You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/pages/how-to/networks.mdx
+22Lines changed: 22 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,6 +73,28 @@ See the example below with a policy that allows the group `Berlin Office` to acc
73
73
Policies for domains or wildcard domains applied to peers with IP ranges might influence access control for those peers, as their destination ranges include any IPs. Therefore, we recommend creating networks with routing peers dedicated to domain and wildcard domains to prevent unwanted access. In upcoming releases, we will provide a fix for this behavior.
74
74
</Note>
75
75
76
+
### Managing access to and through the Routing Peers
77
+
78
+
Routing Peer's local IP address is managed in line with the standard Operating System network access management.
79
+
Access to Resources accessible from behind the Routing Peer is managed independently of the access to the services
80
+
running directly on the Routing Peer, even if the locally assigned IP address overlaps with the routed network range.
81
+
82
+
This means:
83
+
- you might observe seemingly "random" results depending on which Routing Peer is handling your requests,
84
+
- access to Resources does not require access to the Routing Peer itself,
85
+
- this will still establish connectivity to the Routing Peer (eg: in `netbird status -d`), but any traffic destined
86
+
for the Routing Peer will be denied,
87
+
- access to the Routing Peer's local IP address needs to be explicitly allowed,
88
+
- you can access _other_ Routing Peers in HA group by their local IP addresses, because they are now effectively
89
+
remote IP addresses,
90
+
91
+
Following diagram explains the differences visually with red/green color denoting Access Policies governing
When you configure wildcard domains as resources, you need to enable DNS wildcard routing. Which has an additional effect in comparison to the previous DNS routes behavior from Network routes; it switches the DNS resolution to the routing peer instead of the local client system.
78
100
This is also useful for regular DNS routes when you want to resolve the domain names using the routing peer's IP infrastructure, which will allow for more restricted access control rules in newer versions of the clients (**1**) and for the traffic to go to a near routing peer service.
0 commit comments