Virtual PrivateNetworks(VPN) MACsec
IX20 User Guide
635
5. Click Enable.
6. For Local endpoint, select the local network device you want to use to connect to the peer
device.
7. For Security mode, select your desired mode.
n
Automatic: Usesa pre-shared key to generate association key information, which is
periodically rotated through using 802.1x.
n
Manual: Usesconnectivity association key information that ismanually entered in the
CAKand CKN fields.
8. If you selected Manual, additional required fields display.
a. For CAK, enter the connectivity associated key. The key format is16 hex digits.
b. For CKN, enter the connectivity associated key name. The key format is 32 hex digits.
9. Click Apply to savethe configuration and apply the change.
Command line
1. Select the device in Remote Manager and click Actions> Open Console, or log into the IX20
local command line as a user with full Admin access rights.
Depending on your device configuration, you may be presented with an Access selection
menu. Type admin to accessthe Admin CLI.
2. At the command line, type config to enter configuration mode:
> config
(config)>
3. Name the tunnel. At the config prompt, type:
(config)> add vpn macsec name
(config)>
where name is a string.
4. Enable the tunnel:
(config vpn macsec tunnel1) enable true
(config vpn macsec tunnel1)>
5. Specify the local endpoint:
(config vpn macsec tunnel1) local value
(config vpn macsec tunnel1)>
where value is one of the available options.
6. Specify the security mode:
(config vpn macsec tunnel1) type value
(config vpn macsec tunnel1)>
where value is one of the following: