C H A P T E R
25
Configuring MACsec
This document describes how to configure MACsec on Cisco NX-OS devices.
•
•
Licensing Requirements for MACsec, on page 502
•
Guidelines and Limitations for MACsec, on page 502
•
•
•
Configuring a MACsec Keychain and Keys, on page 506
•
Configuring MACsec Fallback Key, on page 508
•
Configuring a MACsec Policy, on page 509
•
•
About Configurable EAPOL Destination and Ethernet Type, on page 511
•
Verifying the MACsec Configuration, on page 513
•
Displaying MACsec Statistics, on page 515
•
Configuration Example for MACsec, on page 518
•
•
•
Related Documentation, on page 528
About MACsec
Media Access Control Security (MACsec) an IEEE 802.1AE along with MACsec Key Agreement (MKA)
protocol provide secure communications on Ethernet links. It offers the following :
• Provides line rate encryption capabilities.
• Helps to ensure data confidentiality by providing strong encryption at Layer 2.
• Provides integrity checking to help ensure that data cannot be modified in transit.
• Can be selectively enabled using a centralized policy to help ensure that it is enforced where required
while allowing non-MACsec-capable components to access the network.
• Encrypts packets on a hop-by-hop basis at Layer 2, allowing the network to inspect, monitor, mark, and
forward traffic according to your existing policies (unlike end-to-end Layer 3 encryption techniques that
hide the contents of packets from the network devices they cross).
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
501