Ingress and egress requests are elementary to the operation of your network communication. Ingress requests are incoming traffic, while egress requests are outgoing traffic. If both types of requests are not secured properly, they can pose lots of security risks to your network.
In the case of Ingress requests, if proper security measures are not put in place, unauthorized access can lead to data breaches, malware infections, and other cyber attacks. On the other hand, unsecured egress requests can result in data leakage, unauthorized data transfer, and other security vulnerabilities.
By leveraging WireGuard VPN's state-of-the-art cryptographic primitives, including Curve25519 for key exchange and ChaCha20 for encryption, your organization can establish secure tunnel transmission, mitigating the risks associated with unencrypted or vulnerable network communications.
Ingress requests refer to incoming network traffic attempting to access resources within your network. This influx of data presents a gilt-edged opportunity for malicious entities to infiltrate your systems and compromise sensitive information. Therefore, implementing robust measures like a Wireguard VPN to safeguard against unauthorized access is vitally important.
A Wireguard VPN secures ingress requests by establishing encrypted tunnels between clients and servers. It operates by creating secure point-to-point connections, effectively encrypting all traffic passing through these connections. By deploying a Wireguard VPN, your organization can create a secure pathway for ingress requests, thereby ensuring data transmission between clients and servers remains confidential and secure.
Follow these steps to implement Wireguard VPN for securing ingress traffic:
Netmaker enables any WireGuard-enabled device to connect to a network through a Remote Access Gateway (ingress). That includes devices like phones, laptops, and desktops that support WireGuard. Netmaker’s Remote Access Client adds additional capabilities like user authentication and session expiration.
In either case, devices use a WireGuard config file to access the Remote Access Gateway, which then forwards traffic to the intended destination. This setup allows any device capable of running WireGuard to join a Netmaker network. While it's recommended to use the Remote Access Client for end users, other machines can be configured for more static access using standard WireGuard config files.
Additionally, Remote Access Gateways can function as internet gateways, routing all client traffic through them to conceal the client's public IP address securely. Configuration for internet gateways can be done via the Internet Gateway tab in Netmaker.
To set up a Remote Access Gateway, clients need to connect to it. By default, your network doesn't have one, so you'll need to configure it by accessing the network settings and navigating to the "Remote Access" tab.
Clicking the "Create Client Config" button brings up a window where you select a host to use as the gateway. Any host with a public IP address will work, but avoid ones behind a NAT. The Netmaker server itself can serve as a gateway and is a suitable default choice if you're unsure. You can also choose whether the gateway should route all public traffic to the internet, acting as an internet gateway. Additionally, there's an option to specify a default DNS server for all connected clients.
Egress requests represent the flow of data from your network to external destinations. These requests encompass various protocols and applications, including web browsing, email communication, file transfers, and more. Without strong security measures put in place, your egress traffic can be interpreted, intercepted, manipulated, or exploited by malicious actors, thereby compromising the confidentiality, integrity, and availability of sensitive data.
Wireguard VPN safeguards egress traffic by offering encryption, authentication, and tunneling features to establish secure communication channels between your internal network resources and external destinations. By encapsulating egress traffic within encrypted tunnels, Wireguard VPN can help ensure that the confidentiality and integrity of your company’s data remains intact, mitigating the risks associated with unsecured data transmission over the internet.
The following steps will guide you to effectively implement Wireguard VPN for securing ingress traffic:
Netmaker enables your clients to connect to external networks through an Egress Gateway. This gateway is a network client installed on a server or router that can access a specific subnet.
Within the Netmaker user interface, this node is designated as an "egress gateway," with defined ranges it can reach. Once established, all clients within the network, including new external clients, can access these specified ranges through the gateway.
Configuring an Egress Gateway involves simple steps. Firstly, you must identify the remote access requirements, such as VPCs, Kubernetes networks, or home and office networks. Next, deploy a netclient in a stable location with access to the network, typically a Linux server. Stability is crucial to avoid frequent IP changes or unexpected shutdowns. Once the subnet is identified and the netclient deployed, access the Netmaker UI. In the sidebar, select the network and navigate to the egress section.
At this stage, you'll select your preferred host for egress usage. You have the option to decide whether to employ NAT with the switch or not. Enter your chosen CIDR for the egress range(s) in the provided field. You can add additional egress ranges for the host by clicking the "add range" button. The interface is automatically selected and won't be displayed in this window. Once all fields are completed, click on the "create" button.
Netmaker will set either iptables or nftables regulations on the node, depending on which one is installed on your client. This action will enable the node to direct traffic from the network to the designated range(s) according to the specified rules.
The Egress Gateway is only supported on Linux. For non-Linux devices, follow this guide to use the Remote Access Gateway and customized WireGuard config files to achieve the same results with any WireGuard-compatible device, like Routers.
GET STARTED