BRKRST 2309
BRKRST 2309
Introduction to WAN
MACsec
Aligning Encryption Technologies with
WAN Transport
BRKRST-2309
#CLUS
Agenda
• Introduction
• Transport Types
• MACSec overview
• MACSec Key Agreement (MKA)
• WAN MACSec Deployment
Models
• High Availability
• APIs/Programmability
• Conclusion
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Session Presenters
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Session Assumptions and Disclaimers
• Intermediate understanding of Cisco Site-to-Site Encryption
Technologies
• DMVPN
• GETVPN
• FlexVPN
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Public Link:
http://www.cisco.com/c/dam/en/us/td/docs/solutions/
Enterprise/Security/MACsec/WP-High-Speed-WAN-
Encrypt-MACsec.pdf
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Cisco’s Next Generation
Encryption Initiative
Crytography is embedded in all of Cisco’s products
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Where Cryptography is Deployed Today
Privacy/Confidentiality Management
Authentication
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
What is Next Generation Encryption (NGE)?
• New/Upgraded algorithms, key sizes,
Cryptographic protocols and entropy
Technologies • Compatible with existing security
architectures
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Next Generation Encryption: Why it’s Needed…
• Next Generation Encryption (NGE)
• A widely accepted and consistent set of cryptographic algorithms that provide strong security and
good performance
• Best standards that can be implemented today to meet the security and scalability requirements
for network security in the years to come
• No attacks against these algorithms have been demonstrated.
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Cryptography Recommendations
Operation Algorithm
Acceptable NGE (preferred) QCR
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Recommended algorithms per security level
Algorithm
Security level
(strength)
Acceptable NGE (preferred)
AES-128-CBC AES-128-GCM
DH, DSA, RSA-3072 ECDHE, ECDSA-256
128 bits
- SHA-256
HMAC-SHA-1 HMAC-SHA-256
AES-192-CBC AES-192-GCM
- ECDHE, ECDSA-384
192 bits
- SHA-384
- HMAC-SHA-256
AES-256-CBC AES-256-GCM
- ECDHE, ECDSA-521
256 bits
- SHA-512
- HMAC-SHA-256
Customers concerned with QC Resistance should use NGE recommended algorithms (>128-bit security level)
BRKRST-2309 15
NGE Enabled Encryption Architectures:
Available Today GM3
GM4
ASA
GM2
Firewall
CSM /
GM5
ASDM
GM
1
.
GM6
. .
Remote Access GM9
KS
VPNs GM8 GM7
Site to Site,
&(
Supplicant
DMVPN, and
with
MACsec MACsec
FlexVPN
Capable
MACsec Link Devices
MACsec
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
VPN Solutions Compared
DMVPN FlexVPN GET VPN
Any-to-Any;
Large Scale Hub and Spoke Converged Site to Site and Remote (Site-to-Site)
Network Style with dynamic Any-to-Any Access
Up to 10000 sites 24,000 group members
Up to 4000 sites
per KS
Dyn Routing or IKEv2 Route
A/A based on Dynamic Distribution Transport Routing
Failover Redundancy Routing Server Clustering
COOP Based on GDOI
Stateful Failover *
Multicast replication at hub
Multicast replication in IP
IP Multicast Multicast replication at hub Multicast replication in IP WAN WAN network
network *
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
GETVPN
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Evolving Encryption
Solutions – Introduction
to MACsec
Challenges with Current WAN Encryption
• IPSec performance, complexity, and cost becoming more challenged
• Throughput constrained to the performance of the IPSec encryption engine
• MPLS, Multicast, IPv6 in some cases require GRE tunneling to operate
• GRE and IP overlays add an additional leverage of complexity and
performance impact in certain router platforms
• Innovations such as DMVPN, MPLS VPN over mGRE simplify this, but
IPSec performance still lowest common denominator and performance
impact
• Line-rate encryption is becoming a requirement, that is simpler to
operate, and removes levels of complexity from the WAN solution
WAN MACsec targets addressing these challenges…
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Link Speeds Out-Pacing IP Encryption
• Bandwidth application requirements out-pacing IP
encryption capabilities
• Bi-directional and packet sizes further impact
encryption performance
• IPSec engines dictate aggregate performance of
the platform (much less that router forwarding
capabilities)
link
BW • Encryption must align with link speed (100G+) to
Link speed = Encryption support next-generation applications
Engine
time
Link Speed
IPSec Encryption Speed
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Problems addressed by L2 Encryption
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
New Applications and Architectures Driving WAN
Encryption Rates
• Increasing bandwidth demands over the WAN for branch, applications and data centers
• Less applications run locally in branch locations, driving high-speed transport increases
• Highly resilient cloud computing architectures (C2S, GovCloud) driving high speed data center
replication requirements
• Traffic pattern changes dictated by cloud, M2M communications, IoT/IoE
• Encryption landscape is changing driving high speed layered encryption solution offerings
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
What is MAC Security (MACsec)?
Hop-by-Hop Encryption via IEEE802.1AE
ASIC
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Confidentiality and Integrity 802.1AE based Encryption
• * NIST Special Publication 800-38D (http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf)
Customer Benefits
Protects against man-in-the-middle attacks (snooping, tampering, replay)
Standards based frame format and algorithm (AES-GCM)
802.1X-2010/MKA addition supports per-device security associations in shared media
environments (e.g. PC vs. IP Phone) to provide secured communication
Network service amenable hop-by-hop approach compared to end-to-end approach (e.g.
Microsoft Domain Isolation/virtualization)
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
MACsec Timeline
2013
802.1AEbw
2010 Amendment
2006 802.1af becomes MACSec defines
802.1AE part of 802.1x- AES-GCM-XPN -
MACSec AES- 2010 MACSec Key 128 ann AES-GCM-
128-GCM Agreement (MKA) XPN-256
BRKRST-2309 48
MACsec Protocols & Algorithms
Function Protocol Specification Encryption
Algorithms
1
Device Identification Secure Device IEEE 802.1AR RSA, ECC
Identification
2 Authentication and EAP: Extensible IEEE 802.1X (RFC 5126, TLS Based:
Key Establishment Authentication Protocol RFC 4851) RSA, ECC, AES,
(EAP-TLS, Cisco EAP-FAST) HMAC-SHA2
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
802.1AE (MASec) Tagging
TrustSec Frame Format
Authenticated
Encrypted
DMAC SMAC 802.1AE Header 802.1Q CMD ETYPE PAYLOAD ICV CRC
0x88e5
MACsec EtherType TCI/AN SL Packet Number SCI (optional)
No impact to IP MTU/Fragmentation
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Quick MACsec Terminology
Acronym Definition
MACsec Key Agreement – defined in IEEE 802.1XREV-2010 is a key agreement protocol
MKA for discovering MACsec peers and negotiating keys
Master Session Key, generated during EAP exchange. Supplicant and authentication server
MSK use the MSK to generate the CAK.
Connectivity Association Key is derived from MSK. CAK is a long-lived master key used to
CAK generate all other keys used for MACsec.
Key Server
KS • responsible for selecting and advertising a cipher suite
• responsible for generating the SAK from the CAK.
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
MACsec Key Agreement (MKA) and EAP
Authentication
Authenticator/AS Supplicant
Mutual Authentication,
IEEE 802.1X/EAP MSK
MACsec Key Agreement
protected by key derived
from the EAP
IEEE 802.1X/MKA
MACsec Key
MACsec protecting
IEEE 802.1AE data
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
MACsec Functional Sequence
Supplicant Authen cator Authen ca on Server
IEEE 802.1X
and Master Key [AVP: EAP-Response: Alice]
Distribu on RADIUS Access-Challenge
[AVP: EAP-Request: PEAP]
RADIUS Access-Accept
EAP Success [AVP: EAP Success]
[AVP: EAP Key Name]
[AVP: CAK]
MKA
Key
Agreement EAPoL-MKA: Key Name, SAK
EAPoL-MKA: SAK Installed
AES-GCM-128
Encrypted Data
MACSec
3 Session
Secure Encrypted Data
BRKRST-2309 53
MACsec Key Hierarchy
• Two Methods to derive Encryption EAP MSK
Keys
• 802.1X/EAP CKN CAK
• Pre-shared Keys
ICK KEK SAK
• If EAP method is used – all keys are
generated from the Master Session
Key (MSK)
Pre-Shared Key
CAK CKN
• If Pre-shared Key is used the
CAK=PSK and the CKN must be
manually entered
ICK KEK SAK
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
MKA with Pre-shared and cached CAKs
• When EAP is not used for Authentication – a pre-shared key (PSK) can be used.
