48-24
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 48 Configuring MACsec Encryption
Configuring Cisco TrustSec MACsec
This example shows how to configure Cisco TrustSec authentication in manual mode on an interface:
Switch#
configure terminal
Switch(config)#
interface tengiigabitethernet 1/1/2
Switch(config-if)#
cts manual
Switch(config-if-cts-manual)#
sap pmk 1234abcdef mode-list gcm-encrypt null no-encap
Switch(config-if-cts-manual)#
no propagate sgt
Switch(config-if-cts-manual)#
exit
Switch(config-if)#
end
Cisco TrustSec Switch-to-Switch Link Security Configuration Example
This example shows the configuration necessary for a seed and non-seed device for Cisco TrustSec
switch-to-switch security. You must configure the AAA and RADIUS for link security. In this example,
ACS-1
through
ACS-3
can be any server names and
cts-radius
is the Cisco TrustSec server.
Seed Device Configuration:
Switch(config)#
aaa new-model
Switch(config)#
radius server ACS-1 address ipv4 10.5.120.12 auth-port 1812 acct-port 1813
pac key cisco123
Step 4
sap pmk
key
[
mode-list
mode1
[
mode2
[
mode3
[
mode4
]]]]
(Optional) Configures the SAP pairwise master key (PMK) and
operation mode. SAP is disabled by default in Cisco TrustSec
manual mode.
•
key
—A hexadecimal value with an even number of characters
and a maximum length of 32 characters.
The SAP operation
mode
options:
•
gcm-encrypt
—Authentication and encryption
Note
Select this mode for MACsec authentication and
encryption if your software license supports MACsec
encryption.
•
gmac
—Authentication, no encryption
•
no-encap
—No encapsulation
•
null
—Encapsulation, no authentication or encryption
Note
If the interface is not capable of data link encryption,
no-encap
is the default and the only available SAP
operating mode. SGT is not supported.
Step 5
no propagate sgt
Prevents the interface from transmitting the SGT to the peer and
is required in manual mode.
Use the
no
form of this command when the peer is incapable of
processing a SGT.
Step 6
exit
Exits Cisco TrustSec 802.1X interface configuration mode.
Step 7
end
Returns to privileged EXEC mode.
Step 8
show cts interface
[
interface-id |
brief
|
summary
]
(Optional) Verifies the configuration by displaying
TrustSec-related interface characteristics.
Step 9
copy running-config startup-config
(Optional) Saves your entries in the configuration file.
Command
Purpose
Содержание Catalyst 4500 Series
Страница 2: ......
Страница 4: ......
Страница 2086: ...Index IN 46 Software Configuration Guide Release IOS XE 3 9 0E and IOS 15 2 5 E ...