This bug has been migrated to another issue tracking site. It has been closed here and may no longer be being monitored.

If you would like to get updates for this issue, or to participate in it, you may do so at Red Hat Issue Tracker .
Bug 2218137 - Support MACSec interfaces
Summary: Support MACSec interfaces
Keywords:
Status: CLOSED MIGRATED
Alias: None
Product: Red Hat Enterprise Linux 9
Classification: Red Hat
Component: nmstate
Version: unspecified
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Gris Ge
QA Contact: Mingyu Shi
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-06-28 10:02 UTC by Eric Nothen
Modified: 2023-08-17 09:57 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-08-17 09:57:28 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker NMT-639 0 None None None 2023-06-28 10:04:06 UTC
Red Hat Issue Tracker   RHEL-1420 0 None None None 2023-08-17 09:57:27 UTC
Red Hat Issue Tracker RHELPLAN-161044 0 None None None 2023-06-28 10:04:11 UTC

Description Eric Nothen 2023-06-28 10:02:41 UTC
Description of problem:

Requesting nmstate to support configuring MACSec interfaces, so that they can be used as slaves of bonds or bridges. This would allow for L2 encryption of all traffic on the network device, eliminating the need to encrypt per service at L7.

Additional info:

This was originally request in the context of RHOSP, here: 

https://bugzilla.redhat.com/show_bug.cgi?id=2111556


Note You need to log in before you can comment on or make changes to this bug.