i
Contents
Configuring MACsec ······················································································· 2
Overview ···························································································································································· 2
Basic concepts ··········································································································································· 2
MACsec services ······································································································································· 2
MACsec applications ·································································································································· 3
MACsec operating mechanism ·················································································································· 3
Protocols and standards ···························································································································· 5
Feature and hardware compatibility ··················································································································· 5
MACsec configuration task list ··························································································································· 5
Enabling MKA ···················································································································································· 6
Enabling MACsec desire ···································································································································· 6
Configuring a preshared key ······························································································································ 7
Configuring the MKA key server priority ············································································································ 7
Configuring MACsec protection parameters in interface view ··········································································· 8
Configuring the MACsec confidentiality offset ···························································································· 8
Configuring MACsec replay protection ······································································································· 8
Configuring the MACsec validation mode ·································································································· 9
Configuring MACsec protection parameters by MKA policy ·············································································· 9
Configuring an MKA policy ························································································································· 9
Applying an MKA policy ··························································································································· 10
Displaying and maintaining MACsec ··············································································································· 10
MACsec configuration examples ····················································································································· 11
Client-oriented MACsec configuration example ······················································································· 11
Device-oriented MACsec configuration example ····················································································· 13
Troubleshooting MACsec ································································································································· 17
Cannot establish MKA sessions between MACsec devices ···································································· 17
Document conventions and icons ································································· 18
Conventions ····················································································································································· 18
Network topology icons ···································································································································· 19
Support and other resources ········································································ 20
Accessing Hewlett Packard Enterprise Support ······························································································ 20
Accessing updates ··········································································································································· 20
Websites ·················································································································································· 21
Customer self repair ································································································································· 21
Remote support ········································································································································ 21
Documentation feedback ························································································································· 21
Index ············································································································· 23