Scott, thanks for responding. I understand the need for them in general, but not when a UTM is in the mix.
Is the first ELB faster/better than using Zone-53 with two External interfaces on the Sophos?
Does the second ELB offer any advantage over 'Server Load Balancing' or using the reverseproxy with two Real Servers?
Cheers - Bob
PS NAT only works with IPs. You can use a DNS Host object that gets its IP from a name server, but the FQDN will not be passed to the ELB. Same problem with the reverse proxy.
Note 2017-12-27: I haven't tried it, but I bet selecting 'Pass host header' in the 'Advanced' section of the Virtual Server would get the FQDN to the ELB.
WAF seems to be unable to accept connections from multiple internet-facing ELBs to multiple backends. This is a requirement when terminating SSL using AWS ACM certificates since Sophos does not support them. This common architecture (LB > UTM > LB) is extremely common but so far seems unobtainable using Sophos appliances on AWS. AWS WAF is not practical when dealing with a legacy setup that supports over 1,000 domains due to the administrative overhead of modifying every DNS record to a new endpoint.
https://community.sophos.com/products/unified-threat-management/f/network-protection-firewall-nat-qos-ips/41441/nat-based-on-domain-name/316605#316605
I would love it if you could prove me wrong though.