
490
Configuring MACsec
Overview
Media Access Control Security (MACsec) secures data communication on IEEE 802 LANs. MACsec
provides services such as data encryption, frame integrity check, and data origin validation for
frames on the MAC sublayer of the Data Link Layer.
Basic concepts
CA
Secure connectivity association (CA) is a group of CA participants that use the same key and key
algorithm. The encryption key used by CA participant is called connectivity association key (CAK).
CAK has the following types:
•
Pairwise
CAK
—Used by CAs that have two participants.
•
Group
CAK
—Used by CAs that have more than two participants.
The pairwise CAK is used most often because MACsec is typically applied to point-to-point
networks.
A CAK can be an encryption key generated during 802.1X authentication or a user-configured
preshared key. The user-configured preshared key takes precedence over the 802.1X-generated
key. In the current software version, the device does not support the 802.1X-generated key for
MACsec.
SA
Secure association (SA) is an agreement negotiated by CA participants. The agreement includes a
cipher suite and keys for integrity check.
A secure channel can contain more than one SA. Each SA uses a unique secure association key
(SAK). The SAK is generated from the CAK, and MACsec uses the SAK to encrypt data transmitted
along the secure channel.
MACsec Key Agreement (MKA) limits the number of packets that can be encrypted by an SAK.
When the limit is exceeded, the SAK will be refreshed. For example, when packets with the minimum
size are sent on a 10-Gbps link, an SAK rekey occurs about every 300 seconds.
MACsec services
MACsec provides the following services:
•
Data
encryption
—Enables a port to encrypt outbound frames and decrypt MACsec-encrypted
inbound frames.
•
Integrity
check
—Performs integrity check when the device receives a MACsec-encrypted
frame. The integrity check uses the following process:
a.
Uses a key negotiated by MKA to calculate an integrity check value (ICV) for the frame.
b.
Compares the calculated ICV with the ICV in the frame trailer.
−
If the ICVs are the same, the device verifies the frame as legal.
−
If the ICVs are different, the device determines whether to drop the frame based on the
validation mode.
•
MACsec replay protection
—When MACsec frames are transmitted over the network, frame
re-sequencing might occur. MACsec replay protection allows the device to accept the
Summary of Contents for 10500 series
Page 326: ...312 No duration limit for this SA ...