MACsec commands for 7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

macsec

Syntax

macsec

Context

config

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command enables the context for MACsec configuration. The MACsec MKA profile can be configured in this context.

Note: See SA limits and network design for more information about security zones and ports where MACsec can be enabled.

connectivity-association

Syntax

connectivity-association ca-name [create]

no connectivity-association ca-name

Context

config>macsec

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command configures a connectivity association (CA). MACsec CAs are applied to a port dot1x configuration to enable MACsec on that port.

The no form of this command removes the CA.

Parameters

ca-name

Specifies the name of the CA using a string of up to 32 characters.

create

Specifies a mandatory keyword when creating an entry.

cipher-suite

Syntax

cipher-suite cipher-suite

no cipher-suite

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command configures encryption of datapath PDUs. When all parties in the CA have the security association key (SAK), they use the algorithm specified by the cipher-suite parameter, in conjunction with the SAK, to encrypt the datapath PDUs.

The no form of this command disables encryption of datapath PDUs.

Default

cipher-suite gcm-aes-128

Parameters

cipher-suite

Specifies the algorithm to use for control plane encryption.

Values

gcm-aes-128

gcm-aes-256

clear-tag-mode

Syntax

clear-tag-mode clear-tag-mode

no clear-tag-mode

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command puts 802.1Q tags in clear before SecTAG. The following modes are available: single-tag and dual-tag.

The following table describes the encrypted dot1q and QinQ packet format when clear-tag-mode (single-tag or dual-tag) is configured.

Table: Encrypted dot1q and QinQ packet format

Unencrypted format

Clear-tag-mode

Pre-encryption (Tx)

Pre-decryption (Rx)

Single tag (dot1q)

single-tag

DA, SA, TPID, VID, Etype

DA, SA, TPID, VID, SecTag

Single tag (dot1q)

dual-tag

DA, SA, TPID, VID, Etype

DA, SA, TPID, VID, SecTag

Double tag (q-in-q)

single-tag

DA, SA, TPID1, VID1, IPID2, VID2, Etype

DA, SA, TPID1, VID1, SecTag

Double tag (QinQ)

dual-tag

DA, SA, TPID1, VID1, IPID2, VID2, Etype

DA, SA, TPID1, VID1, IPID2, VID2, SecTag

The no form of this command puts all dot1q tags after SecTAG and encrypts the tags.

Default

no clear-tag-mode

Parameters

clear-tag-mode

Specifies the clear tag mode.

Values

single-tag, dual-tag

description

Syntax

description description-string

no description

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command enters a description for the CA.

The no form of this command removes the CA description.

Parameters

description-string

Specifies a brief description of the CA using a string of up to 80 characters.

encryption-offset

Syntax

encryption-offset encryption-offset

no encryption-offset

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command specifies the offset of the encryption in MACsec packets.

The encryption offset is distributed by the MKA to all parties and is signaled via MACsec capabilities.

The following table describes the basic settings.

Table: MACsec basic settings

Setting

Description

0

MACsec is not implemented

1

Integrity without confidentiality

2

The following are supported:

  • integrity without confidentiality

  • integrity and confidentiality with a confidentiality offset of 0

3

1

The following are supported:

  • integrity without confidentiality

  • integrity and confidentiality with a confidentiality offset of 0, 30, or 50

The no form of this command rejects all arriving traffic regardless of whether it is MACsec-secured.

Default

encryption-offset 0

Parameters

encryption-offset

Specifies the encryption offset.

Values

0 — encrypts the entire payload

30 — leaves the IPv4 header in clear

50 — leaves the IPv6 header in clear

macsec-encrypt

Syntax

[no] macsec-encrypt

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command enables encryption and authentication (ICV payload) for all PDUs.

The no form of this command specifies that all PDUs are transmitted in cleartext form but still authenticated and have the trailing ICV.

Default

macsec-encrypt

replay-protection

Syntax

[no] replay-protection

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command configures the size of the replay protection window.

This command must be configured to force packet discard when the system detects a packet that is not within the parameters configured for the replay-window-size command.

When this command is enabled, the sequence of the ID number of the received packets is checked. If the packet arrives out of sequence, and the difference between the packet numbers exceeds the replay window size, the packet is counted by the receiving port and then discarded. For example, if the replay protection window size is set to 5 and a packet assigned the ID of 1006 arrives on the receiving link immediately after the packet assigned the ID of 1000, the packet that is assigned the ID of 1006 is counted and discarded because it falls outside the parameters of the replay-window-size command.

Replay protection is especially useful for fighting man-in-the-middle attacks. A packet that is replayed by a man-in-the-middle attacker on the Ethernet link arrives on the receiving link out of sequence, so replay protection helps ensure the replayed packet is dropped instead of forwarded through the network.

Note:

Replay protection should not be enabled in cases where packets are expected to arrive out of order.

Default

replay-protection

replay-window-size

Syntax

replay-window-size number-of-packets

no replay-window-size

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command specifies the size of the replay protection window.

This command must be configured to enable the replay-protection command.

When the number-of-packets parameter is set to 0, all packets that arrive out of order are dropped.

The no form of this command reverts to the default value.

Default

replay-window-size 0

Parameters

number-of-packets

Specifies the window that the packets can arrive out of order.

Values

0 to 4294967294

shutdown

Syntax

[no] shutdown

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command shuts down the CA profile. All ports using this profile do not transmit PDUs because this command shuts down MACsec for this profile.

The no form of this command enables the CA profile.

Default

shutdown

static-cak

Syntax

[no] static-cak

Context

config>macsec>connectivity-association

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

Commands in this context configure a Connectivity Association Key (CAK). A CAK is responsible for managing the MACsec key agreement (MKA).

active-psk

Syntax

active-psk active-pre-shared-key

no active-psk

Context

config>macsec>conn-assoc>static-cak

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command specifies which preshared key is the active transmitting preshared key. If there are two preshared keys configured, the arriving MACsec MKA can be decrypted using CAKs of both preshared keys; however, only the active PSK is used for Tx encryption of MKA PDUs.

Default

active-psk 1

Parameters

active-pre-shared-key

Specifies the value of the preshared key.

Values

1 or 2

mka-key-server-priority

Syntax

mka-key-server-priority priority

no mka-key-server-priority

Context

config>macsec>conn-associ>static-cak

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command specifies the key server priority used by the MKA protocol to select the key server when MACsec is enabled using the static CAK security mode.

The no form of this command disables this command.

Default

mka-key-server-priority 16

Parameters

priority

Specifies the priority of the server.

Values

0 to 255

pre-shared-key

Syntax

pre-shared-key pre-shared-key-index [encryption-type encryption-type] [create]

no pre-shared-key pre-shared-key-index

Context

config>macsec>conn-assoc>static-cak

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command specifies the preshared key used to enable MACsec using the static CAK security mode. This command also specifies the encryption algorithm used for encrypting the SAK.

A preshared key includes a connectivity association key name (CKN) and a CAK. The preshared key (the CKN and CAK) must match on both ends of a link.

A preshared key is configured on both devices at each end of a point-to-point link to enable MACsec using static CAK security mode. The MKA protocol is enabled after the successful MKA liveliness negotiation.

The encryption-type parameter is used to encrypt SAK and authentication of the MKA packet. The symmetric encryption key SAK needs to be encrypted (wrapped) using the encryption algorithm specified with the encryption-type parameter. The AES key is derived using the preshared key.

The no form of this command removes the index.

Parameters

pre-shared-key-index

Specifies the index of this preshared key.

Values

1, 2

encryption-type

Specifies the type of encryption.

Values

aes-128-cmac, aes-256-cmac

create

Specifies a mandatory keyword when creating an entry.

cak

Syntax

cak hex-string [hash | hash2]

no cak

Context

config>macsec>conn-assoc>static-cak>pre-shared-key

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command configures the CAK for a preshared key. The following values are derived from the CAK:

  • KEK (Key Encryption Key)

    KEK is used to encrypt the MKA and SAK (symmetric key used for datapath PDUs) to be distributed between all members.

  • ICK (Integrity Check Value)

    ICK is used to authenticate the MKA and SAK PDUs to be distributed between all members.

The no form of this command removes the CAK hexidecimal string value.

Parameters

hex-string

Specifies the value of the CAK using up to 64 hexadecimal characters, 32 hexadecimal characters for a 128-bit key, and 64 hexadecimal characters for a 256-bit key.

hash

Specifies the hash scheme.

hash2

Specifies the hash scheme.

ckn

Syntax

ckn hex-string

no ckn

Context

config>macsec>conn-assoc>static-cak>pre-shared-key

Platforms

7210 SAS-K 2F6C4T, 7210 SAS-K 3SFP+ 8C, and 7210 SAS-Dxp 24p

Description

This command specifies the connectivity association key name (CKN) for a preshared key.

The CKN is appended to the MKA for identification of the CAK by the peer.

The no form of this command removes the CKN.

Parameters

hex-string

Specifies the value of the CKN.

Values

32 octets char (64 hex)

1 7210 SAS supports setting 3: Integrity without confidentiality and Integrity and confidentiality with a confidentiality offset of 0, 30, or 50.