Advanced Firewall
Advanced Firewall
Updated on 14 Mar 2024

1. Overview of Kubernetes integrated Firewall

The Kubernetes integrated Firewall product is different from FPT Cloud's basic Kubernetes product by placing an Advanced Firewall located in front of Tenant's Gateway. Advanced Firewall is responsible for protecting and configuring security rules (Allow, Drop) and NAT rules (DNAT, SNAT) for the Kubernetes cluster.

Main components include:

  • Advanced Firewall (e.g: Checkpoint)

  • Gateway (Internet Gateway, Firewall L4)

  • Load Balancer

  • Kubernetes Cluster: Master Nodes (API, etcd) and Worker Nodes (App and Service)

2. Requirement rules for Kubernetes on Advanced Firewall

The traffic flow to access the Kubernetes Nodes is as follows:

Note:

  • All inbound and outbound rules for the Kubernetes cluster are configured on the Advanced Firewall.

  • All NAT rules for the Kubernetes cluster are configured on the Advanced Firewall.

  • Public IP is set on Advanced Firewall.

Firewall rule planning table on Advanced Firewall for Kubernetes cluster:

NAT rule planning table on Advanced Firewall for Kubernetes cluster:

On the Gateway, there are still Firewall rules and NAT rules to ensure traffic flowing from the Gateway to the Firewall. These default rules are automatically created, and users must create rules for the application (optional) if needed.

3. Initialize a Kubernetes cluster with integrated Firewall

Prerequisites:

  • CPU, RAM, Storage, and Instance quotas must be sufficient for the desired Cluster configuration.

  • 01 Network subnet: Network used for Kubernetes Nodes. Subnet needs Static IP Pool. This subnet needs to be planned and designed in detail to configure a route to allow connection from the internet to the Firewall through the Gateway to the Kubernetes Nodes.

  • Firewall IP information: 01 Public IP and 01 Private IP of the Firewall.

  • Gateway IP information: 01 Private IP to configure the route from Firewall to Gateway.

Initialization steps are as follows:

Step 1: In the FPT Portal menu, select Kubernetes > Create. Enter Cluster's general information.

Step 2: Configure Firewall. Tick Enable Firewall

Step 3: Enter Firewall information, including: Gateway IP, Checkpoint Public and Private IP.

Step 4: Click Create, double-check the information and click Agree to proceed with initialization.

Step 5: Monitor K8s cluster initialization status. After the status turned to Running, proceed to use and deploy the application.