Showing results for 
Search instead for 
Did you mean: 

Cisco Catalyst 9300 - MKA Channel Up but MACSEC Traffic Doesn't Work

Level 1
Level 1

I am trying to use a Cisco Switch in the following test configuration: 

Test Device A <--> Cisco Catalyst <--> Test Device B

Thus, each device is connected to its own port in the Cisco Catalyst. 

I want to send traffic encrypted by MACSEC between the two devices. This means that it would be encrypted between Test Device A and Cisco Catalyst, then the Catalyst would decrypt the payload, and re-encrypt according to SAK for connection to Test Device B, then send to Device B, then Device B would decrypt according to its SAK and receive it. However, when I run this test (using a traffic generator), it completely fails, the packets are dropped somewhere for some unknown reason. 

Despite this, I can confirm that MKA worked successfully, as 

show macsec summary
Interface Transmit SC Receive SC
Tw1/0/3 1 1
Tw1/0/4 1 1

Also, generic forwarding of traditional Ethernet frames does in fact work. 

For this desired outcome, how should I set up my Catalyst interface, to decrypt-forward-reencrypt these frames? How can MKA session be successfully created but MACSEC traffic is dropped?

2 Replies 2

Hall of Fame
Hall of Fame

what is the full model of the device, what IOS XE code running, what License you have ?

how is your configuration looks like or refer below reference :



***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Model: cisco C9300-48UXM

IOS XE: Cisco IOS XE Software, Version 17.06.05


Technology Package License Information:

Technology-package Technology-package
Current Type Next reboot
network-advantage Smart License network-advantage
dna-advantage Subscription Smart License dna-advantage
AIR License Level: AIR DNA Advantage

My configuration is not the same as the links: I wish to send a frame from Device A, and then have the switch forward it to its final destination (Device B), however the hops between Devices A and B with the switch should be encrypted by MACSEC. I can get each of these sessions to go up, however cannot get the switch to forward by simply looking at the destination MAC address as one can with plain Ethernet, how do I do that?

Review Cisco Networking for a $25 gift card