If I understand you correctly, then you’ll create something like:
App definitions:
- RDP-SSH-APP 10.0.0.0/16 ports 22, 3389
- Business-APP1 10.0.0.1/32 ports XX
Policies:
- RDP-SSH-APP group Admins action Allow
- Business-APP1 group BusApp1 action Allow
The key here in my experience is not to have overlapping host+port definitions in App definitions, so XX=22 or XX=3389 above might cause issues in policy processing in NPA.
From a ZTNA perspective you can argue, that building a 10.0.0.0/8 policy is hardly ZTNA, even if ports are locked down to administration tools, but I would expect it to work. We have played with /16 definitions without any issues.
Thanks for the reply. You are correct. The employees who support our infrastructure need access to the entire subnet for troubleshooting and building hundreds of servers and network devices.
I planned to create the below configuration.
APP1
RDP-SSH-APP 10.0.0.0/8 - Admins action allowed - This will cover all server and network admins. I have 10 admins that will have access to this private app.
Ports - 22,3389 and any other ports that are needed.
APP2
Business-APP (This will be configured separately)
This will be done as true ZTNA. The apps will be entered individually with IPs and hostnames.
Your thoughts?
As long as you don’t have overlaps in TCP/UDP ports between RDP-SSH-APP and the Business-APPs, then I suspect it will work.
From a policy perspective, it seems a bit lazy from your Admins, to just ask for 10.0.0.0/8 access.
IMHO, this too should be narrowed down to the server and network administration subnets.
This could be done with a script using API calls or a small Terraform file that maintains this, and if you build them as multiple apps and tag them all you can apply a bulk policy, such that no policy updates are required when you add/delete segments from that list.
Thanks for the update; excellent point.
I will verify if the subnets are divided between servers and network administration. I think the same team members access both. This is due to having backup personnel.