessages
          securityGroup: Network-Prod-eu-west-1-Endpoints-Private-Sg
        # Additional Endpoints can be added as required

This LZA configuration sets up a VPC in the eu-west-1 region specifically for hosting private interface endpoints. It’s isolated from the internet, uses IPAM for address management, and connects to a Transit Gateway for communication with other environments. The VPC is configured as the central location for interface endpoints to services like EC2 and SSM, ensuring secure and private access within the AWS network.

Save your changes:

  • Use these commands to save your changes and update the LZA configuration:
git add .
git commit -m "Adding Centralised VPC Endpoints"
git push

Traffic Inspection with AWS Network Firewall

AWS Network Firewall allows you to filter traffic at the perimeter of your VPC or at the subnet level, providing fine-grained control over network traffic flow.

Benefits of Traffic Inspection:

  • Identify and Block Malicious Activity: Analyse traffic for threats like malware and intrusion attempts.
  • Enforce Security Policies: Control which traffic is allowed or denied.
  • Gain Visibility into Network Traffic: Understand traffic patterns and identify potential vulnerabilities.
  • Prevent Data Loss: Monitor traffic for sensitive data to prevent unauthorised access and exfiltration.

Update the LZA configuration:

  • Open the network-config.yaml file in your local copy of the aws-accelerator-config repository.
  • Update the vpcs section to add something like this:
  - name: Network-Prod-eu-west-1-Inspection-Vpc
    account: Network
    region: eu-west-1
    ipamAllocations:
      - ipamPoolName: Production-eu-west-1
        netmaskLength: 22
    internetGateway: true
    enableDnsHostnames: true
    enableDnsSupport: true
    instanceTenancy: default
    defaultSecurityGroupRulesDeletion: true
    routeTables:
      - name: Network-Prod-eu-west-1-Inspection-Tgw-Rtb-A
        routes:
          - name: NfwRoute
            destination: 0.0.0.0/0
            type: networkFirewall
            target: Network-Prod-eu-west-1-nfw
            targetAvailabilityZone: a
      - name: Network-Prod-eu-west-1-Inspection-Tgw-Rtb-B
        routes:
          - name: NfwRoute
            destination: 0.0.0.0/0
            type: networkFirewall
            target: Network-Prod-eu-west-1-nfw
            targetAvailabilityZone: b
      - name: Network-Prod-eu-west-1-Inspection-Tgw-Rtb-C
        routes:
          - name: NfwRoute
            destination: 0.0.0.0/0
            type: networkFirewall
            target: Network-Prod-eu-west-1-nfw
            targetAvailabilityZone: c
      - name: Network-Prod-eu-west-1-Inspection-Private-Rtb-A
        routes:
          - name: TgwRoute
            destination: "{{top-level-cidr}}"
            type: transitGateway
            target: Network-Prod-eu-west-1-TGW
          - name: default-route
            destination: 0.0.0.0/0
            type: natGateway
            target: Network-Prod-eu-west-1-Inspection-Vpc-Ngw-A
      - name: Network-Prod-eu-west-1-Inspection-Private-Rtb-B
        routes:
          - name: TgwRoute
            destination: "{{top-level-cidr}}"
            type: transitGateway
            target: Network-Prod-eu-west-1-TGW
          - name: default-route
            destination: 0.0.0.0/0
            type: natGateway
            target: Network-Prod-eu-west-1-Inspection-Vpc-Ngw-B
      - name: Network-Prod-eu-west-1-Inspection-Private-Rtb-C
        routes:
          - name: TgwRoute
            destination: "{{top-level-cidr}}"
            type: transitGateway
            target: Network-Prod-eu-west-1-TGW
          - name: default-route
            destination: 0.0.0.0/0
            type: natGateway
            target: Network-Prod-eu-west-1-Inspection-Vpc-Ngw-C
      - name: Network-Prod-eu-west-1-Inspection-Public-Rtb-A
        routes:
          - name: default-route
            destination: 0.0.0.0/0
            type: internetGateway
            target: IGW
          - name: NfwRoute
            destination: '{{top-level-cidr}}'
            type: networkFirewall
            target: Network-Prod-eu-west-1-nfw
            targetAvailabilityZone: a
