Skip to content

Commit c273103

Browse files
committed
Edits to support changing of the default bridge network
1 parent dbc6dc0 commit c273103

3 files changed

Lines changed: 75 additions & 8 deletions

File tree

memdocs/intune/protect/microsoft-tunnel-configure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 03/02/2022
8+
ms.date: 03/03/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -45,10 +45,10 @@ Use of a *Server configuration* lets you create a configuration a single time an
4545

4646
3. On the **Settings** tab, configure the following items:
4747

48-
- **IP address range**: IP addresses within this range are leased to devices when they connect to Tunnel Gateway. The Tunnel Client IP address range specified must not conflict with an on-prem network range. For example, *169.254.0.0/16*.
49-
- We recommend the Automatic Private IP Addressing (APIPA) range of 169.254.0.0/16, as this range avoids conflicts with other corporate networks.
48+
- **IP address range**: IP addresses within this range are leased to devices when they connect to Tunnel Gateway. The Tunnel Client IP address range specified must not conflict with an on-premises network range.
49+
- Consider using the Automatic Private IP Addressing (APIPA) range of 169.254.0.0/16, as this range avoids conflicts with other corporate networks.
5050
- If the client IP address range conflicts with the destination, it will loopback and fail to communicate with the corporate network.
51-
- When you select a different client IP address range you must ensure it won't conflict with any existing corporate network IP address ranges.
51+
- You can select any client IP address range you want to use if it does not conflict with your corporate network IP address ranges.
5252

5353
- **DNS servers**: These servers are used when a DNS request comes from a device that's connected to Tunnel Gateway.
5454

memdocs/intune/protect/microsoft-tunnel-overview.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 03/01/2022
8+
ms.date: 03/03/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -155,8 +155,6 @@ The following outlines where break and inspect is not supported and where it is
155155

156156
- The Management Agent is authorized against Azure AD using Azure app ID/secret keys.
157157

158-
- The Tunnel Gateway server uses NAT to provide addresses to VPN clients that are connecting to the corporate network.
159-
160158
## Next steps
161159

162160
[Prerequisites for the Microsoft Tunnel in Intune](microsoft-tunnel-prerequisites.md)

memdocs/intune/protect/microsoft-tunnel-prerequisites.md

Lines changed: 70 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 02/17/2022
8+
ms.date: 03/03/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -109,6 +109,75 @@ with documentation for the application, and packages with helper utilities. For
109109

110110
- **TLS version**: By default, connections between Microsoft Tunnel clients and servers use TLS 1.3. When TLS 1.3 isn’t available, the connection can fall back to use TLS 1.2.
111111

112+
### Default bridge network
113+
114+
Both Podman and Docker containers use a bridge network to forward traffic through the Linux host. When the containers bridge network conflicts with a corporate network, Tunnel Gateway can’t successfully route traffic to that corporate network.
115+
116+
The default bridge networks are:
117+
118+
- Docker: **172.17.0.0/16**
119+
- Podman: **10.0.88.0.0/16**
120+
121+
To avoid conflicts, you can reconfigure both Podman and Docker to use a bridge network that you specify.
122+
123+
> [!IMPORTANT]
124+
> The Tunnel Gateway server must be installed before you can change the bridge network configuration.
125+
126+
#### Change the default bridge network used by Docker
127+
128+
Docker uses the file **/etc/docker/daemon.json** to configure a new default bridge IP address. In the file, the bridge IP address must be specified in CIDR (Classless inter-domain routing) notation, a compact way to represent an IP address along with its associated subnet mask and routing prefix.
129+
130+
> [!IMPORTANT]
131+
> The IP address that's used in the following steps is an example. Be sure the IP address you use doesn't conflict with your corporate network.
132+
133+
1. Use the following command to stop the MS Tunnel Gateway container: `sudo mst-cli server stop ; sudo mst-cli agent stop`
134+
135+
2. Next, run the following command to remove the existing Docker bridge device: `sudo ip link del docker0`
136+
137+
3. If the file **/etc/docker/daemon.json** is present on your server, use a file editor like *vi* or *nano* to modify the file. Run the file editor with root or sudo permissions:
138+
139+
- When the **“bip”:** entry is present with an IP address, modify it by adding a new IP address in CIDR notation.
140+
- When the **“bip”:** entry isn't present, you must add both the value **"bip":** and the new IP address in CIDR notation.
141+
142+
The following example shows the structure of a *daemon.json* file with an updated **“bip”:** entry that uses a modified IP address of **“192.168.128.1/24”**.
143+
144+
Example of daemon.json:
145+
146+
```
147+
{
148+
"bip": "192.168.128.1/24",
149+
"mtu": 1500,
150+
"default-gateway": "192.168.128.254",
151+
}
152+
```
153+
154+
4. If the file **/etc/docker/daemon.json** isn’t present on your server, run a command similar to the following example to create the file and define the bridge IP that you want to use.
155+
156+
Example: `sudo echo '{ "bip":"192.168.128.1/24" }' > /etc/docker/daemon.json`
157+
158+
5. Use the following command to start the MS Tunnel Gateway container: `sudo mst-cli agent start ; sudo mst-cli server start`
159+
160+
For more information, see [Use bridge networks](https://docs.docker.com/network/bridge/#configure-the-default-bridge-network) in the Docker documentation.
161+
162+
#### Change the default bridge network used by Podman
163+
164+
Podman uses the file **/etc/cni/net.d as 87-podman-bridge.conflist** to configure a new default bridge IP address.
165+
166+
1. Use the following command to stop the MS Tunnel Gateway container: `sudo mst-cli server stop ; sudo mst-cli agent stop`
167+
168+
2. Next, run the following command to remove the existing Podman bridge device: `sudo ip link del cni-podman0`
169+
170+
3. Using root permissions and a file editor like *vi* or *nano*, modify **/etc/cni/net.d as 87-podman-bridge.conflist** to update the defaults for **“subnet:”** and **“gateway:”** by replacing the Podman default values with your desired subnet and gateway addresses. The *subnet* address must be specified in CIDR notation.
171+
172+
The Podman defaults are:
173+
174+
- subnet: 10.88.0.0/16
175+
- gateway: 10.88.0.1
176+
177+
4. Use the following command to restart the MS Tunnel Gateway containers: `sudo mst-cli agent start ; sudo mst-cli server start`
178+
179+
For more information, see [Configuring container networking with Podman](https://www.redhat.com/sysadmin/container-networking-podman) in the Red Hat documentation.
180+
112181
## Network
113182

114183
- **Enable packet forwarding for IPv4**: Each Linux server that hosts the Tunnel server software must have IP forwarding for IPv4 enabled. To check on the status of IP forwarding, on the server run one of the following generic commands as *root* or *sudo*. Both commands return a value of **0** for *disabled* and a value of **1** for *enabled*:

0 commit comments

Comments
 (0)