<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNAC|SDA|MACSec in Software-Defined Access (SD-Access)</title>
    <link>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4701681#M2024</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We are running a fully lan automated, SDA Fabric network with DNAC version 2.2.3.4 &amp;amp; C9300 IOS 17.3.4. We wanted to switch to host macsec, below given a sample commands for the while we are doing thru the CLI.&lt;/P&gt;&lt;P&gt;I would like to know&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What is the best practice in SDA environment for implementing switch to host macsec&lt;/LI&gt;&lt;LI&gt;How can we automate the global and switchport config thru DNAC ( templates or via some workflow)&lt;/LI&gt;&lt;LI&gt;Since its lan automated, default network port templates pushed while onboarding so how do we do the changes&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Global Config:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;mka policy mka_policy&lt;BR /&gt;key-server priority 200&lt;BR /&gt;include-icv-indicator&lt;BR /&gt;macsec-cipher-suite gcm-aes-128&lt;BR /&gt;confidentiality-offset 0&lt;BR /&gt;ssci-based-on-sci&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Port:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;macsec&lt;BR /&gt;mka policy mka_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Oct 2022 07:01:21 GMT</pubDate>
    <dc:creator>Rajesh Kongath</dc:creator>
    <dc:date>2022-10-12T07:01:21Z</dc:date>
    <item>
      <title>DNAC|SDA|MACSec</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4701681#M2024</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We are running a fully lan automated, SDA Fabric network with DNAC version 2.2.3.4 &amp;amp; C9300 IOS 17.3.4. We wanted to switch to host macsec, below given a sample commands for the while we are doing thru the CLI.&lt;/P&gt;&lt;P&gt;I would like to know&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What is the best practice in SDA environment for implementing switch to host macsec&lt;/LI&gt;&lt;LI&gt;How can we automate the global and switchport config thru DNAC ( templates or via some workflow)&lt;/LI&gt;&lt;LI&gt;Since its lan automated, default network port templates pushed while onboarding so how do we do the changes&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Global Config:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;mka policy mka_policy&lt;BR /&gt;key-server priority 200&lt;BR /&gt;include-icv-indicator&lt;BR /&gt;macsec-cipher-suite gcm-aes-128&lt;BR /&gt;confidentiality-offset 0&lt;BR /&gt;ssci-based-on-sci&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Port:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;macsec&lt;BR /&gt;mka policy mka_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 07:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4701681#M2024</guid>
      <dc:creator>Rajesh Kongath</dc:creator>
      <dc:date>2022-10-12T07:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC|SDA|MACSec</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4702467#M2027</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I don't have specific experience with MACsec on SDA deployment but the following video from Cisco shows switch-to-switch MACsec configuration using templates.&lt;/P&gt;
&lt;P&gt;This might probably help you for the switch-to-host configuration you wish to perform.&lt;/P&gt;
&lt;P&gt;&lt;A title="Cisco SD-Access Underlay MACsec" href="https://www.youtube.com/watch?v=fPKprvRndTU" target="_self"&gt;https://www.youtube.com/watch?v=fPKprvRndTU&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Sylvain.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 08:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4702467#M2027</guid>
      <dc:creator>Sylvain_Che</dc:creator>
      <dc:date>2022-10-13T08:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC|SDA|MACSec</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4702540#M2028</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316903"&gt;@Rajesh Kongath&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as I'm aware, MACsec (both switch-to-switch and switch-to-host) still needs to be implemented using DNA Center templates or manually using the switch CLI. Please see the following that was posted in May 2022. I'm not sure if MACsec is on the roadmap to be fully automated by DNA Center using an additional app/workflow. You will need to reach out to your Cisco AM/SE to check and confirm.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/software-defined-access-sd-access/macsec-with-sda-roadmap/td-p/4062519" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/software-defined-access-sd-access/macsec-with-sda-roadmap/td-p/4062519&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can create a day-n template for your fabric edge switches that includes the global and port configuration, or separate templates for the global and port configuration that are then combined in a composite template. Once the fabric edge switches have been onboarded using LAN automation, you can then re-provision the switches to apply the required templates.&lt;/P&gt;
&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 10:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4702540#M2028</guid>
      <dc:creator>willwetherman</dc:creator>
      <dc:date>2022-10-13T10:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC|SDA|MACSec</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4702640#M2029</link>
      <description>&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295375"&gt;@willwetherman&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/205576"&gt;@Sylvain_Che&lt;/a&gt;&amp;nbsp;- allow me to ask a few more questions&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;MacSec needs host-mode multi-domain, which I believe can be achieved via selecting no of hosts "single" by editing closed authentication settings in DNAC. But in our scenario, we don’t want macsec for all data ports but only the one which end users pc/phone connected. The ELV devices are not capable of macsec. Selecting “one device” or adding it via template will change to whole fabric. How we can automate/achieve configuring “access-session host-mode multi-domain” only for end user ports?&lt;/LI&gt;&lt;LI&gt;Can we push “access-session host-mode multi-domain” from ISE after the authentication by any chance?&lt;/LI&gt;&lt;LI&gt;We have Dynamic VLAN assignment for the data vlans, how macsec will work in such situations?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Once again Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2022 10:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4702640#M2029</guid>
      <dc:creator>Rajesh Kongath</dc:creator>
      <dc:date>2022-10-13T10:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC|SDA|MACSec</title>
      <link>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4703412#M2030</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316903"&gt;@Rajesh Kongath&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The DNA Center Closed Authentication template will use the setting of 'Unlimited' for the number of hosts by default, this will enable host-mode multi-auth on the fabric edge which is not supported with MACsec. You will need to change this option to 'Single' which will enable host-mode multi-domain on the fabric edge which is supported.&amp;nbsp;&lt;SPAN&gt;Once multi-domain&amp;nbsp;has been implemented, you can apply your MACsec global and port templates to the required fabric edge switches. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note that switch-to-host MACsec with SDA has been validated with the encryption policy being returned by the ISE authorisation result.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;This means that you can use ISE authorisation policy to be selective on the devices and users that are subject to MACsec encryption.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For example, the ISE authorisation policy for my Corporate clients returns the following attributes to the fabric edge switch once they have passed EAP-TLS authentication. The 'should-secure' policy will attempt&amp;nbsp;MKA on the port, and if successful will encrypt the traffic, however if MKA times out or fails, the port will permit unencrypted traffic. Dynamic VLAN assignment works in the same way; we are just returning an additional attribute to the fabric edge switch for the MACsec policy&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;VLAN = 1021&lt;BR /&gt;MACSec Policy = should-secure&lt;/P&gt;
&lt;P&gt;For devices that do not support MACsec, or for devices that you want to exclude from MACsec encryption, you can create a separate ISE authorisation policy that returns the MACsec policy of 'must-not-secure'&lt;/P&gt;
&lt;P&gt;You have the following MACSec policy options in ISE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;must-not-secure&lt;BR /&gt;should-secure&lt;BR /&gt;must-secure&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see the following for further details&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/networking-knowledge-base/configuring-macsec-switch-to-host-with-cat9k-amp-ise/ta-p/4436087" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/networking-knowledge-base/configuring-macsec-switch-to-host-with-cat9k-amp-ise/ta-p/4436087&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2022 06:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/software-defined-access-sd-access/dnac-sda-macsec/m-p/4703412#M2030</guid>
      <dc:creator>willwetherman</dc:creator>
      <dc:date>2022-10-20T06:40:04Z</dc:date>
    </item>
  </channel>
</rss>

