Configuring MACsec
We can configure MACsec to secure point-to-point Ethernet links connecting MX Series routers with MACsec-capable MICs, or on Ethernet links connecting a switch to a host device such as a PC, phone, or server. Each point-to-point Ethernet link that you want to secure using MACsec must be configured independently. We can enable MACsec on router-to-router links using static connectivity association key (CAK) security mode.
In this section, MX Series routers with the enhanced MIC-MACSEC-20G used for Media Access Control Security (MACsec) configurations.
Customizing Time
To customize time, disable NTP and set the date.
- Disable NTP.[edit]user@host# deactivate groups global system ntpuser@host# deactivate system ntpuser@host# commituser@host# exit
- Setting date and time. Date and time format is YYYYMMDDHHMM.ss[edit]user@host#set date 201803202034.00user@host#set cli timestamp
Configuring MACsec on a Device Running Junos OS
To configure MACsec on a device running Junos OS:
- Configure the MACsec security mode as for the connectivity
association.[edit]user@host:fips# set security macsec connectivity-association connectivity-association-name exclude-protocol protocol-nameuser@host:fips# set security macsec connectivity-association connectivity-association-name include-sciuser@host:fips# set security macsec connectivity-association connectivity-association-name mka must-secureuser@host:fips# set security macsec connectivity-association connectivity-association-name mka key-server-priority priority-numberuser@host:fips# set security macsec connectivity-association connectivity-association-name mka transmit-interval intervaluser@host:fips# set security macsec connectivity-association connectivity-association-name no-encryptionuser@host:fips# set security macsec connectivity-association connectivity-association-name offset (0|30|50)
- Create the pre-shared key by configuring the connectivity
association key name (CKN) and connectivity association key (CAK).[edit]user@host:fips#set security macsec connectivity-association connectivity-association-name pre-shared-key cak hexadecimal-numberuser@host:fips#set security macsec connectivity-association connectivity-association-name pre-shared-key ckn hexadecimal-numberuser@host:fips#set security macsec connectivity-association connectivity-association-name replay-protect{ replay-window-size number-of-packets
- Set the MACsec Key Agreement (MKA) secure channel details.[edit]user@host:fips#set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name direction (inbound | outbound)user@host:fips#set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name encryption (MACsec)user@host:fips#set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name id mac-address mac-addressuser@host:fips#set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name id port-id port-id-numberuser@host:fips#set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name offset (0|30|50)user@host:fips#set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name security-association security-association-number key key-string
- Set the MKA to security mode.[edit]user@host:fips#set security macsec connectivity-association connectivity-association-name security-mode security-mode
- Assign the configured connectivity association with a
specified MACsec interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association connectivity-association-name
Configuring Static MACsec with ICMP Traffic
To configure Static MACsec using ICMP traffic between router R0 and router R1:
- Create the preshared key by configuring the connectivity
association key name (CKN) and connectivity association key (CAK)[edit]user@host:fips# set security macsec connectivity-association CA1 pre-shared-key ckn 2345678922334455667788992223334445556667778889992222333344445555user@host:fips# set security macsec connectivity-association CA1 pre-shared-key cak 23456789223344556677889922233344user@host:fips# set security macsec connectivity-association CA1 offset 30
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 mka should-secureuser@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1user@host:fips#set security macsec interfaces interface-name unit 0 family inet address 10.1.1.1/24
In R1:
- Create the preshared key by configuring the connectivity
association key name (CKN) and connectivity association key (CAK)[edit]user@host:fips# set security macsec connectivity-association CA1 pre-shared-key ckn 2345678922334455667788992223334445556667778889992222333344445555user@host:fips# set security macsec connectivity-association CA1 pre-shared-key cak 23456789223344556677889922233344user@host:fips# set security macsec connectivity-association CA1 offset 30
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 mka should-secureuser@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1user@host:fips#set security macsec interfaces interface-name unit 0 family inet address 10.1.1.2/24
Configuring MACsec with keychain using ICMP Traffic
To configure MACsec with keychain using ICMP traffic between router R0 and router R1:
- Assign a tolerance value to the authentication key chain.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 tolerance 20
- Create the secret password to use. It is a string of hexadecimal
digits up to 64 characters long. The password can include spaces if
the character string is enclosed in quotation marks. The keychain's
secret-data is used as a CAK.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.
[edit]user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 0 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 1 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 2 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 3 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 4 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 5 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 6 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 7 secretNew cak (secret):Retype new cak (secret): - Associate the preshared keychain name with the connectivity
association.[edit]user@host:fips#set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1user@host:fips#set security macsec connectivity-association CA1 offset 50user@host:fips#set security macsec connectivity-association CA1 cipher-suite gcm-aes-256The cipher value can also be set as cipher-suite gcm-aes-128.
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1user@host:fips#set security macsec interfaces interface-name unit 0 family inet address 10.1.1.1/24
To configure MACsec with keychain for ICMP traffic:
- Assign a tolerance value to the authentication key chain.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 tolerance 20
- Create the secret password to use. It is a string of hexadecimal
digits up to 64 characters long. The password can include spaces if
the character string is enclosed in quotation marks. The keychain's
secret-data is used as a CAK.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.
[edit]user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 0 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 1 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 2 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 3 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 4 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 5 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 6 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 7 secretNew cak (secret):Retype new cak (secret): - Associate the preshared keychain name with the connectivity
association.[edit]user@host:fips#set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1user@host:fips#set security macsec connectivity-association CA1 offset 50user@host:fips#set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1user@host:fips#set security macsec interfaces interface-name unit 0 family inet address 10.1.1.2/24
Configuring Static MACsec for Layer 2 Traffic
To configure static MACsec for Layer 2 traffic between router R0 and router R1:
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Create the secret password to use. It is a string of hexadecimal
digits up to 64 characters long. The password can include spaces if
the character string is enclosed in quotation marks. The keychain's
secret-data is used as a CAK.[edit]user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 0 secretNew cak (secret):Retype new cak (secret):
For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.
