You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-configure.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ keywords:
5
5
author: brenduns
6
6
ms.author: brenduns
7
7
manager: dougeby
8
-
ms.date: 03/02/2022
8
+
ms.date: 03/03/2022
9
9
ms.topic: how-to
10
10
ms.service: microsoft-intune
11
11
ms.subservice: protect
@@ -45,10 +45,10 @@ Use of a *Server configuration* lets you create a configuration a single time an
45
45
46
46
3. On the **Settings** tab, configure the following items:
47
47
48
-
-**IP address range**: IP addresses within this range are leased to devices when they connect to Tunnel Gateway. The Tunnel Client IP address range specified must not conflict with an on-prem network range. For example, *169.254.0.0/16*.
49
-
-We recommend the Automatic Private IP Addressing (APIPA) range of 169.254.0.0/16, as this range avoids conflicts with other corporate networks.
48
+
-**IP address range**: IP addresses within this range are leased to devices when they connect to Tunnel Gateway. The Tunnel Client IP address range specified must not conflict with an on-premises network range.
49
+
-Consider using the Automatic Private IP Addressing (APIPA) range of 169.254.0.0/16, as this range avoids conflicts with other corporate networks.
50
50
- If the client IP address range conflicts with the destination, it will loopback and fail to communicate with the corporate network.
51
-
-When you select a different client IP address range you must ensure it won't conflict with any existing corporate network IP address ranges.
51
+
-You can select any client IP address range you want to use if it does not conflict with your corporate network IP address ranges.
52
52
53
53
-**DNS servers**: These servers are used when a DNS request comes from a device that's connected to Tunnel Gateway.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-prerequisites.md
+70-1Lines changed: 70 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ keywords:
5
5
author: brenduns
6
6
ms.author: brenduns
7
7
manager: dougeby
8
-
ms.date: 02/17/2022
8
+
ms.date: 03/03/2022
9
9
ms.topic: how-to
10
10
ms.service: microsoft-intune
11
11
ms.subservice: protect
@@ -109,6 +109,75 @@ with documentation for the application, and packages with helper utilities. For
109
109
110
110
-**TLS version**: By default, connections between Microsoft Tunnel clients and servers use TLS 1.3. When TLS 1.3 isn’t available, the connection can fall back to use TLS 1.2.
111
111
112
+
### Default bridge network
113
+
114
+
Both Podman and Docker containers use a bridge network to forward traffic through the Linux host. When the containers bridge network conflicts with a corporate network, Tunnel Gateway can’t successfully route traffic to that corporate network.
115
+
116
+
The default bridge networks are:
117
+
118
+
- Docker: **172.17.0.0/16**
119
+
- Podman: **10.0.88.0.0/16**
120
+
121
+
To avoid conflicts, you can reconfigure both Podman and Docker to use a bridge network that you specify.
122
+
123
+
> [!IMPORTANT]
124
+
> The Tunnel Gateway server must be installed before you can change the bridge network configuration.
125
+
126
+
#### Change the default bridge network used by Docker
127
+
128
+
Docker uses the file **/etc/docker/daemon.json** to configure a new default bridge IP address. In the file, the bridge IP address must be specified in CIDR (Classless inter-domain routing) notation, a compact way to represent an IP address along with its associated subnet mask and routing prefix.
129
+
130
+
> [!IMPORTANT]
131
+
> The IP address that's used in the following steps is an example. Be sure the IP address you use doesn't conflict with your corporate network.
132
+
133
+
1. Use the following command to stop the MS Tunnel Gateway container: `sudo mst-cli server stop ; sudo mst-cli agent stop`
134
+
135
+
2. Next, run the following command to remove the existing Docker bridge device: `sudo ip link del docker0`
136
+
137
+
3. If the file **/etc/docker/daemon.json** is present on your server, use a file editor like *vi* or *nano* to modify the file. Run the file editor with root or sudo permissions:
138
+
139
+
- When the **“bip”:** entry is present with an IP address, modify it by adding a new IP address in CIDR notation.
140
+
- When the **“bip”:** entry isn't present, you must add both the value **"bip":** and the new IP address in CIDR notation.
141
+
142
+
The following example shows the structure of a *daemon.json* file with an updated **“bip”:** entry that uses a modified IP address of **“192.168.128.1/24”**.
143
+
144
+
Example of daemon.json:
145
+
146
+
```
147
+
{
148
+
"bip": "192.168.128.1/24",
149
+
"mtu": 1500,
150
+
"default-gateway": "192.168.128.254",
151
+
}
152
+
```
153
+
154
+
4. If the file **/etc/docker/daemon.json** isn’t present on your server, run a command similar to the following example to create the file and define the bridge IP that you want to use.
5. Use the following command to start the MS Tunnel Gateway container: `sudo mst-cli agent start ; sudo mst-cli server start`
159
+
160
+
For more information, see [Use bridge networks](https://docs.docker.com/network/bridge/#configure-the-default-bridge-network) in the Docker documentation.
161
+
162
+
#### Change the default bridge network used by Podman
163
+
164
+
Podman uses the file **/etc/cni/net.d as 87-podman-bridge.conflist** to configure a new default bridge IP address.
165
+
166
+
1. Use the following command to stop the MS Tunnel Gateway container: `sudo mst-cli server stop ; sudo mst-cli agent stop`
167
+
168
+
2. Next, run the following command to remove the existing Podman bridge device: `sudo ip link del cni-podman0`
169
+
170
+
3. Using root permissions and a file editor like *vi* or *nano*, modify **/etc/cni/net.d as 87-podman-bridge.conflist** to update the defaults for **“subnet:”** and **“gateway:”** by replacing the Podman default values with your desired subnet and gateway addresses. The *subnet* address must be specified in CIDR notation.
171
+
172
+
The Podman defaults are:
173
+
174
+
- subnet: 10.88.0.0/16
175
+
- gateway: 10.88.0.1
176
+
177
+
4. Use the following command to restart the MS Tunnel Gateway containers: `sudo mst-cli agent start ; sudo mst-cli server start`
178
+
179
+
For more information, see [Configuring container networking with Podman](https://www.redhat.com/sysadmin/container-networking-podman) in the Red Hat documentation.
180
+
112
181
## Network
113
182
114
183
-**Enable packet forwarding for IPv4**: Each Linux server that hosts the Tunnel server software must have IP forwarding for IPv4 enabled. To check on the status of IP forwarding, on the server run one of the following generic commands as *root* or *sudo*. Both commands return a value of **0** for *disabled* and a value of **1** for *enabled*:
0 commit comments