Skip to content

Commit

Permalink
Added new remove the requirement for inbound network rules section (#…
Browse files Browse the repository at this point in the history
…5010)

* Added new remove the requirement for inbound network rules section

* docs: Fix typo

* Update website/content/docs/concepts/connection-workflows/multi-hop.mdx

Co-authored-by: Dan Heath <76443935+Dan-Heath@users.noreply.github.com>

* Update website/content/docs/concepts/connection-workflows/multi-hop.mdx

Co-authored-by: Dan Heath <76443935+Dan-Heath@users.noreply.github.com>

* Update website/content/docs/concepts/connection-workflows/multi-hop.mdx

Co-authored-by: Dan Heath <76443935+Dan-Heath@users.noreply.github.com>

* Update website/content/docs/concepts/connection-workflows/multi-hop.mdx

Co-authored-by: Dan Heath <76443935+Dan-Heath@users.noreply.github.com>

---------

Co-authored-by: Dan Heath <76443935+Dan-Heath@users.noreply.github.com>
  • Loading branch information
dannyjknights and Dan-Heath authored Oct 9, 2024
1 parent ab922b5 commit d580fbb
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions website/content/docs/concepts/connection-workflows/multi-hop.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,16 @@ inbound traffic to route through multiple network enclaves to reach the target s
Multi-hop sessions allow you to chain together two or more workers
across multiple networks to form reverse proxy connections between the user and the target, even in complex networks with strict outbound-only policies.

## Inbound network rules

With a multi-hop deployment, all connections are initiated outbound from the most downstream worker in the chain. After Boundary establishes the initial connection between the workers, it uses the established connection for any subsequent connections.
These persistent TCP connections result in the requirement for only outbound connectivity.

If you have one or more firewalls sitting between the ingress and egress workers, you do not need to create additional inbound networking rules to facilitate a Boundary multi-hop deployment. This not only helps to
simplify your infrastructure configuration, but also ensures that your security posture is not weakened or compromised.

## Multi-hop worker types

In multi-hop scenarios, there are typically three types of workers:
1. **Ingress worker** - An ingress worker is a worker that is accessible by the client. The client initiates the connection to the ingress worker.
1. **Intermediary worker** - An optional intermediary worker sits between ingress and egress workers as part of a multi-hop chain. There can be multiple intermediary workers as part of a multi-hop chain.
Expand Down

0 comments on commit d580fbb

Please sign in to comment.