Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Common Criteria Guide for SRX380 Devices
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configuring MACsec

date_range 01-Dec-23

SUMMARY 

Configure MACsec

We can configure MACsec to secure point-to-point Ethernet links connecting SRX380 with MACsec-capable MICs. Each point-to-point Ethernet link that you want to secure using MACsec must be configured independently. We can enable MACsec on device-to-device links using static connectivity association key (CAK) security mode.

On SRX380, MACsec is supported only on the forty-four 10-Gigabit or 1-Gigabit Ethernet ports. In this section, these ports are used for configuring MACSec.

Configuring MACsec on a Device Running Junos OS

To configure MACsec on a device running Junos OS:

  1. Configure the MACsec security mode as for the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name exclude-protocol protocol-name
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name include-sci
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name mka must-secure
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name mka key-server-priority priority-number
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name mka transmit-interval interval
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name no-encryption 
    crypto-officer@hostname:fips#  set security macsec connectivity-association connectivity-association-name offset (0|30|50)
    
  2. Create the pre-shared key by configuring the connectivity association key name (CKN) and connectivity association key (CAK).
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name pre-shared-key cak hexadecimal-number
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name pre-shared-key ckn hexadecimal-number
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name replay-protect{ replay-window-size number-of-packets
    
  3. Set the MACsec Key Agreement (MKA) secure channel details.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name direction (inbound | outbound)
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name encryption (MACsec)
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name id mac-address mac-address
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name id port-id port-id-number
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name offset (0|30|50)
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name secure-channel secure-channel-name security-association security-association-number key key-string
    
  4. Set the MKA to security mode.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association connectivity-association-name security-mode security-mode
    
  5. Assign the configured connectivity association with a specified MACsec interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association connectivity-association-name
    

Configuring Static MACsec with ICMP Traffic

To configure Static MACsec using ICMP traffic between device R0 and device R1:

In R0:

  1. Create the preshared key by configuring the connectivity association key name (CKN) and connectivity association key (CAK)
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security macsec connectivity-association CA1 pre-shared-key ckn 2345678922334455667788992223334445556667778889992222333344445555
    crypto-officer@hostname:fips#  set security macsec connectivity-association CA1 pre-shared-key cak 23456789223344556677889922233344
    crypto-officer@hostname:fips#  set security macsec connectivity-association CA1 offset 30
    
  2. Set the trace option values.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  3. Assign the trace to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  4. Configure the MACsec security mode as static-cak for the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  5. Set the MKA key server priority.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  6. Set the MKA transmit interval.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  7. Enable the MKA secure.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka should-secure
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  8. Assign the connectivity association to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    crypto-officer@hostname:fips# set interfaces interface-name unit 0 family inet address 10.1.1.1/24
    

In R1:

  1. Create the preshared key by configuring the connectivity association key name (CKN) and connectivity association key (CAK)

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security macsec connectivity-association CA1 pre-shared-key ckn 2345678922334455667788992223334445556667778889992222333344445555
    crypto-officer@hostname:fips#  set security macsec connectivity-association CA1 pre-shared-key cak 23456789223344556677889922233344
    crypto-officer@hostname:fips#  set security macsec connectivity-association CA1 offset 30
    
  2. Set the trace option values.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  3. Assign the trace to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  4. Configure the MACsec security mode as static-cak for the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  5. Set the MKA transmit interval.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  6. Enable the MKA secure.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka should-secure
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  7. Assign the connectivity association to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    crypto-officer@hostname:fips# set interfaces interface-name unit 0 family inet address 10.1.1.2/24
    

Configuring MACsec with keychain using ICMP Traffic

To configure MACsec with keychain using ICMP traffic between device R0 and device R1:

In R0:

  1. Assign a tolerance value to the authentication key chain.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 tolerance 20
    
  2. Create the secret password to use. It is a string of hexadecimal digits up to 64 characters long. The password can include spaces if the character string is enclosed in quotation marks. The keychain's secret-data is used as a CAK.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
    

    Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 0 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 1 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 2 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 3 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 4 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 5 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 6 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 7 secret 
    New cak (secret):
    Retype new cak (secret):
    
  3. Associate the preshared keychain name with the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 offset 50
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
    
    Note:

    The cipher value can also be set as cipher-suite gcm-aes-128.

  4. Set the trace option values.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  5. Assign the trace to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  6. Configure the MACsec security mode as static-cak for the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  7. Set the MKA key server priority.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  8. Set the MKA transmit interval.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  9. Enable the MKA secure.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  10. Assign the connectivity association to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    crypto-officer@hostname:fips# set interfaces interface-name unit 0 family inet address 10.1.1.1/24
    

To configure MACsec with keychain for ICMP traffic:

In R1:

  1. Assign a tolerance value to the authentication key chain.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 tolerance 20
    
  2. Create the secret password to use. It is a string of hexadecimal digits up to 64 characters long. The password can include spaces if the character string is enclosed in quotation marks. The keychain's secret-data is used as a CAK.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
    

    Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 0 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 1 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 2 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 3 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 4 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 5 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 6 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 7 secret 
    New cak (secret):
    Retype new cak (secret):
    
  3. Associate the preshared keychain name with the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 offset 50
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
    
  4. Set the trace option values.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  5. Assign the trace to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  6. Configure the MACsec security mode as static-cak for the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  7. Set the MKA key server priority.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  8. Set the MKA transmit interval.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  9. Enable the MKA secure.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  10. Assign the connectivity association to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    crypto-officer@hostname:fips# set interfaces interface-name unit 0 family inet address 10.1.1.2/24
    

Configuring Static MACsec for Layer 2 Traffic

To configure static MACsec for Layer 2 traffic between device R0 and device R1:

In R0:

  1. Set the MKA key server priority.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  2. Create the secret password to use. It is a string of hexadecimal digits up to 64 characters long. The password can include spaces if the character string is enclosed in quotation marks. The keychain's secret-data is used as a CAK.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 0 secret 
    New cak (secret):
    Retype new cak (secret):
    

    For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.

  3. Associate the preshared keychain name with the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 offset 50
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
    
  4. Set the trace option values.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  5. Assign the trace to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  6. Configure the MACsec security mode as static-cak for the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  7. Set the MKA key server priority.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  8. Set the MKA transmit interval.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  9. Enable the MKA secure.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  10. Assign the connectivity association to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    
  11. Configure VLAN tagging.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set interfaces interface-name1 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name1 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 vlan-id 100
    crypto-officer@hostname:fips# set interfaces interface-name2 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name2 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 vlan-id 100
    
  12. Configure bridge domain.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set bridge-domains BD-110 domain-type bridge
    crypto-officer@hostname:fips# set bridge-domains BD-110 vlan-id 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name1 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name2 100
    

In R1:

  1. Create the secret password to use. It is a string of hexadecimal digits up to 64 characters long. The password can include spaces if the character string is enclosed in quotation marks. The keychain's secret-data is used as a CAK.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 0 secret 
    New cak (secret):
    Retype new cak (secret):
    

    For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.

  2. Associate the preshared keychain name with the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 offset 50
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
    
  3. Set the trace option values.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  4. Assign the trace to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  5. Configure the MACsec security mode as static-cak for the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  6. Set the MKA key server priority.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  7. Set the MKA transmit interval.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  8. Enable the MKA secure.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  9. Assign the connectivity association to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    
  10. Configure VLAN tagging.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set interfaces interface-name1 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name1 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 vlan-id 100
    crypto-officer@hostname:fips# set interfaces interface-name2 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name2 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 vlan-id 100
    
  11. Configure bridge domain.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set bridge-domains BD-110 domain-type bridge
    crypto-officer@hostname:fips# set bridge-domains BD-110 vlan-id 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name1 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name2 100
    

Configuring MACsec with keychain for Layer 2 Traffic

To configure MACsec with keychain for ICMP traffic between device R0 and device R1:

In R0:

  1. Assign a tolerance value to the authentication key chain.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 tolerance 20
    
  2. Create the secret password to use. It is a string of hexadecimal digits up to 64 characters long. The password can include spaces if the character string is enclosed in quotation marks. The keychain's secret-data is used as a CAK.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
    

    Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 0 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 1 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 2 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 3 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 4 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 5 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 6 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 7 secret 
    New cak (secret):
    Retype new cak (secret):
    
  3. Associate the preshared keychain name with the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
    
  4. Set the trace option values.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  5. Assign the trace to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  6. Configure the MACsec security mode as static-cak for the connectivity association.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  7. Set the MKA key server priority.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  8. Set the MKA transmit interval.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  9. Enable the MKA secure.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  10. Assign the connectivity association to an interface.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    
  11. Configure VLAN tagging.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set interfaces interface-name1 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name1 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 vlan-id 100
    crypto-officer@hostname:fips# set interfaces interface-name2 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name2 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 vlan-id 100
    
  12. Configure bridge domain.
    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set bridge-domains BD-110 domain-type bridge
    crypto-officer@hostname:fips# set bridge-domains BD-110 vlan-id 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name1 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name2 100
    

In R1:

  1. Assign a tolerance value to the authentication key chain.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 tolerance 20
    
  2. Create the secret password to use. It is a string of hexadecimal digits up to 64 characters long. The password can include spaces if the character string is enclosed in quotation marks. The keychain's secret-data is used as a CAK.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 key-name 2345678922334455667788992223334445556667778889992222333344445551
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 0 start-time 2018-03-20.20:35
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 key-name 2345678922334455667788992223334445556667778889992222333344445552 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 1 start-time 2018-03-20.20:37
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 key-name 2345678922334455667788992223334445556667778889992222333344445553 
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 2 start-time 2018-03-20.20:39
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 key-name 2345678922334455667788992223334445556667778889992222333344445554
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 3 start-time 2018-03-20.20:41
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 key-name 2345678922334455667788992223334445556667778889992222333344445555
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 4 start-time 2018-03-20.20:43
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 key-name 2345678922334455667788992223334445556667778889992222333344445556
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 5 start-time 2018-03-20.20:45
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 key-name 2345678922334455667788992223334445556667778889992222333344445557
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 6 start-time 2018-03-20.20:47
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 key-name 2345678922334455667788992223334445556667778889992222333344445558
    crypto-officer@hostname:fips#  set security authentication-key-chains key-chain macsec-kc1 key 7 start-time 2018-03-20.20:49
    

    Use the prompt command to enter a secret key value. For example, the secret key value is 2345678922334455667788992223334123456789223344556677889922233341.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 0 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 1 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 2 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 3 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 4 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 5 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 6 secret 
    New cak (secret):
    Retype new cak (secret):
    crypto-officer@hostname:fips#  prompt security authentication-key-chains key-chain macsec-kc1 key 7 secret 
    New cak (secret):
    Retype new cak (secret):
    
  3. Associate the preshared keychain name with the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 pre-shared-key-chain macsec-kc1
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 cipher-suite gcm-aes-256
    
  4. Set the trace option values.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec traceoptions file MACsec.log
    crypto-officer@hostname:fips# set security macsec traceoptions file size 4000000000
    crypto-officer@hostname:fips# set security macsec traceoptions flag all
    
  5. Assign the trace to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions file mka_xe size 1g
    crypto-officer@hostname:fips# set security macsec interfaces interface-name traceoptions flag all
    
  6. Configure the MACsec security mode as static-cak for the connectivity association.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 security-mode static-cak
    
  7. Set the MKA key server priority.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka key-server-priority 1
    
  8. Set the MKA transmit interval.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 mka transmit-interval 3000
    
  9. Enable the MKA secure.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec connectivity-association CA1 include-sci
    
  10. Assign the connectivity association to an interface.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set security macsec interfaces interface-name connectivity-association CA1
    
  11. Configure VLAN tagging.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set interfaces interface-name1 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name1 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name1 unit 100 vlan-id 100
    crypto-officer@hostname:fips# set interfaces interface-name2 flexible-vlan-tagging
    crypto-officer@hostname:fips# set interfaces interface-name2 encapsulation flexible-ethernet-services
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 encapsulation vlan-bridge
    crypto-officer@hostname:fips# set interfaces interface-name2 unit 100 vlan-id 100
    
  12. Configure bridge domain.

    content_copy zoom_out_map
    [edit]
    crypto-officer@hostname:fips# set bridge-domains BD-110 domain-type bridge
    crypto-officer@hostname:fips# set bridge-domains BD-110 vlan-id 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name1 100
    crypto-officer@hostname:fips# set bridge-domains BD-110 interface interface-name2 100
    
footer-navigation