Configuring ANYsec connectivity association and PSK
Because ANYsec uses MKA for its control plane and signaling SAKs, it also uses MACsec CAs and PSKs. The config>macsec>conn-assoc>anysec command creates a CA exclusively for the use of ANYsec encryption. When configured for ANYsec, a CA cannot also be used for MACsec.
ANYsec CAs support the static-cak and the cipher-suite commands. The following commands are blocked on ANYsec CAs:
- clear-tag mode
- encryption-offset
- macsec-encrypt
- replay-protection
- replay-window-size
Additionally, ANYsec does not support configuration of a MACsec MAC policy.
The following example displays an ANYsec CA configuration.
Example
A:node-2>config>macsec# info
----------------------------------------------
connectivity-association "CA-1" create.
anysec
cipher-suite gcm-aes-xpn-256
static-cak
pre-shared-key 1 encryption-type aes-256-cmac create
cak "2yzrsjg5sp7MYAnWpod+Nkn4SwXf7OPMEfAMRpNh9Gu/badNTWOoYEG9Qi1NDOBW" hash2
ckn "11"
exit
mka-hello-interval 5
exit
no shutdown
exit