      - name: Network-Prod-eu-west-1-Inspection-Public-Rtb-B
        routes:
          - name: default-route
            destination: 0.0.0.0/0
            type: internetGateway
            target: IGW
          - name: NfwRoute
            destination: '{{top-level-cidr}}'
            type: networkFirewall
            target: Network-Prod-eu-west-1-nfw
            targetAvailabilityZone: b
      - name: Network-Prod-eu-west-1-Inspection-Public-Rtb-C
        routes:
          - name: default-route
            destination: 0.0.0.0/0
            type: internetGateway
            target: IGW
          - name: NfwRoute
            destination: '{{top-level-cidr}}'
            type: networkFirewall
            target: Network-Prod-eu-west-1-nfw
            targetAvailabilityZone: c
    subnets:
      - name: Network-Prod-eu-west-1-Inspection-Private-Subnet-A
        availabilityZone: a
        routeTable: Network-Prod-eu-west-1-Inspection-Private-Rtb-A
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 24
      - name: Network-Prod-eu-west-1-Inspection-Private-Subnet-B
        availabilityZone: b
        routeTable: Network-Prod-eu-west-1-Inspection-Private-Rtb-B
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 24
      - name: Network-Prod-eu-west-1-Inspection-Private-Subnet-C
        availabilityZone: c
        routeTable: Network-Prod-eu-west-1-Inspection-Private-Rtb-C
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 24
      - name: Network-Prod-eu-west-1-Inspection-Tgw-Subnet-A
        availabilityZone: a
        routeTable: Network-Prod-eu-west-1-Inspection-Tgw-Rtb-A
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Tgw-Subnet-B
        availabilityZone: b
        routeTable: Network-Prod-eu-west-1-Inspection-Tgw-Rtb-B
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Tgw-Subnet-C
        availabilityZone: c
        routeTable: Network-Prod-eu-west-1-Inspection-Tgw-Rtb-C
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Firewall-Subnet-A
        availabilityZone: a
        routeTable: Network-Prod-eu-west-1-Inspection-Private-Rtb-A
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Firewall-Subnet-B
        availabilityZone: b
        routeTable: Network-Prod-eu-west-1-Inspection-Private-Rtb-B
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Firewall-Subnet-C
        availabilityZone: c
        routeTable: Network-Prod-eu-west-1-Inspection-Private-Rtb-C
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Public-Subnet-A
        availabilityZone: a
        routeTable: Network-Prod-eu-west-1-Inspection-Public-Rtb-A
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Public-Subnet-B
        availabilityZone: b
        routeTable: Network-Prod-eu-west-1-Inspection-Public-Rtb-B
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
      - name: Network-Prod-eu-west-1-Inspection-Public-Subnet-C
        availabilityZone: c
        routeTable: Network-Prod-eu-west-1-Inspection-Public-Rtb-C
        ipamAllocation:
          ipamPoolName: Production-eu-west-1
          netmaskLength: 28
    natGateways:
      - name: Network-Prod-eu-west-1-Inspection-Vpc-Ngw-A
        subnet: Network-Prod-eu-west-1-Inspection-Public-Subnet-A
      - name: Network-Prod-eu-west-1-Inspection-Vpc-Ngw-B
        subnet: Network-Prod-eu-west-1-Inspection-Public-Subnet-B
      - name: Network-Prod-eu-west-1-Inspection-Vpc-Ngw-C
        subnet: Network-Prod-eu-west-1-Inspection-Public-Subnet-C
    transitGatewayAttachments:
      - name: Network-Prod-eu-west-1-Inspection-Vpc-Tgw-Attachment
        transitGateway:
          name: Network-Prod-eu-west-1-TGW
          account: Network
        options:
          applianceModeSupport: enable
        routeTableAssociations:
          - Network-Prod-eu-west-1
        subnets:
          - Network-Prod-eu-west-1-Inspection-Tgw-Subnet-A
          - Network-Prod-eu-west-1-Inspection-Tgw-Subnet-B
          - Network-Prod-eu-west-1-Inspection-Tgw-Subnet-C
    useCentralEndpoints: true

This configuration creates a specialided VPC within the LZA, acting as a central point for inspecting network traffic. It allows for comprehensive monitoring and filtering of traffic entering/exiting the VPC and traffic between other connected VPCs.

