website/src/app/kb/deploy/resources/readme.mdx
import Alert from "@/components/DocsAlert"; import SupportOptions from "@/components/SupportOptions"; import NextStep from "@/components/NextStep"; import PlanBadge from "@/components/PlanBadge"; import Image from "next/image"; import Link from "next/link";
<PlanBadge plans={["starter", "team", "enterprise"]}>
Resources define subnets, IP addresses, or DNS names you wish to manage access for.
To create a Resource, go to Sites -> <site name> -> Add a Resource.
From there, you can select the type of Resource you want to create:
**.example.com. This will match example.com, sub.example.com, and
sub.sub.example.com.*.example.com. This will match sub.example.com but not
sub.sub.example.com.us-east?.example.com. This will match us-east1.example.com but not
us-eastXY.example.com.foo.*.example.com
will match foo.bar.example.com or foo.**.example.com will match
foo.bar.baz.example.com.10.1.2.0/24 or 2001:db8::/48When multiple Resources' addresses overlap, the Resource with the more specific address will be used.
For CIDR Resources, an address with a longer prefix is more specific than a
shorter one. For example: 10.0.0.0/16 is more specific than 10.0.0.0/8. IP
Resources are essentially addresses with /32 prefix and thus always more
specific than any other CIDR.
For DNS Resources, more specific loosely translates to less wildcards. In particular:
app.example.com is checked before *.example.com.?) take priority over label wildcards (*): For
example, ???.example.com is checked before *.example.com.*) take priority over catch-all wildcards (**): For
example, *.example.com is checked before **.example.com.When creating a Resource, you'll be given the option to add an
address_description. If given, this will be displayed in the Client's Resource
list to help identify the Resource. If a URL is entered, it will be displayed as
a clickable link.
This is commonly used to show a different address to end users than the one used
for routing, where field validations are more restrictive. This can be useful to
provide a bookmark to a service like https://gitlab.company.com, or give hints
for accessing the service, like 10.0.0.1:2222.
<PlanBadge plans={["starter", "team", "enterprise"]}>
Introduced in macOS 1.5.2, iOS 1.5.2, Android 1.5.0, Windows 1.5.0, and Linux 1.5.0.
</Alert>The IP stack setting for DNS Resources controls the types of DNS records
(A for IPv4, AAAA for IPv6) generated by the
stub resolver.
A and AAAA records.A records.AAAA records.This setting primarily enhances compatibility with applications that might not
properly handle ICMP unreachable errors. These errors are typically sent by
the Gateway to indicate that the requested IP stack (e.g., IPv6) does not have
corresponding A or AAAA records for a connection attempt.
Since some applications don't gracefully handle these errors, configuring the IP
stack to IPv4 only or IPv6 only can mitigate such issues by ensuring only
available records are returned.
If you're unsure, it's generally recommended to leave this setting at Dual-stack.
<PlanBadge plans={["team", "enterprise"]}>
<Image src="/images/kb/deploy/resources/traffic_restrictions.png" alt="Traffic restrictions" width={800} height={800} className="mx-auto shadow-sm rounded-sm" />
You can specify optional port range(s) and protocols on the Resource for finer
access control, useful for restricting certain services while allowing others.
Supported protocols currently include ICMP, TCP, and UDP.
One popular use case for traffic restrictions is segmenting access to individual services on a host. To do this, simply create a Resource for each service on the host you want to allow access to, and add the appropriate traffic restrictions to each one.
For example, create an Resource with the TCP/22 restriction to allow SSH
access for your DevOps team, then add another Resource with the TCP/443
restriction to allow access to an HTTPS service for the rest of your
organization.
<PlanBadge plans={["team", "enterprise"]}>
The Internet Resource is a special Resource available on paid plans that allows
you to route 0.0.0.0/0 and ::/0 through Firezone in a full-tunnel
configuration. It functions as a fallback for traffic that doesn't match any
other Resource.
The Internet Resource is automatically enabled on Team and Enterprise plans. To
use it, head to the main Sites section in the admin portal, and look for the
Manage Internet Resource in the section at the bottom of the page.
This will take you to the Internet Site, a special system-managed Site dedicated to hosting the Internet Resource. Here you can deploy Gateways and manage Policies like any other Site.
<Alert color="info"> <strong>Tip:</strong> Deploy geographically-dispersed Gateways to the Internet Site to provide lower latency for a remote workforce. Firezone automatically selects the closest Gateway to route traffic through. </Alert><NextStep href="/kb/deploy/groups">Next: Create Groups</NextStep>
<SupportOptions />