Skip to content

Commit c192efa

Browse files
committed
feat: add Routing Peer Access Policies diagram
1 parent cfb2c28 commit c192efa

File tree

2 files changed

+22
-0
lines changed

2 files changed

+22
-0
lines changed
136 KB
Loading

src/pages/how-to/networks.mdx

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,28 @@ See the example below with a policy that allows the group `Berlin Office` to acc
7373
Policies for domains or wildcard domains applied to peers with IP ranges might influence access control for those peers, as their destination ranges include any IPs. Therefore, we recommend creating networks with routing peers dedicated to domain and wildcard domains to prevent unwanted access. In upcoming releases, we will provide a fix for this behavior.
7474
</Note>
7575

76+
### Managing access to and through the Routing Peers
77+
78+
Routing Peer's local IP address is managed in line with the standard Operating System network access management.
79+
Access to Resources accessible from behind the Routing Peer is managed independently of the access to the services
80+
running directly on the Routing Peer, even if the locally assigned IP address overlaps with the routed network range.
81+
82+
This means:
83+
- you might observe seemingly "random" results depending on which Routing Peer is handling your requests,
84+
- access to Resources does not require access to the Routing Peer itself,
85+
- this will still establish connectivity to the Routing Peer (eg: in `netbird status -d`), but any traffic destined
86+
for the Routing Peer will be denied,
87+
- access to the Routing Peer's local IP address needs to be explicitly allowed,
88+
- you can access _other_ Routing Peers in HA group by their local IP addresses, because they are now effectively
89+
remote IP addresses,
90+
91+
Following diagram explains the differences visually with red/green color denoting Access Policies governing
92+
the specific connections:
93+
94+
<p>
95+
<img src="/docs-static/img/how-to-guides/routing-peer-policies.drawio.png" alt="routing-peer-policies" className="imagewrapper-big"/>
96+
</p>
97+
7698
## Enable DNS wildcard routing
7799
When you configure wildcard domains as resources, you need to enable DNS wildcard routing. Which has an additional effect in comparison to the previous DNS routes behavior from Network routes; it switches the DNS resolution to the routing peer instead of the local client system.
78100
This is also useful for regular DNS routes when you want to resolve the domain names using the routing peer's IP infrastructure, which will allow for more restricted access control rules in newer versions of the clients (**1**) and for the traffic to go to a near routing peer service.

0 commit comments

Comments
 (0)