--- title: Control Egress Traffic description: Describes how to configure Istio to route traffic from services in the mesh to external services. weight: 40 --- > This task uses the new [v1alpha3 traffic management API](/blog/2018/v1alpha3-routing/). The old API has been deprecated and will be removed in the next Istio release. If you need to use the old version, follow the docs [here](https://archive.istio.io/v0.7/docs/tasks/traffic-management/). By default, Istio-enabled services are unable to access URLs outside of the cluster because iptables is used in the pod to transparently redirect all outbound traffic to the sidecar proxy, which only handles intra-cluster destinations. This task describes how to configure Istio to expose external services to Istio-enabled clients. You'll learn how to enable access to external services by defining [ServiceEntry](/docs/reference/config/istio.networking.v1alpha3/#ServiceEntry) configurations, or alternatively, to simply bypass the Istio proxy for a specific range of IPs. ## Before you begin * Setup Istio by following the instructions in the [Installation guide](/docs/setup/). * Start the [sleep](https://github.com/istio/istio/tree/master/samples/sleep) sample which will be used as a test source for external calls. ```command $ kubectl apply -f <(istioctl kube-inject -f samples/sleep/sleep.yaml) ``` Note that any pod that you can `exec` and `curl` from would do. ## Configuring Istio external services Using Istio `ServiceEntry` configurations, you can access any publicly accessible service from within your Istio cluster. In this task we will use [httpbin.org](http://httpbin.org) and [www.google.com](https://www.google.com) as examples. ### Configuring the external services 1. Create an `ServiceEntry` to allow access to an external HTTP service: ```bash cat <