
ConfigurationIn this document
Overview
The DefensX Secure Access solution creates a Zero Trust Network Access (ZTNA) mesh network on top of a distributed infrastructure deployed across Kubernetes clusters. Unlike traditional VPNs, which connect entire IP networks, ZTNA connects individual users to specific services. In this model, every packet includes both a source user identifier and a destination service identifier. Each packet is verified against the security policies defined in the DefensX Backend. Although this approach introduces more processing overhead compared to conventional VPN routing, it offers significantly enhanced security by enforcing strict user-to-service-based access validation.
This design reinforces the user–service mapping model, where IP addresses are irrelevant. Access control is determined entirely by user identity and service configuration policies. Traffic Flow and Mesh RoutingDepending on availability and load balancing parameters, a user may connect through a different worker cluster than the connector hosting the target service. In such cases, the user’s encapsulated traffic securely traverses the DefensX Mesh Network, reaching the target connector privately. It is also possible to use multiple connectors across different regions for various services. Traffic is always routed based on the user and target service relationship. All traffic passing through the DefensX ZTNA network is end-to-end encrypted:
When traffic moves between clusters within the mesh network, no intermediate node decrypts it. Decryption only occurs on the final client or service endpoint, while intermediate nodes can see only the minimal user and service identifiers required for routing. ZTNA ModesYou can configure the ZTNA connection mode per deployment group. To do this, go to the Policies page and click the Advanced Options (red) button for the desired group. DefensX supports four ZTNA connection modes:
Connectors, Services and PoliciesEvery DefensX Agent can function as a ZTNA Connector by assigning the Connector role from the DefensX Backend, no additional software installation is required. Once designated as a connector, the agent can start providing TCP or UDP-based services, either:
The key requirement is that the connector must have network-level access to the service it exposes. Access ControlAny DefensX Agent can access services provided by connectors, as long as permitted by the Secure Access Policies. Secure Access Policies:
If a Secure Access Policy has no group assignment, it applies to all DefensX ZTNA clients, granting them access to the defined services. On-Net / Off-Net ScenariosIf users connect from within an office network that already hosts a DefensX Connector, you can define Office IPs for that connector. ![]() These IPs should correspond to the public IP address used by the connector when accessing the DefensX ZTNA Cloud Network. When a ZTNA client connects from an IP address matching the defined Office IPs, all ZTNA services provided by that connector are disabled locally. This allows the client to access services directly over the local network, bypassing the ZTNA tunnel. Using DefensX ZTNA with Active DirectoryYou can securely expose your Active Directory services through a DefensX Connector, without installing the DefensX Agent directly on your Primary Domain Controller (PDC). It is best practice to use a separate machine (not the PDC) as the connector for Active Directory access. This simplifies configuration and avoids complexities related to Microsoft DNS Server settings. After configuring all required ports in a Secure Access Service, you can:
all securely over the ZTNA network. For detailed configuration steps, see the Active Directory Services Configuration guide. |
||||