You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/nw-ovn-ipsec-disable.adoc
+17-6Lines changed: 17 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -10,23 +10,34 @@ As a cluster administrator, you can disable IPsec encryption.
10
10
11
11
.Prerequisites
12
12
13
-
* Install the OpenShift CLI (`oc`).
14
-
* Log in to the cluster with a user with `cluster-admin` privileges.
13
+
* You installed the {oc-first}.
14
+
* You logged in to the cluster with a user with `cluster-admin` privileges.
15
15
16
16
.Procedure
17
17
18
-
. To disable IPsec encryption, enter the following command:
18
+
. Choose one of the following options to disable IPsec encryption:
19
+
+
20
+
.. Where the `ipsecConfig.mode` parameter is set to either `External` or `Full` and the `ipsecConfig.full` schema is not added to `networks.operator.openshift.io`, enter the following command:
.. Where the `ipsecConfig.mode` parameter is set to `Full` and the `ipsecConfig.full` configuration is added to `networks.operator.openshift.io`, enter the following command:
. Optional: You can increase the size of your cluster MTU by `46` bytes because there is no longer any overhead from the IPsec ESP header in IP packets.
43
+
. Optional: You can increase the size of your cluster MTU by `46` bytes because there is no longer any overhead from the IPsec Encapsulating Security Payload (ESP) header in IP packets.
Copy file name to clipboardExpand all lines: modules/nw-ovn-ipsec-enable.adoc
+22-1Lines changed: 22 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@
6
6
[id="nw-ovn-ipsec-enable_{context}"]
7
7
= Enabling IPsec encryption
8
8
9
-
As a cluster administrator, you can enable pod-to-pod IPsec encryption, IPsec encryption between the cluster, and external IPsec endpoints.
9
+
As a cluster administrator you can enable pod-to-pod IPsec encryptionbetween the cluster and external IPsec endpoints.
10
10
11
11
You can configure IPsec in either of the following modes:
12
12
@@ -18,6 +18,12 @@ You can configure IPsec in either of the following modes:
18
18
If you configure IPsec in `Full` mode, you must also complete the "Configuring IPsec encryption for external traffic" procedure.
19
19
====
20
20
21
+
If IPsec is enabled in `Full` mode, as a cluster administrator you can configure options for the mode by adding the `full` schema to `networks.operator.openshift.io`. The `full` schema supports the
22
+
`encapsulation` parameter. You can use this parameter to configure network address translation-traversal (NAT-T) encapsulation for IPsec traffic. The `encapsulation` parameter supports the following values:
23
+
24
+
* `Auto` is the default value and enables UDP encapsulation when `libreswan` detects network address translation (NAT) packets in traffic within a node.
25
+
* `Always` enables UDP encapsulation for all traffic types available in a node. This option does not rely upon `libreswan` to detect NAT packets in a node.
<1> Specify `External` to encrypt traffic to external hosts or specify `Full` to encrypt pod-to-pod traffic and, optionally, traffic to external hosts. By default, IPsec is disabled.
50
+
+
51
+
.Example configuration that has IPsec enabled in `Full` mode and `encapsulation` set to `Always`
Copy file name to clipboardExpand all lines: networking/network_security/configuring-ipsec-ovn.adoc
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,7 @@ IPsec is disabled by default. You can enable IPsec either during or after instal
12
12
13
13
The following support limitations exist for IPsec on a {product-title} cluster:
14
14
15
-
* You must disable IPsec before updating to {product-title} 4.15. There is a known issue that can cause interruptions in pod-to-pod communication if you update without disabling IPsec. (link:https://issues.redhat.com/browse/OCPBUGS-43323[*OCPBUGS-43323*])
16
-
* On {ibm-cloud-name}, IPsec supports only NAT-T. Encapsulating Security Payload (ESP) is not supported on this platform.
15
+
* On {ibm-cloud-name}, IPsec supports only network address translation-traversal (NAT-T). Encapsulating Security Payload (ESP) is not supported on this platform.
17
16
* If your cluster uses link:https://www.redhat.com/en/topics/containers/what-are-hosted-control-planes[{hcp}] for Red{nbsp}Hat {product-title}, IPsec is not supported for IPsec encryption of either pod-to-pod or traffic to external hosts.
18
17
* Using ESP hardware offloading on any network interface is not supported if one or more of those interfaces is attached to Open vSwitch (OVS). Enabling IPsec for your cluster triggers the use of IPsec with interfaces attached to OVS. By default, {product-title} disables ESP hardware offloading on any interfaces attached to OVS.
19
18
* If you enabled IPsec for network interfaces that are not attached to OVS, a cluster administrator must manually disable ESP hardware offloading on each interface that is not attached to OVS.
0 commit comments