  • Add the networkFirewall section and make sure it looks something like this:
  networkFirewall:
    firewalls:
      - name: Network-Prod-eu-west-1-nfw
        description: Inspection VPC Network Firewall
        firewallPolicy: prod-nfw-policy
        subnets:
          - Network-Prod-eu-west-1-Inspection-Firewall-Subnet-A
          - Network-Prod-eu-west-1-Inspection-Firewall-Subnet-B
          - Network-Prod-eu-west-1-Inspection-Firewall-Subnet-C
        vpc: Network-Prod-eu-west-1-Inspection-Vpc
        loggingConfiguration:
          - destination: s3
            type: ALERT
          - destination: cloud-watch-logs
            type: FLOW
    policies:
      - name: prod-nfw-policy
        firewallPolicy:
          statelessDefaultActions: ['aws:forward_to_sfe']
          statelessFragmentDefaultActions: ['aws:forward_to_sfe']
          statefulEngineOptions: STRICT_ORDER
          statefulRuleGroups:
            - name: prod-domain-list-group
              priority: 100
            - name: prod-stateful-group
              priority: 101
        regions:
          - eu-west-1
        shareTargets:
          organizationalUnits:
            - Root
    rules:
      - name: prod-domain-list-group
        regions:
          - eu-west-1
        capacity: 1000
        type: STATEFUL
        ruleGroup:
          statefulRuleOptions: STRICT_ORDER
          rulesSource:
            rulesSourceList:
              generatedRulesType: ALLOWLIST
              targets:
                - '.amazon.com'
                - '.amazonaws.com'
                # Additional Domains can be added
              targetTypes: ['TLS_SNI', 'HTTP_HOST']
          ruleVariables:
            ipSets:
              name: HOME_NET
              definition:
                - '{{top-level-cidr}}'
            portSets:
              name: INTERNAL_PORTS
              definition:
                - '80'
                - '443'
        shareTargets:
          organizationalUnits:
            - Root
      - name: prod-stateful-group
        regions:
          - eu-west-1
        capacity: 1000
        type: STATEFUL
        ruleGroup:
          statefulRuleOptions: STRICT_ORDER
          ruleVariables:
            ipSets:
              name: HOME_NET
              definition:
                - "{{prod-eu-west-1-pool}}"
            portSets:
              name: INTERNAL_PORTS
              definition:
                - '80'
                - '443'
          rulesSource:
            rulesFile: firewall-config-rules/prod-rules.txt
        shareTargets:
          organizationalUnits:
            - Root

This configuration establishes a robust Network Firewall setup in the LZA, enabling granular control over network traffic and enhancing security by filtering traffic based on domain names, IP addresses, ports, and other criteria defined in the rule groups and the external rule file. The use of stateful inspection and an allowlist approach further strengthens security by blocking all traffic except that which is explicitly allowed.

  • Create a plain text file (e.g., firewall-config-rules/prod-rules.txt) containing your Suricata rules. This file will be used by AWS Network Firewall to filter network traffic according to your defined rules.
pass ip $HOME_NET any -> $HOME_NET $INTERNAL_PORTS (sid:100;)
drop http $HOME_NET any -> $EXTERNAL_NET 80 (msg:"Drop HTTP traffic"; sid:101;)
drop tls $HOME_NET any -> $EXTERNAL_NET 443 (msg:"Drop HTTPs traffic"; sid:102;)
drop udp $HOME_NET any -> $EXTERNAL_NET any (msg:"Default Egress UDP block";sid:202308172;)
drop icmp $HOME_NET any -> $EXTERNAL_NET any (msg:"Default Egress ICMP block";sid:202308177;)
drop tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"Default Ingress block to server"; flow:to_server; sid:20230813;)
drop udp $EXTERNAL_NET any -> $HOME_NET any (msg:"Default Ingress UDP block"; sid:202308174;)
drop icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"Default Ingress ICMP block"; sid:202308179;)
drop ip any any -> any any (noalert; ip_proto:!TCP; ip_proto:!UDP; ip_proto:!ICMP; sid:21801620;)

#alert tcp any any -> 1.1.1.1/32 80 (sid:102;msg:"example message";)

Wrapping Up

In this part, we’ve explored the networking capabilities of the LZA, covering IPAM, Transit Gateway, Network Orchestrator, Service Catalog for VPC provisioning, centralised VPC endpoints, and Network Firewall for traffic inspection. By implementing these configurations, you establish a robust, secure, and scalable network foundation for your AWS workloads.

In the next part of this series, I’ll dive deeper into security configurations within the LZA, including how to implement security best practices and protect your valuable resources. Stay tuned for more insights and practical guidance on maximising the benefits of the AWS Landing Zone Accelerator!