Skip to content

Commit 98853aa

Browse files
committed
Add port ranges to acl docs
1 parent 34da375 commit 98853aa

File tree

3 files changed

+11
-4
lines changed

3 files changed

+11
-4
lines changed
-5.91 KB
Loading
58.8 KB
Loading

src/pages/how-to/manage-network-access.mdx

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -67,14 +67,21 @@ There is a `Default` policy, which configures a default mesh connection between
6767
## Managing Policies
6868

6969
### Creating Policies
70-
After accessing the `Access Control` > `Policies` tab, click on the `Add policy` button to create a new policy. In the popup, specify source and destination groups, and add Posture Checks if needed. Make sure to set traffic direction only when TCP or UDP protocols are selected. Finally, provide a name and description for your policy.
70+
After accessing the `Access Control` > `Policies` tab, click on the `Add policy` button to create a new policy.
71+
In the popup, specify connection `Source` and `Destination` groups. You can select existing groups or create new ones by entering a name in the input box.
72+
73+
<Note>
74+
We recommend using [identity provider (IdP) integrations](/how-to/idp-sync) to provision your user groups from the IdP.
75+
</Note>
76+
77+
You can limit access to specific protocol and ports by selecting the `Protocol` and providing the port numbers in the `Ports` field.
78+
Starting version `0.48` NetBird supports port ranges in policies, allowing you to specify a range of ports in the format `start-end` (e.g., `8000-9000`).
79+
Make sure to set traffic direction only when TCP or UDP protocols are selected. Finally, provide a name and description for your policy.
7180

7281
<p>
7382
<img src="/docs-static/img/overview/create-rule.png" alt="high-level-dia" className="imagewrapper"/>
7483
</p>
75-
76-
77-
If necessary, you can create new groups simply by entering new names in the input box for either the source or destination lists.
84+
If necessary, you can also add a [posture checks](/how-to/manage-posture-checks) to the policy. Posture checks are used to ensure that the peer meets certain security requirements before allowing it to connect. You can select from predefined posture checks or create custom ones.
7885

7986
Once you have finished configuring the policy, click `Add Policy` to save it. You will then see your new policy in the table.
8087
<p>

0 commit comments

Comments
 (0)