48-8
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 48 Configuring MACsec Encryption
Configuring MACsec and MACsec Key Agreement
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#
mka policy pol1
Switch(config-mka-policy)#
replay-protection window-size 1000
Switch(config-mka-policy)#
confidentiality-offset 50
Switch(config-mka-policy)#
end
We observe the following:
•
The payload starting from the SA (source MAC address) + 50 bytes offset is encrypted.
•
Replay protect is YES with a window size of 1000. If the frame received has a packet number (PN)
of 1020, for example, all frames with a PN of 20 to 1020 can come out of order (i.e, frame with PN
900 can come first and frame with PN 800 can come later). However, if a frame with a PN of 1021
is received first, followed by a frame with a PN of 20, the frame with PN of 20 is dropped. In this
scenario, the expected PN is 1022 and the window size is 1000, so the acceptable PN number is
anything greater than or equal to (expected PN - window size) = 22. So, any frame with PN < 22 is
dropped.
By default, the MKA protocol default policy is enabled on an interface, if no MKA policies are applied.
All the values in the policy (such as confidentiality,offset, and replay protection) take the default values.
For example,
•
Confidentialityoffset is 0—Encrypts the payload that is immediately after the SA (source MAC
address).
•
Replay protect is YES with window size 0—Frames cannot come out of order.
Configuring MACsec on an Interface
To configure MACsec on an interface with one MACsec session for voice and one for data, perform this
task:
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
interface
interface-id
Identifies the MACsec interface, and enter interface configuration mode.
The interface must be a physical interface.
Step 3
switchport access vlan
vlan-id
Configures the access VLAN for the port.
Step 4
switchport mode access
Configures the interface as an access port.
Step 5
macsec
Enables 802.1ae MACsec on the interface.
Step 6
authentication event linksec fail
action authorize vlan
vlan-id
(Optional) Specifies that the switch processes authentication link-security
failures resulting from unrecognized user credentials by authorizing a
restricted VLAN on the port after a failed authentication attempt.
Step 7
authentication host-mode
multi-domain
Configures authentication manager mode on the port to allow both a host
and a voice device to be authenticated on the 802.1X-authorized port. If
not configured, the default host mode is single.
Step 8
authentication linksec policy
must-secure
Sets the LinkSec security policy to secure the session with MACsec if the
peer is available. If not set, the default is
should secure.
Step 9
authentication port-control auto
Enables 802.1X authentication on the port. The port changes to the
authorized or unauthorized state based on the authentication exchange
between the switch and the client
Summary of Contents for Catalyst 4500 Series
Page 2: ......
Page 4: ......
Page 2086: ...Index IN 46 Software Configuration Guide Release IOS XE 3 9 0E and IOS 15 2 5 E ...