FibeAir IP-20C/S/E
User Guide
Ceragon Proprietary and Confidential
Page 142 of 597
5.5
Configuring AES-256 Payload Encryption
Note:
This feature is only relevant for IP-20C and IP-20S units.
This feature is not supported with MIMO links.
This feature requires:
Requires an activation key. If no valid AES activation key has been applied
to the unit, AES will not operate on the unit. See Configuring the Activation
Key.
Note:
In order for the AES activation key to become active, you
must reset the unit after configuring a valid AES activation
key. Until the unit is reset, an alarm will be present if you
enable AES. This is not the case for other activation keys.
FibeAir IP-20C and IP-20S support AES-256 payload encryption. AES is
enabled and configured separately for each radio carrier.
IP-20 uses a dual-key encryption mechanism for AES:
The user provides a master key. The master key can also be generated by
the system upon user command. The master key is a 32-byte symmetric
encryption key. The same master key must be manually configured on
both ends of the encrypted link.
The session key is a 32-byte symmetric encryption key used to encrypt the
actual data. Each link uses two session keys, one for each direction. For
each direction, the session key is generated by the transmit side unit and
propagated automatically, via a Key Exchange Protocol, to the other side of
the link. The Key Exchange Protocol exchanges session keys by encrypting
them with the master key, using the AES-256 encryption algorithm.
Session keys are regenerated at user-configured intervals.
AES key generation is completely hitless, and has no effect on ACM operation.
To configure payload encryption:
1 Select Radio > Payload Encryption. The Payload Encryption page opens.
Interface Configuration page opens.
For IP-20C units, the Payload Encryption page initially displays a table
as shown in Figure 98.
For IP-20S units, a page appears, similar to Figure 99 (which shows an
IP-20C page).