Configuring ANYsec connectivity association and PSK

Because ANYsec uses MKA for its control plane and signaling SAKs, it also uses MACsec CAs and PSKs. The config>macsec>conn-assoc>anysec command creates a CA exclusively for the use of ANYsec encryption. When configured for ANYsec, a CA cannot also be used for MACsec.

ANYsec CAs support the static-cak and the cipher-suite commands. The following commands are blocked on ANYsec CAs:

  • clear-tag mode
  • encryption-offset
  • macsec-encrypt
  • replay-protection
  • replay-window-size

Additionally, ANYsec does not support configuration of a MACsec MAC policy.

The following example displays an ANYsec CA configuration.

Example

A:node-2>config>macsec# info
----------------------------------------------
        connectivity-association "CA-1" create.
            anysec
            cipher-suite gcm-aes-xpn-256
            static-cak
                pre-shared-key 1 encryption-type aes-256-cmac create
                    cak "2yzrsjg5sp7MYAnWpod+Nkn4SwXf7OPMEfAMRpNh9Gu/badNTWOoYEG9Qi1NDOBW" hash2
                    ckn "11"
                exit
                mka-hello-interval 5
            exit
            no shutdown
        exit