- Associate the preshared keychain name with the connectivity
association.[edit]user@host:fips#set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1user@host:fips#set security macsec connectivity-association CA1 offset 50user@host:fips#set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1
- Configure VLAN tagging.[edit]user@host:fips#set interfaces interface-name1 flexible-vlan-tagginguser@host:fips#set interfaces interface-name1 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name1 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name1 unit 100 vlan-id 100user@host:fips#set interfaces interface-name2 flexible-vlan-tagginguser@host:fips#set interfaces interface-name2 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name2 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name2 unit 100 vlan-id 100
- Configure bridge domain.[edit]user@host:fips#set bridge-domains BD-110 domain-type bridgeuser@host:fips#set bridge-domains BD-110 vlan-id 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100
- Create the secret password to use. It is a string of hexadecimal
digits up to 64 characters long. The password can include spaces if
the character string is enclosed in quotation marks. The keychain's
secret-data is used as a CAK.[edit]user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 0 secretNew cak (secret):Retype new cak (secret):
For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.
- Associate the preshared keychain name with the connectivity
association.[edit]user@host:fips#set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1user@host:fips#set security macsec connectivity-association CA1 offset 50user@host:fips#set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1
- Configure VLAN tagging.[edit]user@host:fips#set interfaces interface-name1 flexible-vlan-tagginguser@host:fips#set interfaces interface-name1 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name1 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name1 unit 100 vlan-id 100user@host:fips#set interfaces interface-name2 flexible-vlan-tagginguser@host:fips#set interfaces interface-name2 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name2 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name2 unit 100 vlan-id 100
- Configure bridge domain.[edit]user@host:fips#set bridge-domains BD-110 domain-type bridgeuser@host:fips#set bridge-domains BD-110 vlan-id 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100
Configuring MACsec with keychain for Layer 2 Traffic
To configure MACsec with keychain for ICMP traffic between router R0 and router R1:
- Assign a tolerance value to the authentication key chain.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 tolerance 20
- Create the secret password to use. It is a string of hexadecimal
digits up to 64 characters long. The password can include spaces if
the character string is enclosed in quotation marks. The keychain's
secret-data is used as a CAK.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.
[edit]user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 0 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 1 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 2 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 3 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 4 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 5 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 6 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 7 secretNew cak (secret):Retype new cak (secret): - Associate the preshared keychain name with the connectivity
association.[edit]user@host:fips#set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1user@host:fips#set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1
- Configure VLAN tagging.[edit]user@host:fips#set interfaces interface-name1 flexible-vlan-tagginguser@host:fips#set interfaces interface-name1 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name1 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name1 unit 100 vlan-id 100user@host:fips#set interfaces interface-name2 flexible-vlan-tagginguser@host:fips#set interfaces interface-name2 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name2 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name2 unit 100 vlan-id 100
- Configure bridge domain.[edit]user@host:fips#set bridge-domains BD-110 domain-type bridgeuser@host:fips#set bridge-domains BD-110 vlan-id 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100
- Assign a tolerance value to the authentication key chain.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 tolerance 20
- Create the secret password to use. It is a string of hexadecimal
digits up to 64 characters long. The password can include spaces if
the character string is enclosed in quotation marks. The keychain's
secret-data is used as a CAK.[edit]user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558user@host:fips# set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.
[edit]user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 0 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 1 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 2 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 3 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 4 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 5 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 6 secretNew cak (secret):Retype new cak (secret):user@host:fips# prompt security authentication-key-chains key-chain macsec-kc1 key 7 secretNew cak (secret):Retype new cak (secret): - Associate the preshared keychain name with the connectivity
association.[edit]user@host:fips#set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1user@host:fips#set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
- Set the trace option values.[edit]user@host:fips#set security macsec traceoptions file MACsec.loguser@host:fips#set security macsec traceoptions file size 4000000000user@host:fips#set security macsec traceoptions flag all
- Assign the trace to an interface.[edit]user@host:fips#set security macsec interfaces interface-name traceoptions file mka_xe size 1guser@host:fips#set security macsec interfaces interface-name traceoptions flag all
- Configure the MACsec security mode as static-cak for the
connectivity association.[edit]user@host:fips#set security macsec connectivity-association CA1 security-mode static-cak
- Set the MKA key server priority.[edit]user@host:fips#set security macsec connectivity-association CA1 mka key-server-priority 1
- Set the MKA transmit interval.[edit]user@host:fips#set security macsec connectivity-association CA1 mka transmit-interval 3000
- Enable the MKA secure.[edit]user@host:fips#set security macsec connectivity-association CA1 include-sci
- Assign the connectivity association to an interface.[edit]user@host:fips#set security macsec interfaces interface-name connectivity-association CA1
- Configure VLAN tagging.[edit]user@host:fips#set interfaces interface-name1 flexible-vlan-tagginguser@host:fips#set interfaces interface-name1 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name1 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name1 unit 100 vlan-id 100user@host:fips#set interfaces interface-name2 flexible-vlan-tagginguser@host:fips#set interfaces interface-name2 encapsulation flexible-ethernet-servicesuser@host:fips#set interfaces interface-name2 unit 100 encapsulation vlan-bridgeuser@host:fips#set interfaces interface-name2 unit 100 vlan-id 100
- Configure bridge domain.[edit]user@host:fips#set bridge-domains BD-110 domain-type bridgeuser@host:fips#set bridge-domains BD-110 vlan-id 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100user@host:fips#set bridge-domains BD-110 interface interface-name1 100