Skip to main content

On-Premises Systems Integrations Topologies

Secure network configuration options to use with Envoy’s On-Premises Systems integrations

Updated this week

Overview

Envoy has various Physical Access Control and Network Access Control integrations with more coming soon. To connect your on-premises system, Envoy requires that it be publicly reachable via inbound and outbound internet access. Ensuring secure communication between Envoy and your on-premises systems is paramount.

These are the three most common ways that our customers securely make their on-premises systems publicly reachable by Envoy:

  1. Public IP Network Address Translation (NAT)

  2. Demilitarized Zone (DMZ)

  3. Proxy/Reverse Proxy

Option 1: Public IP Network Address Translation (NAT):

Use a Public IP NAT to make the server accessible to Envoy.

  1. A public IP address will be necessary for Envoy to communicate.

  2. Inbound traffic from Envoy should be allowed on your firewall and routed (NAT) to the on-premises system.

Option 2: DMZ (Demilitarized Zone):

A DMZ is an isolated subnetwork designed to allow external access to specific systems (such as Envoy) while keeping the rest of the organization's network closed to external access.

The on-premises system can exist in the DMZ or your internal network. A DMZ can be created by implementing a dual firewall setup:

  1. A firewall between the internet and the DMZ

  2. Another firewall between the DMZ and your internal network.

Steps:

  1. Allowlist Envoy’s IP addresses to communicate with your DMZ firewall

  2. Route traffic appropriately to the on-premises system.

Option 3: Proxy/Reverse Proxy:

A proxy or reverse proxy is an intermediary server that sits between Envoy and your on-premises system. Envoy will send requests to the proxy server, which then forwards them to your on-premises system.

The on-premises system will respond through the proxy, which will send the traffic to Envoy. Through this method, Envoy will never interact directly with your on-premises system. This can be accomplished by selecting a proxy server software and configuring the traffic to route.

Did this answer your question?