07-31-2024 02:11 PM - edited 07-31-2024 02:12 PM
Hi, I'm trying to use GCM-AES-256 with Catalyst 9300 and MACSec. Tested with default MKA policy that uses GCM-AES-128 and everything works fine, it gets authenticated with ISE and I can see MKA session secured in switch. When changed encryption algorithm in switch and Secure Client profile to use only GCM-AES-256 it gets authenticated in ISE but then switch shows following errors:
interface GigabitEthernet1/0/6 description ***************PRUEBAS GJ DOMINIO*********** switchport access vlan 113 switchport mode access switchport voice vlan 303 device-tracking attach-policy MERAKI_POLICY ip arp inspection limit rate 20 macsec authentication event fail action next-method authentication event server dead action authorize vlan 113 authentication event server dead action authorize voice authentication event no-response action authorize vlan 113 authentication event server alive action reinitialize authentication event linksec fail action next-method authentication open authentication linksec policy must-secure authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication violation restrict mab snmp trap mac-notification change added snmp trap mac-notification change removed dot1x pae authenticator dot1x timeout tx-period 10 mka policy mka-256-macsec spanning-tree portfast spanning-tree bpduguard enable end
CATSW-C9300-TEST#show run | sec mka key chain mka-keys macsec mka policy MKA-POLICY key-server priority 30 macsec-cipher-suite gcm-aes-256 sak-rekey interval 65535 mka policy mka-256-macsec !This is the MKA policy for MACSec switch-to-host macsec-cipher-suite gcm-aes-256
08-01-2024 12:03 AM
- Make sure that the client's NIC driver is up to date ,
M.
08-01-2024 06:27 PM
Hi, Yes, it's updated.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide