-
Our customers want to manage/block/allow outbound web traffic via squid (or similar) forward web proxy. I can think of two primary ways to do this:
Method 2 is easier to implement but is a "weak/soft" control on outbound web traffic. (A malicious or misconfigured app could just communicate outbound without using the proxy. Method 1 would be much stronger but I would expect the gruntwork vpc module to "fight" over the routes in the route tables. How have gruntwork customers provided this kind of outbound traffic inspection/filtering? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hi @hammondr, we don’t currently have a pre-made module to address this kind of proxy. An option would be using AWS Network Firewall, and we had started work to add support for it in our vpc module (https://github.com/gruntwork-io/terraform-aws-vpc/pull/210). However, this PR is currently paused while we scale our team, but maybe the progress made so far can offer some insight into how one could adopt this kind of solution?
Regarding your options, I would lean torwards the first approach. About the Concerning more general solutions for Squid proxy, this post has some interesting suggestions, such as putting the Squid node in an ASG of size 1: https://aws.amazon.com/blogs/security/how-to-add-dns-filtering-to-your-nat-instance-with-squid/ |
Beta Was this translation helpful? Give feedback.
Hi @hammondr, we don’t currently have a pre-made module to address this kind of proxy. An option would be using AWS Network Firewall, and we had started work to add support for it in our vpc module (gruntwork-io/terraform-aws-vpc#210). However, this PR is currently paused while we scale our team, but maybe the progress made so far can offer some insight into how one could adopt this kind of solution?
Regarding your options, I would lean torwards the first approach. About the
vpc_module
“fighting” this setup, you might have to disable some features in it and create some resources externally to the module, but it could work. For example, you could disable the creation of the internet gate…