Forum Discussion
Clone Pool in AWS
I have recently been setting up a POC for using a Clone Pool to replicate traffic to an IDS device (in this case RSA's Netwitness/Security Analytics).
I have been using the below resources to set this up in my on-prem network.
https://support.f5.com/kb/en-us/solutions/public/8000/500/sol8573.html
https://devcentral.f5.com/questions/clone-pool-and-port-mirroring
My end game however is to be able to clone traffic from our soon to be commissioned LTM devices in AWS, to our on-prem IDS device. My question is... is this possible? And if so how? I'm not seeing how I would be able to use the methods listed in the above articles over a point-to-point (L3) link to AWS.
Thanks
2 Replies
- Peter_Stein_234
Nimbostratus
The problem with clone pools in AWS is the packets that are generated by the clone pool retain the original source and destination IPs but have their mac address changed in order to deliver the original data to a different layer 2 destination. Unfortunately (in my testing) AWS fabric drops this traffic. Probably because the security groups do stateful inspection and aren't fond of these out of state packets.
As a work around I've attempted to create a GRE tunnel to the destination as GRE traffic is passed by AWS (if specific caveats are met). However since the decision to GRE encapsulate traffic is based on destination IP in the IP header this traffic will not traverse the tunnel.
Least this has been my experience so far, I've not been able to get the native GRE tunnel to work in the virtual LTM, and have been forced to use Linux OS GRE tunnels, TMM (I'm assuming) seems to ignore any manual arp entries I put in to try to force this traffic in the correct direction.
I'm currently looking for other methods to span traffic but sadly it appears putting the IDS logically in line may be necessary.
- Peter_Stein_234
Nimbostratus
Update to this, it turns out that VPC doesn't drop this traffic for being out of state, it drops this traffic because "source/destination check" is turned on the originating and arriving interfaces. We originally turned this off on the instances, and still didn't see traffic pass, turns out this flag needs to be disabled on the actual instance interface. We are now cloning traffic in AWS!
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
