This knowledge base article covers the deployment topology that could be used to install Windows Runtime Tiles in different isolation segment networks.
The use case is to deploy Windows Runtime tile/s in the DMZ network/s, and have a different set of routers to handle the traffic to the applications running on those windows Diego cells. Since WRT does not come with routers, we deploy WRT along with Isolation Segment tile, so there are dedicates routers to cater the applications deployed on those specific WRT Diego cells.
Why not use the default routers that come with PAS, for handling external application traffic?
The following diagram illustrates a deployment where there are 5 networks:
In this deployment, there are dedicated VIP’s to handle traffic for
Once the deployment is complete, the spaces need to be mapped to the isolation segments. To do this, using the CF CLI, define the isolation segments. Only administrators can perform the following operation.
cf create-isolation-segment ext-is1
cf create-isolation-segment ext-is2
Once the segments have been defined, they need to be mapped to the Orgs. To do this execute:
cf enable-org-isolation <ORG-NAME> ext-is1
cf enable-org-isolation <ORG-NAME> ext-is2
Next, bind the space to the isolation segment.
cf set-space-isolation-segment <SPACE-NAME> ext-is1
cf set-space-isolation-segment <SPACE-NAME> ext-is2
Next, define the new shared/private domains
cf create-shared-domain cfapps.ext1.env.company.com
cf create-shared-domain cfapps.ext2.env.company.com
At this point, the application developers can push their applications into their respective spaces. They should also specify the external domain for their application.
cf push <App-Name> -d <Shared/private domain> …..