10-12-2022 12:01 AM
Hi
We are running a fully lan automated, SDA Fabric network with DNAC version 2.2.3.4 & C9300 IOS 17.3.4. We wanted to switch to host macsec, below given a sample commands for the while we are doing thru the CLI.
I would like to know
Global Config:
mka policy mka_policy
key-server priority 200
include-icv-indicator
macsec-cipher-suite gcm-aes-128
confidentiality-offset 0
ssci-based-on-sci
Port:
macsec
mka policy mka_policy
10-13-2022 01:08 AM
Hi,
I don't have specific experience with MACsec on SDA deployment but the following video from Cisco shows switch-to-switch MACsec configuration using templates.
This might probably help you for the switch-to-host configuration you wish to perform.
https://www.youtube.com/watch?v=fPKprvRndTU
Best regards,
Sylvain.
10-13-2022 03:11 AM - edited 10-13-2022 03:13 AM
As far as I'm aware, MACsec (both switch-to-switch and switch-to-host) still needs to be implemented using DNA Center templates or manually using the switch CLI. Please see the following that was posted in May 2022. I'm not sure if MACsec is on the roadmap to be fully automated by DNA Center using an additional app/workflow. You will need to reach out to your Cisco AM/SE to check and confirm.
You can create a day-n template for your fabric edge switches that includes the global and port configuration, or separate templates for the global and port configuration that are then combined in a composite template. Once the fabric edge switches have been onboarded using LAN automation, you can then re-provision the switches to apply the required templates.
Will
10-13-2022 03:50 AM
Thank You @willwetherman & @Sylvain_Che - allow me to ask a few more questions
Once again Thanks
10-14-2022 07:38 AM - edited 10-19-2022 11:40 PM
The DNA Center Closed Authentication template will use the setting of 'Unlimited' for the number of hosts by default, this will enable host-mode multi-auth on the fabric edge which is not supported with MACsec. You will need to change this option to 'Single' which will enable host-mode multi-domain on the fabric edge which is supported. Once multi-domain has been implemented, you can apply your MACsec global and port templates to the required fabric edge switches.
Note that switch-to-host MACsec with SDA has been validated with the encryption policy being returned by the ISE authorisation result. This means that you can use ISE authorisation policy to be selective on the devices and users that are subject to MACsec encryption.
For example, the ISE authorisation policy for my Corporate clients returns the following attributes to the fabric edge switch once they have passed EAP-TLS authentication. The 'should-secure' policy will attempt MKA on the port, and if successful will encrypt the traffic, however if MKA times out or fails, the port will permit unencrypted traffic. Dynamic VLAN assignment works in the same way; we are just returning an additional attribute to the fabric edge switch for the MACsec policy
Access Type = ACCESS_ACCEPT
VLAN = 1021
MACSec Policy = should-secure
For devices that do not support MACsec, or for devices that you want to exclude from MACsec encryption, you can create a separate ISE authorisation policy that returns the MACsec policy of 'must-not-secure'
You have the following MACSec policy options in ISE.
must-not-secure
should-secure
must-secure
Please see the following for further details
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide