SlideShare a Scribd company logo
Calico to Secure Host Interfaces
Rajesh Kumar
2
Calico to Secure Host Interfaces
Will discuss how to use Calico to secure the network
interfaces of the host itself (as opposed to those of
any container/VM workloads that are present on the
host). We call such interfaces “host endpoints”, to
distinguish them from “workload endpoints” (such as
containers or VMs).
Calico supports the same rich security policy model
for host endpoints that it supports for workload
endpoints. Host endpoints can have labels, and their
labels are in the same “namespace” as those of
workload endpoints. This allows security rules for
either type of endpoint to refer to the other type (or a
3
Calico to Secure Host Interfaces
Calico does not support setting IPs or policing MAC
addresses for host interfaces, it assumes that the
interfaces are configured by the underlying network
fabric.
Calico distinguishes workload endpoints from host
endpoints by a configurable prefix. Unless you
happen to have host interfaces whose name matches
the default for that prefix (cali), you won’t need to
change it. In case you do, see the InterfacePrefix
configuration value at Configuring Felix. Interfaces
that start with a value listed in InterfacePrefix are
assumed to be workload interfaces. Others are
4
Calico to Secure Host Interfaces
As of Calico v2.1.0, Calico applies host endpoint
security policy both to traffic that is terminated locally,
and to traffic that is forwarded between host
endpoints. Previously, policy was only applied to
traffic that was terminated locally. The change allows
Calico to be used to secure a NAT gateway or router.
Calico supports selector-based policy as normal
when running on a gateway or router allowing for rich,
dynamic security policy based on the labels attached
to your workloads.
5
Calico to Secure Host Interfaces
Note: If you have a host with workloads on it then traffic that is forwarded to
workloads bypasses the policy applied to host endpoints. If that weren’t the case,
the host endpoint policy would need to be very broad to allow all traffic destined for
any possible workload.
Since version 2.1.0, Calico applies host endpoint policy to traffic that is being
forwarded between host interfaces.
6
Installation overview
To make use of Calico’s host endpoint support, you
will need to follow these steps, described in more
detail below:
•download the calicoctl binary
•create an etcd cluster, if you haven’t already
•install Calico’s Felix daemon on each host
•initialize the etcd database
•add policy to allow basic connectivity and Calico
function
•create host endpoint objects in etcd for each
interface you want Calico to police (in a later release,
we plan to support interface templates to remove the
7
Creating an etcd cluster
If you haven’t already created an etcd cluster for your
Calico deployment, you’ll need to create one.
To create a single-node etcd cluster for testing,
download an etcd v3.x release from the etcd releases
archive; we recommend using the most recent bugfix
release. Then follow the instructions on that page to
unpack and run the etcd binary.
To create a production cluster, you should follow the
guidance in the etcd manual. In particular, the
clustering guide.
8
Creating an etcd cluster
If you haven’t already created an etcd cluster for your
Calico deployment, you’ll need to create one.
To create a single-node etcd cluster for testing,
download an etcd v3.x release from the etcd releases
archive; we recommend using the most recent bugfix
release. Then follow the instructions on that page to
unpack and run the etcd binary.
To create a production cluster, you should follow the
guidance in the etcd manual. In particular, the
clustering guide.
Thank You
Thank You

More Related Content

What's hot (20)

PDF
Simplifying and Securing your OpenShift Network with Project Calico
Andrew Randall
 
PPTX
Simple, Scalable and Secure Networking for Data Centers with Project Calico
Emma Gordon
 
PPT
Calico and BGP
Anirban Sen Chowdhary
 
PDF
How we built Packet's bare metal cloud platform
Packet
 
PDF
Container Networking - State of the Ecosystem [ContainerConf, Mannheim, Nov 2...
Karthik Prabhakar
 
