Skip to content

Commit 8b6c052

Browse files
committed
feat: add Routing Peer Access Policies diagram
1 parent cfb2c28 commit 8b6c052

File tree

3 files changed

+156
-0
lines changed

3 files changed

+156
-0
lines changed

public/docs-static/img/how-to-guides/routing-peer-policies.drawio

Lines changed: 134 additions & 0 deletions
Large diffs are not rendered by default.
306 KB
Loading

src/pages/how-to/networks.mdx

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,28 @@ See the example below with a policy that allows the group `Berlin Office` to acc
7373
Policies for domains or wildcard domains applied to peers with IP ranges might influence access control for those peers, as their destination ranges include any IPs. Therefore, we recommend creating networks with routing peers dedicated to domain and wildcard domains to prevent unwanted access. In upcoming releases, we will provide a fix for this behavior.
7474
</Note>
7575

76+
### Managing access to and through the Routing Peers
77+
78+
Routing Peer's local IP address is managed in line with the standard Operating System network access management.
79+
Access to Resources accessible from _behind_ the Routing Peer is managed independently of the access to the services
80+
running _directly on_ the Routing Peer, even if the locally assigned IP address overlaps with the routed network range.
81+
82+
This means:
83+
- you might observe seemingly "random" results depending on which Peer is forwarding your requests,
84+
- access to **Resources** does not require access to the Routing Peer itself,
85+
- access to the Routing Peer's local IP address needs to be explicitly allowed:
86+
- granting access to Resource will establish connectivity to the Routing Peer (eg: in `netbird status -d`), but
87+
traffic destined to any of the Routing Peer's local IP addresses will be rejected,
88+
- you can access _inactive_ Routing Peers on the same Network by their "local" IP addresses, because they are now
89+
effectively remote,
90+
91+
Following diagram explains the differences visually with red/green color denoting Access Policies governing
92+
the specific connections:
93+
94+
<p>
95+
<img src="/docs-static/img/how-to-guides/routing-peer-policies.drawio.png" alt="routing-peer-policies" className="imagewrapper-big"/>
96+
</p>
97+
7698
## Enable DNS wildcard routing
7799
When you configure wildcard domains as resources, you need to enable DNS wildcard routing. Which has an additional effect in comparison to the previous DNS routes behavior from Network routes; it switches the DNS resolution to the routing peer instead of the local client system.
78100
This is also useful for regular DNS routes when you want to resolve the domain names using the routing peer's IP infrastructure, which will allow for more restricted access control rules in newer versions of the clients (**1**) and for the traffic to go to a near routing peer service.

0 commit comments

Comments
 (0)