Inter-routing domain service 编辑
Citrix SD-WAN allows you to segment the network using Routing Domains, ensuring high security and easy management. With the use of the Routing Domain the traffic is isolated from each other in the overlay network. Each routing domain maintains its own routing table. For more information on Routing Domain, see Routing Domain.
However, sometimes we need to route the traffic between the Routing domains. For example if shared services such as printer, scanner, and mail server are provisioned as a separate Routing Domain. Inter-routing domain is required to enable users from different routing domains to access the shared services.
Citrix SD-WAN provides Static Inter-Routing Domain Service, enabling route leaking between Routing Domains within a site or between different sites. This eliminates the need for an edge router to handle route leaking. The Inter-routing domain service can further be used to set up routes, firewall policies, and NAT rules.
A new Firewall Zone, Inter_Routing_Domain_Zone is created by default and serves as the firewall zone for the Inter-Routing Domain Services for routing and filtering.
Note
Citrix SD-WAN PE appliances do not perform WAN optimization functionality on Inter-Routing Domain packets.
To configure Inter-routing Domain Service between two routing domains.
Consider an SD-WAN network with an MCN and 2 or more branches with at least two Routing Domains configured globally. By default, all the routing domains are enabled on the MCN. Selectively enable the required routing domains on the other sites. For information on configuring Routing Domain see, Configure Routing Domain.
In the SD-WAN Configuration Editor, navigate to Connections > Select Site > Inter-Routing Domain Service.
Click + and enter values for the following parameters:
- Name: The name of the Inter-Routing Domain Service.
- Routing Domain 1: The first Routing Domain of the pair.
- Routing Domain 2: The second Routing Domain of the pair.
- Firewall Zone: The Firewall Zone of the Service.
- Default: The Inter_Routing_Domain_Zone firewall zone is assigned.
- None: No zone is selected and the original zone of the packet is retained.
- All Zones configured in the network might be selected.
- Click Apply to create the Inter-routing domain service. The created service can be used to create routes, firewall policies, and NAT policies.
Note
You cannot configure an Inter-routing domain service, using routing domains that are not enabled on a site.
To create routes using the Inter-routing domain service, create a route with the Service type as Inter-Routing Domain Service and select the inter-routing domain service. For more information on configuring Routes, see How to Configure Routes.
Also add a route from the other Routing Domain pair, to establish connection to and fro between the two routing domains.
You can also configure firewall policies to control the flow of traffic between routing domains. In the firewall policies, select Inter-Routing domain service for the source and destination services and select the required firewall action. For information on configuring Firewall Policies, see Policies.
You can also choose Intranet service type to configure Static and Dynamic NAT policies. For more information on configuring NAT policies, see Network Address Translation.
Monitoring
You can view monitoring statistics for connections that use inter-routing-domain services under Monitoring > Firewall Statistics > Connections.
Use Case: Sharing resources across Routing Domains
Let us consider a scenario, in which users in different routing domains need to access common assets, such a printer or network storage. There are 3 routing domains at a branch RD1, RD2, and Shared RD as shown in the figure.
To enable users in RD1 and RD2 to access resources in Shared RD:
- Create an Inter-Routing Domain service between RD1 and Shared RD, for example Inter RD1.
Create an Inter-Routing Domain service between RD2 and Shared RD, for example Inter RD2.
Configure a static route to Shared RD from RD1 and RD2. In RD1, add a route 172.168.2.0/24 to InterRD1.
In RD2, add a route 172.168.2.0/24 to InterRD2.
Add a Dynamic NAT rule to InterRD1 using a VIP in shared RD. Enable Bind Responder Route to ensure that the reverse route uses the same service type.
Add a Dynamic NAT rule to InterRD2 using a VIP in shared RD, for example 10.0.0.11. Enable Bind Responder Route to ensure that the reverse route uses the same service type.
- Use filters to limit what resources in Shared RD are allowed to be accessed by users in RD1/RD2.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论