You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/content/docs/concepts/connection-workflows/multi-hop.mdx
+57Lines changed: 57 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,6 +69,63 @@ traffic to a target. Ingress worker filters determine which workers you
69
69
connect with to initiate a session, and egress worker filters determine which
70
70
workers are used to access targets.
71
71
72
+
## Use HCP-managed workers as ingress workers
73
+
74
+
Many organizations have strict network policies that prohibit all inbound traffic into their networks. In these scenarios, you can use HCP-managed workers as the ingress workers. To establish a connection into the network, a self-managed worker configured as an egress worker initiates an outbound connection to the HCP-managed worker, creating a persistent connection. As a result, when end users connect to a target, the end user's connection would hop from the Boundary client to the HCP-managed worker (ingress worker) to the self-managed worker (egress worker) to the target (or other intermediary workers if needed).
75
+
76
+
### Configure HCP-managed workers for ingress
77
+
78
+
To configure end user traffic to ingress through HCP-managed workers, you must configure the self-managed worker (enterprise version). On your self-managed worker that you use for egress to the HCP-managed worker, set the configuration file with the following parameters:
79
+
-`hcp_boundary_cluster_id` - The HCP Boundary cluster ID, which can be found in the HCP Boundary cluster's URL.
80
+
- Omit the `public_addr` parameter. A public address is not needed since the self-managed worker initiates the connection to HCP-managed workers.
81
+
- Omit the `initial_upstreams` parameter. This is not needed because the `hcp_boundary_cluster_id` parameter is sufficent to indicate the HCP-managed workers as the upstream.
82
+
- Include a [worker tag](/boundary/docs/concepts/filtering/worker-tags#target-worker-filtering) in the `worker` stanza which will be used to select multi-hop routes for each target.
### Allow-list outbound network traffic to HCP-managed workers
102
+
103
+
Some organizations require explicit destination addresses set in their network firewall rules for any outbound traffic. In this scenario, you should use the fully qualified domain name (FQDN) of the HCP-managed workers:
104
+
105
+
```
106
+
<cluster_uuid>.proxy.boundary.hashicorp.cloud
107
+
```
108
+
109
+
where the `cluster_uuid` is the HCP Boundary cluster ID. You can find your HCP Boundary cluster ID in the HCP Boundary cluster's URL.
110
+
111
+
<Note>
112
+
113
+
The Boundary cluster ID is derived from the Boundary address. For example, if
Then your cluster id is `abcd1234-e567-f890-1ab2-cde345f6g789`.
119
+
120
+
</Note>
121
+
122
+
### Route end user traffic to targets through HCP-managed workers
123
+
124
+
To route traffic through the HCP-managed workers, you should set the egress filters of each target to match the tag set in the self-managed worker's configuration file. You do not need to set additional ingress filters on the targets.
0 commit comments