Service Tunnel Capability

Enabling Service Tunnel for an Org

  • Updated on May 22, 2024

An Org needs to be configured to use Service Tunnel capabilities - be it Satellite-Access Tier tunnels or EndUser-Access Tier tunnels.

1. IsTunnelEnabled

Set a flag that will enable Service Tunnel UI elements.

curl -H "Authorization: Bearer $YOUR_TOKEN" -d "IsTunnelEnabled=true" $API_ENDPOINT/update_org        

2. Tunnel Endpoint CIDRs

Create the Endpoint CIDR ranges via Settings > Network Settings > Service Tunnel. These are the Endpoint IPs that Wireguard will use. To ensure these ranges don’t overlap with the Org’s existing private networks, we use the 100.64 CGNAT address space. More details in this article from Tailscale.

Tunnel Endpoint CIDRs

You need to set 2 Endpoint CIDRs for each scenario.

Scenario Used For Parameter CIDR Range IPs Total Addresses
Connector-Access Tier tunnels access_tier_satellite 100.120.0.0/16 100.120.0.0 - 100.120.255.255 65,536
Connector-Access Tier tunnels satellite 100.100.0.0/16 100.100.0.0 - 100.100.255.255 65,536
         
EndUser-Access Tier tunnels access_tier_enduser_device 100.110.0.0/16 100.110.0.0 - 100.110.255.255 65,536
EndUser-Access Tier tunnels enduser_device 100.64.0.0/11 100.64.0.0 - 100.95.255.255 2,097,152

Now, you can go ahead and follow the docs to install an Access Tier, Connector, etc