PDF
Let's Talk about Packet
Packet
 
PPT
Calico and mesos
Anirban Sen Chowdhary
 
PPTX
20170705 kubernetes with calico
Isaac Tseng
 
PPT
Calico and juju
Anirban Sen Chowdhary
 
PDF
Container network security
Daisuke Nakajima
 
PDF
Interop2018 contrail ContrailEnterpriseMulticloud
Daisuke Nakajima
 
PPTX
The Challenges of Becoming Cloud Native
Ben Hall
 
PDF
MidoNet 101
alexbikfalvi
 
PDF
Open contrailmeetup
Daisuke Nakajima
 
PPTX
Dangerous Demo, Metaswitch TADSummit 2015, Paul Drew
Alan Quayle
 
PDF
Microservices for Enterprises - Consistent Network & Security services for Co...
Dhananjay Sampath
 
PDF
Cisco Live 2017: Container networking deep dive with Docker Enterprise Editio...
Sanjeev Rampal
 
PDF
Contrail integrated with Kubernetes and Openstack
Daisuke Nakajima
 
PDF
Networking For Nested Containers: Magnum, Kuryr, Neutron Integration
Fawad Khaliq
 
Simplifying and Securing your OpenShift Network with Project Calico
Andrew Randall
 
Simple, Scalable and Secure Networking for Data Centers with Project Calico
Emma Gordon
 
Calico and BGP
Anirban Sen Chowdhary
 
How we built Packet's bare metal cloud platform
Packet
 
Container Networking - State of the Ecosystem [ContainerConf, Mannheim, Nov 2...
Karthik Prabhakar
 
Let's Talk about Packet
Packet
 
Calico and mesos
Anirban Sen Chowdhary
 
20170705 kubernetes with calico
Isaac Tseng
 
Calico and juju
Anirban Sen Chowdhary
 
Container network security
Daisuke Nakajima
 
Interop2018 contrail ContrailEnterpriseMulticloud
Daisuke Nakajima
 
The Challenges of Becoming Cloud Native
Ben Hall
 
MidoNet 101
alexbikfalvi
 
Open contrailmeetup
Daisuke Nakajima
 
Dangerous Demo, Metaswitch TADSummit 2015, Paul Drew
Alan Quayle
 
Microservices for Enterprises - Consistent Network & Security services for Co...
Dhananjay Sampath
 
Cisco Live 2017: Container networking deep dive with Docker Enterprise Editio...
Sanjeev Rampal
 
Contrail integrated with Kubernetes and Openstack
Daisuke Nakajima
 
Networking For Nested Containers: Magnum, Kuryr, Neutron Integration
Fawad Khaliq
 

Similar to Calico to secure host interfaces (20)

PPT
Protecting host with calico
Anirban Sen Chowdhary
 
PPT
Calico with docker
D.Rajesh Kumar
 
PPTX
Kubernetes Online Training
navyatejavisualpath
 
PPT
Drive into calico architecture part 2
Anirban Sen Chowdhary
 
PPT
Calico with open stack
D.Rajesh Kumar
 
PPT
Calico and stars policy
Anirban Sen Chowdhary
 
PPT
Calico integration
Anirban Sen Chowdhary
 
PDF
Introduction to the Container Networking and Security
Cloud 66
 
PPT
Calico and how interprets neutron api
D.Rajesh Kumar
 
PPT
Calico and open shift
Anirban Sen Chowdhary
 
PPT
Calico and simple policy
Anirban Sen Chowdhary
 
PPT
Calico and container
D.Rajesh Kumar
 
PDF
Calico-eBPF-Dataplane-CNCF-Webinar-Slides.pdf
yingxinwang4
 
PPTX
Intro to Project Calico: a pure layer 3 approach to scale-out networking
Packet
 
