On your OpenShift environment, deploy the CN-Series firewalls.
Where Can I Use
This? | What Do I Need? |
- CN-Series deployment on OpenShift
environment
|
- CN-Series 10.1.x or above Container Images
- Panorama running PAN-OS 10.1.x or above
version
|
The pan-cni secures traffic on the default
"eth0" interface of the application pod. If you have multi-homed
pods, you can configure the CN-NGFW pod to secure additional interfaces
that are configured with a bridge-based connection to communicate
with other pods or the host. Depending on the annotation in the
application YAML, you can configure the CN-Series firewall to inspect
traffic from all the interfaces or a selected number of interfaces
attached to each pod.
The pan-cni doesn't create any network
and hence doesn't need IP addresses like other CNI plugins.
PAN-OS
10.1.3 or later is required to deploy the CN-Series as Kubernetes Service
on OpenShift. Additionally, the CN-Series as a Kubernetes Service
on OpenShift only secures interface eth0.