Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Default routes are not updated after initial FortiGate deployment #4

Open
Nick-Andreev opened this issue Feb 15, 2018 · 1 comment
Open

Comments

@Nick-Andreev
Copy link

When deploying FortiGate VMs to an existing VPC in an Auto Scale configuration, worker node cannot find the routing table FortiGate subnet/interface is associated to and doesn't update the default route to the FortiGate ENI.

Reason of the issue is the RouteTableCheck function in Fortigate.py, which expects the default route to be pointing to an IGW:

if igwbool is True

There are lots of scenarios where this might not be true: default route is pointing to a NAT Gateway, default route is empty (private subnet talks only to subnets propagated from a VPG), etc. As a result, deployment might or might not succeed, depending on how existing VPC routing tables are configured.

The easiest way to fix this is probably to remove this check and change default route to FortiGate VM ENI regardless of how routing tables are configured.

@datbird
Copy link

datbird commented Mar 28, 2019

Is this still a thing? I'm coming from an Transit VPC architecture and let me be sure I understand correctly. The Lambda automation scripts are checking the firewalls to ensure there default routes are pointed to the VPC's IGW as a next hop gateway?? If that does not exist you're saying it wont propogate the default route or that it doesnt install the route into the firewalls route table?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants