diff --git a/docs/network-requirements.md b/docs/network-requirements.md index ed80456882a..076b616aceb 100644 --- a/docs/network-requirements.md +++ b/docs/network-requirements.md @@ -3,17 +3,21 @@ Antrea has a few network requirements to get started, ensure that your hosts and firewalls allow the necessary traffic based on your configuration. -| Configuration | Host(s) | ports/protocols | Other | -|------------------------------------------------|----------------------------|--------------------------------------------|------------------------------| -| Antrea with VXLAN enabled | All | UDP 4789 | | -| Antrea with Geneve enabled | All | UDP 6081 | | -| Antrea with STT enabled | All | TCP 7471 | | -| Antrea with GRE enabled | All | IP Protocol ID 47 | No support for IPv6 clusters | -| Antrea with IPsec ESP enabled | All | IP protocol ID 50 and 51, UDP 500 and 4500 | | -| Antrea with WireGuard enabled | All | UDP 51820 | | -| Antrea Multi-cluster with WireGuard encryption | Multi-cluster Gateway Node | UDP 51821 | | -| All | kube-apiserver host | TCP 443 or 6443\* | | -| All | All | TCP 10349, 10350, 10351, UDP 10351 | | +| Configuration | Host(s) | Protocols/Ports | Other | +|------------------------------------------------|---------------------------------------|--------------------------------------------|------------------------------| +| Antrea with VXLAN enabled | All | UDP 4789 | | +| Antrea with Geneve enabled | All | UDP 6081 | | +| Antrea with STT enabled | All | TCP 7471 | | +| Antrea with GRE enabled | All | IP Protocol ID 47 | No support for IPv6 clusters | +| Antrea with IPsec ESP enabled | All | IP protocol ID 50 and 51, UDP 500 and 4500 | | +| Antrea with WireGuard enabled | All | UDP 51820 | | +| Antrea Multi-cluster with WireGuard encryption | Multi-cluster Gateway Node | UDP 51821 | | +| Antrea with feature BGPPolicy enabled | Selected by user-provided BGPPolicies | TCP 179[1] | | +| All | Kube-apiserver host | TCP 443 or 6443[2] | | +| All | All | TCP 10349, 10350, 10351, UDP 10351 | | -\* _The value passed to kube-apiserver using the --secure-port flag. If you cannot -locate this, check the targetPort value returned by kubectl get svc kubernetes -o yaml._ +[1] _The default value is 179, but a user created BGPPolicy can assign a different +port number._ + +[2] _The value is passed to kube-apiserver `--secure-port` flag. You can find the port +number from the output of `kubectl get svc kubernetes -o yaml`._