Skip to content

Commit

Permalink
update for pro
Browse files Browse the repository at this point in the history
  • Loading branch information
joe-amendolara committed Dec 17, 2024
1 parent 06a8184 commit 7a794d2
Show file tree
Hide file tree
Showing 11 changed files with 14 additions and 8 deletions.
Binary file modified ace_pro/docs/images/lab2-verification.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified ace_pro/docs/images/lab6-commit3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified ace_pro/docs/images/lab6-dns.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified ace_pro/docs/images/lab6-ids.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified ace_pro/docs/images/lab6-idscommit.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified ace_pro/docs/images/lab6-monitorpermit22.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified ace_pro/docs/images/lab6-suricataedit.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 6 additions & 0 deletions ace_pro/docs/lab1.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,12 @@ align: center
POD portal
```

```{caution}
You will get only access to the **AWS** Console!
Access to both the _Azure_ console and the _GCP_ console are not granted.
```

## 2. Azure VNet
### 2.1. Create Azure VNet

Expand Down
2 changes: 1 addition & 1 deletion ace_pro/docs/lab2.md
Original file line number Diff line number Diff line change
Expand Up @@ -682,7 +682,7 @@ Please pay close attention that the following pending elements will be completed

## 5. Verification

### 5.1. Verification of Transit Peerings on CoPilot(Cloud Fabric)
### 5.1. Verification of Transit Peerings on CoPilot (Cloud Fabric)

Go to **CoPilot > Cloud Fabric > Gateways > Transit Gateways**, select the Transit Gateway **_aws-us-east-2-transit_**, then select the `Attachments"` tab and finally select the `"Transit-Transit Peering"` tab: you will see **one** connection per each peering, that correspond to the `two IPSec tunnels`.

Expand Down
2 changes: 1 addition & 1 deletion ace_pro/docs/lab4.md
Original file line number Diff line number Diff line change
Expand Up @@ -366,7 +366,7 @@ Disable "Gateway Single AZ HA
```{caution}
The `Gateway Single AZ HA` feature enables the **Aviatrix Controller** to monitor the health of the gateway instance and restart the gateway instance if it becomes unreachable.
Gateway Single AZ HA is enabled by default.
<ins>Gateway Single AZ HA is enabled by default</ins>.
When Gateway Single AZ HA status is **On**, the Aviatrix Controller attempts to restart the gateway instance. When status is **Off**, Controller does **NOT** attempt to restart the gateway instance.
```
Expand Down
12 changes: 6 additions & 6 deletions ace_pro/docs/lab5.md
Original file line number Diff line number Diff line change
Expand Up @@ -390,7 +390,7 @@ However, on the SSH client, you will **NOT** see any outputs, this is because th
height: 200px
align: center
---
SSH client output
SSH client outputs
```

Go to **CoPilot > Security > Egress > Overview (default)**
Expand Down Expand Up @@ -452,7 +452,7 @@ The purpose of this **WebGroup** is to authorize traffic only towards both the D
```

### 5.2 Create an _"editable"_ Explicit -Deny-Rule
### 5.2.1 Enforce the Egree-Rule
#### 5.2.1 Enforce the Egress-Rule

Go to **CoPilot > Security > Distributed Cloud Firewall > Rules**, click on the **pencil** button on the right-hand side of the `Egress-Rule`.

Expand Down Expand Up @@ -481,7 +481,7 @@ Commit the changes
- **Publlic Internet** = Represents non-RFC 1918 IP ranges, or the public Internet
```

After having enforced the Egress-Rule you will notice that automatically ther Controller has applied at the very bottom, the `DefaultDenyAll` rule.
After having successfully enforced the **Egress-Rule** you will notice that automatically ther Controller has applied at the very bottom, the `DefaultDenyAll` rule.

```{figure} images/lab6-webgroup23456.png
---
Expand All @@ -501,7 +501,7 @@ align: center
Not editable
```

### 5.2.2 Create an _ad-hoc_ Explicit-Deny-Rule
#### 5.2.2 Create an _ad-hoc_ Explicit-Deny-Rule

Go to **CoPilot > Security > Distributed Cloud Firewall > Rules (default tab)** and create a new rule clicking on the `"+ Rule"` button.

Expand Down Expand Up @@ -596,14 +596,14 @@ Permit
## 6. IDS
### 6.1 Create a New Rule

Let's now test the **_IDS_** feature (i.e. Intrusion Detection System).
Let's now test the **_IDS_** feature (i.e. Intrusion Detection System), from the **aws-us-east-2spoke1-test2** instance.

Go to **CoPilot > Security > Distributed Cloud Firewall > Rules** and click on the `"+ Rule"` button.

Create a new DCF Rule with the following parameters:

- **Name**: <span style='color:#479608'>Inspect-DNS</span>
- **Source Smartgroups**: <span style='color:#479608'>Anywhere(0.0.0.0/0)</span>
- **Source Smartgroups**: <span style='color:#479608'>us-east-2-private-subnet</span>
- **Destination Smartgroups**: <span style='color:#479608'>Public Internet</span>
- **Protocol**: <span style='color:#479608'>Any</span>
- **Logging**: <span style='color:#479608'>On</span>
Expand Down

0 comments on commit 7a794d2

Please sign in to comment.