802.1x port MACsec commands

macsec

Syntax

[no] macsec

Context

config>port>ethernet>dot1x

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command configures MACsec functionality for the port.

Note:

When MACsec is configured on an Ethernet port, the oper MTU of the port is reduced by 32 bytes; for example, a configured MTU of 9212 results in an oper MTU of 9180 for a MACsec-enabled port. When a service or IP interface uses a MACsec-enabled port, an appropriate MTU value must be manually configured.

The no form of this command disables MACsec functionality for the port.

ca-name

Syntax

ca-name ca-name

no ca-name

Context

config>port>ethernet>dot1x>macsec

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command configures the CA linked to the MACsec port. The CA provides the MACsec parameter that is used or is negotiated with other peers.

The no form of this command removes the CA from the MACsec port.

Parameters

ca-name

Specifies the CA to use for the MACsec port, up to 32 characters.

eapol-destination-address

Syntax

eapol-destination-address mac

no eapol-destination-address

Context

config>port>ethernet>dot1x>macsec

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command configures the destination MAC address of the EAPoL to the unicast address of the MACsec peer, so that the EAPoL and MKA signaling is unicast between two peers.

The EAPoL destination MAC address uses a destination multicast MAC address of 01:80:C2:00:00:03. Some networks cannot tunnel these packets over the network or consume them, causing the MKA session to fail.

The no form of this command reverts to the default value.

Default

no eapol-destination-address

Parameters

mac

Specifies the destination MAC address used by the EAPoL MKA packets of the specified port. The 48-bit MAC address is in the form aa:bb:cc:dd:ee:ff or aa-bb-cc-dd-ee-ff, where aa, bb, cc, dd, ee, and ff are hexadecimal numbers.

exclude-protocol

Syntax

[no] exclude-protocol {protocol-name}

Context

config>port>ethernet>dot1x>macsec

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command configures the protocols for which packets are not secured with MACsec when MACsec is enabled on a port. When this command is enabled in a CA that is attached to an interface, MACsec is not enabled for all packets of the specified protocols that are sent and received on the link.

When this command is enabled on a port where MACsec is configured, packets of the specified protocols are sent and received in clear text.

Default

no exclude-protocol

Parameters

protocol-name

Specifies the protocol name.

Values

cdp, lacp, lldp, eapol-start

max-peer

Syntax

max-peer max-peer

no max-peer

Context

config>port>ethernet>dot1x>macsec

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command configures the maximum number of peers allowed for the specified MACsec instance.

Note:

The peer establishment is a race condition and operates on a first-come-first-served basis. For a security zone, only 32 peers are supported.

The no form of this command reverts to the default value.

Default

no max-peer

Parameters

max-peer

Specifies the maximum number of peers supported on this port.

Values

0 to 32

rx-must-be-encrypted

Syntax

[no] rx-must-be-encrypted

Context

config>port>ethernet>dot1x>macsec

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command specifies that all non-MACsec-secured traffic that is received on the port is dropped.

When this command is disabled, all arriving traffic is accepted, regardless of whether traffic is MACsec-secured.

Note:

This command is available only at the NULL port level and does not have per-VLAN granularity.

The no form of this command disables the command.

Default

rx-must-be-encrypted

shutdown

Syntax

[no] shutdown

Context

config>port>ethernet>dot1x>macsec

Platforms

7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C

Description

This command shuts down MACsec functionality, including MKA negotiation, for the port. In the shutdown state, the port is not MACsec capable and all PDUs are transmitted and expected without encryption and authentication.

A valid CA that is different from another CA configured on a sub-port of this port, and also a max-peer value larger than 0, must be configured. In MACsec-enabled mode, packets are sent in clear text until the MKA session is up, and if the rx-must-be-encrypted command is configured on the port, all incoming packets without MACsec are dropped.

The no form of this command sets the port to MACsec-enabled mode.

Default

shutdown