01-20-2021 02:08 AM
Hello,
I want to enable MACsec with PSK between the Core and Distribution Switches (C9600 and C9500) which are stretched over darkfibers.
The link speeds are 10G, 40G and 100G and I noticed following from the configuration guide:
Will this configuration below work or do I need pay attention to something else? Will this configuration work without any issues on 10G links as well?
key chain keychain1 macsec
key 1000
cryptographic-algorithm gcm-aes-256
key-string 1234567890123456789012345678901212345678901234567890123456789012
end
mka policy mka_policy
macsec-cipher-suite gcm-aes-xpn-256
end
interface Hu1/0/49
mka policy mka_policy
mka pre-shared-key key-chain keychain1
end
Are these commands are needed in the interface configuration?
interface Hu1/0/49
macsec network-link
macsec replay-protection window-size 10
In the configuration guide are different examples for physical interfaces and port-channel interfaces. Please advise.
And what's about "include-icv-indicator" in the policy? This is enabled by default, isn't it?
Thanks for your advice and sharing your experience.
Solved! Go to Solution.
02-17-2021 08:05 AM
Hi stefanzuber,
macsec network-link should be included in the interface configuration. This is the command that enables MACsec on the interface.
Use show mka policy to see if ICV in enabled if not configured in the policy, in my lab it is enabled by default.
My understanding is that include-icv-indicator is an option for interoperability with other vendor's implementation.
Cisco documents state this on include-icv-indicator.
This parameter configures inclusion of the optional ICV Indicator as part of the transmitted MACsec Key Agreement PDU (MKPDU). This configuration is necessary for MACsec to interoperate with routers that run software prior to IOS XR version 6.1.3. This configuration is also important in a service provider WAN setup where MACsec interoperates with other vendor MACsec implementations that expect ICV indicator to be present in the MKPDU.
Other than that the PSK configuration you listed looks good. If you're interested take a look at this doc.
Tim
02-17-2021 08:05 AM
Hi stefanzuber,
macsec network-link should be included in the interface configuration. This is the command that enables MACsec on the interface.
Use show mka policy to see if ICV in enabled if not configured in the policy, in my lab it is enabled by default.
My understanding is that include-icv-indicator is an option for interoperability with other vendor's implementation.
Cisco documents state this on include-icv-indicator.
This parameter configures inclusion of the optional ICV Indicator as part of the transmitted MACsec Key Agreement PDU (MKPDU). This configuration is necessary for MACsec to interoperate with routers that run software prior to IOS XR version 6.1.3. This configuration is also important in a service provider WAN setup where MACsec interoperates with other vendor MACsec implementations that expect ICV indicator to be present in the MKPDU.
Other than that the PSK configuration you listed looks good. If you're interested take a look at this doc.
Tim
02-18-2021 01:22 AM
Hi Tim,
thank you for your reply and useful information. In my Lab on C9600 Include ICV-Indicator is also enabled by default.
Best regards
Stefan
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide