Reference documentation and code samples for the Compute V1 Client class InterconnectMacsec.
Configuration information for enabling Media Access Control security (MACsec) on this Cloud Interconnect connection between Google and your on-premises router.
Generated from protobuf message google.cloud.compute.v1.InterconnectMacsec
Namespace
Google \ Cloud \ Compute \ V1
Methods
__construct
Constructor.
Parameters
Name
Description
data
array
Optional. Data for populating the Message object.
↳ fail_open
bool
If set to true, the Interconnect connection is configured with a should-secure MACsec security policy, that allows the Google router to fallback to cleartext traffic if the MKA session cannot be established. By default, the Interconnect connection is configured with a must-secure security policy that drops all traffic if the MKA session cannot be established with your router.
Required. A keychain placeholder describing a set of named key objects along with their start times. A MACsec CKN/CAK is generated for each key in the key chain. Google router automatically picks the key with the most recent startTime when establishing or re-establishing a MACsec secure link.
getFailOpen
If set to true, the Interconnect connection is configured with a should-secure MACsec security policy, that allows the Google router to fallback to cleartext traffic if the MKA session cannot be established. By default, the Interconnect connection is configured with a must-secure security policy that drops all traffic if the MKA session cannot be established with your router.
Returns
Type
Description
bool
hasFailOpen
clearFailOpen
setFailOpen
If set to true, the Interconnect connection is configured with a should-secure MACsec security policy, that allows the Google router to fallback to cleartext traffic if the MKA session cannot be established. By default, the Interconnect connection is configured with a must-secure security policy that drops all traffic if the MKA session cannot be established with your router.
Parameter
Name
Description
var
bool
Returns
Type
Description
$this
getPreSharedKeys
Required. A keychain placeholder describing a set of named key objects along with their start times. A MACsec CKN/CAK is generated for each key in the key chain. Google router automatically picks the key with the most recent startTime when establishing or re-establishing a MACsec secure link.
Required. A keychain placeholder describing a set of named key objects along with their start times. A MACsec CKN/CAK is generated for each key in the key chain. Google router automatically picks the key with the most recent startTime when establishing or re-establishing a MACsec secure link.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-28 UTC."],[],[],null,["# Compute V1 Client - Class InterconnectMacsec (1.35.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.35.0 (latest)](/php/docs/reference/cloud-compute/latest/V1.InterconnectMacsec)\n- [1.34.0](/php/docs/reference/cloud-compute/1.34.0/V1.InterconnectMacsec)\n- [1.33.0](/php/docs/reference/cloud-compute/1.33.0/V1.InterconnectMacsec)\n- [1.32.0](/php/docs/reference/cloud-compute/1.32.0/V1.InterconnectMacsec)\n- [1.31.0](/php/docs/reference/cloud-compute/1.31.0/V1.InterconnectMacsec)\n- [1.30.0](/php/docs/reference/cloud-compute/1.30.0/V1.InterconnectMacsec)\n- [1.29.0](/php/docs/reference/cloud-compute/1.29.0/V1.InterconnectMacsec)\n- [1.28.0](/php/docs/reference/cloud-compute/1.28.0/V1.InterconnectMacsec)\n- [1.27.0](/php/docs/reference/cloud-compute/1.27.0/V1.InterconnectMacsec)\n- [1.26.0](/php/docs/reference/cloud-compute/1.26.0/V1.InterconnectMacsec)\n- [1.25.0](/php/docs/reference/cloud-compute/1.25.0/V1.InterconnectMacsec)\n- [1.24.0](/php/docs/reference/cloud-compute/1.24.0/V1.InterconnectMacsec)\n- [1.23.0](/php/docs/reference/cloud-compute/1.23.0/V1.InterconnectMacsec)\n- [1.22.1](/php/docs/reference/cloud-compute/1.22.1/V1.InterconnectMacsec)\n- [1.21.0](/php/docs/reference/cloud-compute/1.21.0/V1.InterconnectMacsec)\n- [1.20.0](/php/docs/reference/cloud-compute/1.20.0/V1.InterconnectMacsec)\n- [1.19.0](/php/docs/reference/cloud-compute/1.19.0/V1.InterconnectMacsec)\n- [1.18.1](/php/docs/reference/cloud-compute/1.18.1/V1.InterconnectMacsec)\n- [1.17.0](/php/docs/reference/cloud-compute/1.17.0/V1.InterconnectMacsec)\n- [1.16.2](/php/docs/reference/cloud-compute/1.16.2/V1.InterconnectMacsec)\n- [1.14.0](/php/docs/reference/cloud-compute/1.14.0/V1.InterconnectMacsec)\n- [1.13.0](/php/docs/reference/cloud-compute/1.13.0/V1.InterconnectMacsec)\n- [1.12.1](/php/docs/reference/cloud-compute/1.12.1/V1.InterconnectMacsec)\n- [1.11.1](/php/docs/reference/cloud-compute/1.11.1/V1.InterconnectMacsec)\n- [1.10.1](/php/docs/reference/cloud-compute/1.10.1/V1.InterconnectMacsec)\n- [1.9.1](/php/docs/reference/cloud-compute/1.9.1/V1.InterconnectMacsec)\n- [1.8.3](/php/docs/reference/cloud-compute/1.8.3/V1.InterconnectMacsec)\n- [1.7.1](/php/docs/reference/cloud-compute/1.7.1/V1.InterconnectMacsec)\n- [1.6.1](/php/docs/reference/cloud-compute/1.6.1/V1.InterconnectMacsec)\n- [1.5.0](/php/docs/reference/cloud-compute/1.5.0/V1.InterconnectMacsec) \nReference documentation and code samples for the Compute V1 Client class InterconnectMacsec.\n\nConfiguration information for enabling Media Access Control security (MACsec) on this Cloud Interconnect connection between Google and your on-premises router.\n\nGenerated from protobuf message `google.cloud.compute.v1.InterconnectMacsec`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ Compute \\\\ V1\n\nMethods\n-------\n\n### __construct\n\nConstructor.\n\n### getFailOpen\n\nIf set to true, the Interconnect connection is configured with a should-secure MACsec security policy, that allows the Google router to fallback to cleartext traffic if the MKA session cannot be established. By default, the Interconnect connection is configured with a must-secure security policy that drops all traffic if the MKA session cannot be established with your router.\n\n### hasFailOpen\n\n### clearFailOpen\n\n### setFailOpen\n\nIf set to true, the Interconnect connection is configured with a should-secure MACsec security policy, that allows the Google router to fallback to cleartext traffic if the MKA session cannot be established. By default, the Interconnect connection is configured with a must-secure security policy that drops all traffic if the MKA session cannot be established with your router.\n\n### getPreSharedKeys\n\nRequired. A keychain placeholder describing a set of named key objects along with their start times. A MACsec CKN/CAK is generated for each key in the key chain. Google router automatically picks the key with the most recent startTime when establishing or re-establishing a MACsec secure link.\n\n### setPreSharedKeys\n\nRequired. A keychain placeholder describing a set of named key objects along with their start times. A MACsec CKN/CAK is generated for each key in the key chain. Google router automatically picks the key with the most recent startTime when establishing or re-establishing a MACsec secure link."]]