-
Notifications
You must be signed in to change notification settings - Fork 123
Add the new ipv6 ASG group to the docu #212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -356,6 +356,7 @@ The following table describes examples of typical ASGs. Configure your ASGs in a | |||||
| | --- | --- | ||||||
| | `dns` | DNS, either public or private | | ||||||
| | `public-networks` | Public networks, excluding IaaS metadata endpoints | | ||||||
| | `public_networks_ipv6` | Public IPV6 networks | | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||
| | `private-networks` | Private networks in accordance with [RFC-1918](https://tools.ietf.org/html/rfc1918#section-3) | | ||||||
| | `load-balancers` | The internal <%= vars.app_runtime_abbr %> load balancer and others | | ||||||
| | `internal-proxies` | Internal proxies | | ||||||
|
|
@@ -416,6 +417,22 @@ The following is an example `public_networks` ASG: | |||||
| ] | ||||||
| ``` | ||||||
|
|
||||||
| ### <a id='public-networks-ipv6-example'></a> Public IPv6 networks | ||||||
|
|
||||||
| For IPv6-enabled environments, public repositories and services are generally accessible within the range 2000::/3. | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This is for IPv6 networking in general, not specific to CF. The idea is that addressing was approached in a different way for IPv6, where there is a known "public" range. In IPv6 everything that is not explicitly private is public. This is not the case in IPv6. |
||||||
| As this configuration is in an experimental phase, the provided range is intended for testing purposes only. Before deploying in production environments, additional research on IPs to exclude for enhanced security is recommended. | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "additional research" seems very vague. There are a few examples in the comment in the ops file that could be useful (i.e. things that are considered "internal" and protected otherwise, but from within the CF environment they're still reachable but shouldn't be) |
||||||
|
|
||||||
| The following is an example `public_networks_ipv6` ASG: | ||||||
|
|
||||||
| ``` | ||||||
| [ | ||||||
| { | ||||||
| "destination": "2000::/3", | ||||||
| "protocol": "all" | ||||||
| } | ||||||
| ] | ||||||
| ``` | ||||||
|
|
||||||
| ### <a id='private-networks-example'></a> Private networks | ||||||
|
|
||||||
| Network connections that are commonly allowable in private networks include endpoints such as proxy servers, Docker registries, load balancers, databases, messaging servers, directory servers, and file servers. Configure appropriate private network ASGs as appropriate. You might find it helpful to use a naming convention with `private_networks` as part of the ASG name, such as `private_networks_databases`. | ||||||
|
|
||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It preconfigures two. The third is added via experimental opsfile, so not on by default.