
i
Contents
Configuring MACsec·······················································································2
Overview····························································································································································2
Basic concepts···········································································································································2
MACsec services ·······································································································································2
MACsec applications··································································································································3
MACsec operating mechanism··················································································································3
Protocols and standards ····························································································································5
Feature and hardware compatibility···················································································································5
MACsec configuration task list···························································································································5
Enabling MKA ····················································································································································6
Enabling MACsec desire····································································································································6
Configuring a preshared key······························································································································7
Configuring the MKA key server priority ············································································································7
Configuring MACsec protection parameters in interface view ···········································································8
Configuring the MACsec confidentiality offset····························································································8
Configuring MACsec replay protection·······································································································8
Configuring the MACsec validation mode··································································································9
Configuring MACsec protection parameters by MKA policy ··············································································9
Configuring an MKA policy·························································································································9
Applying an MKA policy ···························································································································10
Displaying and maintaining MACsec ···············································································································10
MACsec configuration examples ·····················································································································11
Client-oriented MACsec configuration example·······················································································11
Device-oriented MACsec configuration example·····················································································13
Troubleshooting MACsec·································································································································17
Cannot establish MKA sessions between MACsec devices····································································17
Document conventions and icons·································································18
Conventions·····················································································································································18
Network topology icons····································································································································19
Support and other resources ········································································20
Accessing Hewlett Packard Enterprise Support ······························································································20
Accessing updates···········································································································································20
Websites ··················································································································································21
Customer self repair·································································································································21
Remote support········································································································································21
Documentation feedback ·························································································································21
Index·············································································································23