PPT
Calico docker+ipam
D.Rajesh Kumar
 
PPT
Calico in networking mode
Anirban Sen Chowdhary
 
PPTX
Container Networking Meetup March 31 2016
Andrew Randall
 
PDF
Replacing iptables with eBPF in Kubernetes with Cilium
Michal Rostecki
 
PPT
Calico and ubuntu
Anirban Sen Chowdhary
 
PDF
IPv6 SenD
rabdoul
 
Protecting host with calico
Anirban Sen Chowdhary
 
Calico with docker
D.Rajesh Kumar
 
Kubernetes Online Training
navyatejavisualpath
 
Drive into calico architecture part 2
Anirban Sen Chowdhary
 
Calico with open stack
D.Rajesh Kumar
 
Calico and stars policy
Anirban Sen Chowdhary
 
Calico integration
Anirban Sen Chowdhary
 
Introduction to the Container Networking and Security
Cloud 66
 
Calico and how interprets neutron api
D.Rajesh Kumar
 
Calico and open shift
Anirban Sen Chowdhary
 
Calico and simple policy
Anirban Sen Chowdhary
 
Calico and container
D.Rajesh Kumar
 
Calico-eBPF-Dataplane-CNCF-Webinar-Slides.pdf
yingxinwang4
 
Intro to Project Calico: a pure layer 3 approach to scale-out networking
Packet
 
Calico docker+ipam
D.Rajesh Kumar
 
Calico in networking mode
Anirban Sen Chowdhary
 
Container Networking Meetup March 31 2016
Andrew Randall
 
Replacing iptables with eBPF in Kubernetes with Cilium
Michal Rostecki
 
Calico and ubuntu
Anirban Sen Chowdhary
 
IPv6 SenD
rabdoul
 
Ad

More from D.Rajesh Kumar (20)

PPTX
Mule soft meetup_-_finland_september_25th__2020 v2.0
D.Rajesh Kumar
 
PPTX
Meetup bangalore-sept5th 2020 (1)
D.Rajesh Kumar
 
PPTX
Mule soft meetup_-_finland_july_11th__2020
D.Rajesh Kumar
 
PPTX
Bangalore mulesoft meetup#10
D.Rajesh Kumar
 
PPTX
Meetup bangalore 9_novupdated
D.Rajesh Kumar
 
PPTX
Meetup bangalore aug31st2019
D.Rajesh Kumar
 
PPTX
Meetup bangalore june29th2019
D.Rajesh Kumar
 
PPTX
mulesoft meetup @ bangalore
D.Rajesh Kumar
 
PPTX
Meetup_Bangalore_Rajesh
D.Rajesh Kumar
 
PPT
Calico with open stack and chef
D.Rajesh Kumar
 
PPT
Object Store in Mule
D.Rajesh Kumar
 
PPT
Slack connector with in MULE
D.Rajesh Kumar
 
PPT
MuleSoft Offers a Data Migration Solution
D.Rajesh Kumar
 
ODP
Mule version-crowd highlights
D.Rajesh Kumar
 
ODP
Mule ctf
D.Rajesh Kumar
 
PPT
Sdlc with mule esb
D.Rajesh Kumar
 
ODP
Mule exception handlingstrategies
D.Rajesh Kumar
 
ODP
Anypoint platform security components
D.Rajesh Kumar
 
ODP
Mule esb domain
D.Rajesh Kumar
 
ODP
Mule esb transaction mgmt
D.Rajesh Kumar
 
Mule soft meetup_-_finland_september_25th__2020 v2.0
D.Rajesh Kumar
 
Meetup bangalore-sept5th 2020 (1)
D.Rajesh Kumar
 
Mule soft meetup_-_finland_july_11th__2020
D.Rajesh Kumar
 
Bangalore mulesoft meetup#10
D.Rajesh Kumar
 
Meetup bangalore 9_novupdated
D.Rajesh Kumar
 
Meetup bangalore aug31st2019
D.Rajesh Kumar
 
Meetup bangalore june29th2019
D.Rajesh Kumar
 
mulesoft meetup @ bangalore
D.Rajesh Kumar
 
Meetup_Bangalore_Rajesh
D.Rajesh Kumar
 
Calico with open stack and chef
D.Rajesh Kumar
 
Object Store in Mule
D.Rajesh Kumar
 
Slack connector with in MULE
D.Rajesh Kumar
 
MuleSoft Offers a Data Migration Solution
D.Rajesh Kumar
 
Mule version-crowd highlights
D.Rajesh Kumar
 
Mule ctf
D.Rajesh Kumar
 
Sdlc with mule esb
D.Rajesh Kumar
 
Mule exception handlingstrategies
D.Rajesh Kumar
 
Anypoint platform security components
D.Rajesh Kumar
 
Mule esb domain
D.Rajesh Kumar
 
Mule esb transaction mgmt
D.Rajesh Kumar
 
Ad

Recently uploaded (20)

PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
July Patch Tuesday
Ivanti
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Python basic programing language for automation
DanialHabibi2
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
July Patch Tuesday
Ivanti
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Python basic programing language for automation
DanialHabibi2
 

Calico to secure host interfaces

  • 1. Calico to Secure Host Interfaces Rajesh Kumar
  • 2. 2 Calico to Secure Host Interfaces Will discuss how to use Calico to secure the network interfaces of the host itself (as opposed to those of any container/VM workloads that are present on the host). We call such interfaces “host endpoints”, to distinguish them from “workload endpoints” (such as containers or VMs). Calico supports the same rich security policy model for host endpoints that it supports for workload endpoints. Host endpoints can have labels, and their labels are in the same “namespace” as those of workload endpoints. This allows security rules for either type of endpoint to refer to the other type (or a
  • 3. 3 Calico to Secure Host Interfaces Calico does not support setting IPs or policing MAC addresses for host interfaces, it assumes that the interfaces are configured by the underlying network fabric. Calico distinguishes workload endpoints from host endpoints by a configurable prefix. Unless you happen to have host interfaces whose name matches the default for that prefix (cali), you won’t need to change it. In case you do, see the InterfacePrefix configuration value at Configuring Felix. Interfaces that start with a value listed in InterfacePrefix are assumed to be workload interfaces. Others are
  • 4. 4 Calico to Secure Host Interfaces As of Calico v2.1.0, Calico applies host endpoint security policy both to traffic that is terminated locally, and to traffic that is forwarded between host endpoints. Previously, policy was only applied to traffic that was terminated locally. The change allows Calico to be used to secure a NAT gateway or router. Calico supports selector-based policy as normal when running on a gateway or router allowing for rich, dynamic security policy based on the labels attached to your workloads.
  • 5. 5 Calico to Secure Host Interfaces Note: If you have a host with workloads on it then traffic that is forwarded to workloads bypasses the policy applied to host endpoints. If that weren’t the case, the host endpoint policy would need to be very broad to allow all traffic destined for any possible workload. Since version 2.1.0, Calico applies host endpoint policy to traffic that is being forwarded between host interfaces.
  • 6. 6 Installation overview To make use of Calico’s host endpoint support, you will need to follow these steps, described in more detail below: •download the calicoctl binary •create an etcd cluster, if you haven’t already •install Calico’s Felix daemon on each host •initialize the etcd database •add policy to allow basic connectivity and Calico function •create host endpoint objects in etcd for each interface you want Calico to police (in a later release, we plan to support interface templates to remove the
  • 7. 7 Creating an etcd cluster If you haven’t already created an etcd cluster for your Calico deployment, you’ll need to create one. To create a single-node etcd cluster for testing, download an etcd v3.x release from the etcd releases archive; we recommend using the most recent bugfix release. Then follow the instructions on that page to unpack and run the etcd binary. To create a production cluster, you should follow the guidance in the etcd manual. In particular, the clustering guide.
  • 8. 8 Creating an etcd cluster If you haven’t already created an etcd cluster for your Calico deployment, you’ll need to create one. To create a single-node etcd cluster for testing, download an etcd v3.x release from the etcd releases archive; we recommend using the most recent bugfix release. Then follow the instructions on that page to unpack and run the etcd binary. To create a production cluster, you should follow the guidance in the etcd manual. In particular, the clustering guide.