User Guide for FibeAir® IP-20 All-Outdoor Products, CeraOS 10.5
Page 541 of 825
Ceragon Proprietary and Confidential
verifies that both ends of the link have the same master key. If a mismatch is
detected, an alarm is raised and traffic transmission is stopped for the
mismatched carrier at both sides of the link. The link becomes non-valid and
traffic stops being forwarded.
To define the master key manually, enter the following command in Payload
Encryption view:
Payload Encryption [2/x]> payload encryption mkey
When you press
<Enter>
, the following prompt appears:
Please enter key:
Enter the master key and press
<Enter>.
The master key must be between 8 and
32 ASCII characters. The characters
do not
appear as you type them. To display
the master key and verify that you typed it correctly, enter the
payload
encryption status show
command described above. You can copy the master
key from the output of this command.
To generate the master key automatically, enter the following command in
Payload Encryption view:
Payload Encryption [2/x]> master key generate
A random master key is generated. You must copy and paste this key to the other
end of the link to ensure that both sides of the link have the same master key. To
display and copy the master key, enter the
traffic encryption status show
command described above. You can copy the master key from the output of this
command.
6 On the local unit, follow the procedure described in Step 5 to configure the
same master key configured on the remote unit also on the local unit.
7 Enable payload encryption on the remote unit:
i
Enter the following command in Payload Encryption view:
Payload Encryption [2/x]> payload encryption mode admin AES-256
This step will cause the link status to be Down until payload encryption is
successfully enabled on the local unit. However, the RSL measured on the link
should remain at an acceptable level.
To disable payload encryption, enter the following command in Payload
Encryption view:
Payload Encryption [2/x]> payload encryption mode admin Disable
ii The session key is automatically regenerated at defined intervals. To set
the session key regeneration interval, enter the following command in
Payload Encryption view:
Payload Encryption [x/x]> payload encryption session-key period
set <00:00-00:00>
Enter the regeneration interval in hours and minutes (HH:MM). For
example, the following command configures radio interface 1 to
regenerate the session key every 4 hours and 15 minutes:
Payload Encryption [2/1]> payload encryption session-key period
set 04:15