The CAK is manually placed in the router/switch configuration and used as the PSK
EAP/MACsec use cases require the link to come up even if the AAA server
• Some
cannot be reached
• A preinstalled CAK can be cached in the configuration, and then used until such time as the
AAA server is reached and a new CAK is obtained.
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Cryptography: Keys used in MKA (CAK/CKN)
• MKA uses a key hierarchy based on a single long-term key (CAK)
• CAK is derived from the EAP MSK using a key derivation function (KDF) defined in NIST
SP800-108. The following is for a 128-bit CAK. (The key is longer for a 256-bit CAK.)
CAK = KDF(MSK[0-15], "IEEE8021 EAP CAK”, mac1 | mac2, CAKlength)
• A unique name is derived for the CAK, called a CKN. This is like a KeyID
CKN = KDF(MSK[0-15], "IEEE8021 EAP CKN”, mac1 | mac2, CKNlength)
Note: A pre-shared or cached CAK requires both the CAK and CKN to
be saved in the network device configuration, as well as some policy
(e.g., cipher suite)
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Keys used in MKA (MKA keys/SAK)
• Two keys are generated from the CAK by MKA
• ICV Key (ICK) used to prove an authorized peer sent the message
• ICK = KDF(CAK, “IEEE8021 ICK”, Keyid, ICKLength)
• Key Encrypting Key (KEK) used to protect the MACsec keys (SAK)
• KEK = KDF(CAK, “IEEE8021 KEK”, Keyid, KEKLength)
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Let’s talk MACsec Access Control
• Use the macsec access-control {must-secure | should-secure} command to control the
behavior of unencrypted packets.
• The should-secure keyword allows unencrypted packets from the physical interface or
subinterfaces to be transmitted or received.
• The must-secure keyword does not allow unencrypted packets from physical interface or
subinterfaces to be transmitted or received. All such packets are dropped except for MKA
control protocol packets
CAUTION
• If MACsec is enabled only on selected subinterfaces, configure the should-secure keyword
option on the corresponding interface.
• The default configuration for MACsec on subinterfaces is macsec access-control must-secure.
This option is enabled by default when the macsec command is configured on an interface.
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
MKA Key Chain configuration
Key Chain Name
Lifetime
Note: The lifetime is
for the CKN not the
#CLUS BRKRST-2309
CAK
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
MKA Policy
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
MACSec Interface Configuration
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
MACSEC SA Scale with Re-Keying (ASR9K)
• We always allocate 2 SAs:
• 1st SA = Active SA has SAK
• 2nd SA = Idle SA reserved for re-keying, has no SAK
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
MACSEC SA Scale with Re-Keying (IOS-XE)
key chain key-roll macsec
key 01
cryptographic-algorithm aes-128-cmac
key-string 12345678901234567890123456789012
lifetime 14:59:59 Apr 4 2017 duration 5000
key 02
cryptographic-algorithm aes-128-cmac
key-string 12345678901234567890123456789011
lifetime 16:00:00 4 apr 2017 17:10:00 4 apr 2017
key 03
cryptographic-algorithm aes-128-cmac
key-string 12345678901234567890123456789013
lifetime 17:00:00 4 apr 2017 18:10:00 4 apr 2017
key 04
cryptographic-algorithm aes-128-cmac
key-string 12345678901234567890123456789014
lifetime 18:00:00 4 apr 2017 infinite
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
MACSEC SA Scale with Re-Keying (IOS-XE)
ASR-1000-B#
Apr 4 16:00:00.000: %MKA-5-CAK_REKEY: (Te0/0/1 : 8) MKA Session
is beginning a CAK Rekey for RxSCI b0aa.7741.3f01/0008,
AuditSessionID , AuthMgr-Handle 5F000003, Old CKN
0100000000000000000000000000000000000000000000000000000000000000
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
MACSec Status
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Prerequisites for Certificate-based MACsec
Encryption
• Ensure that you have a Certificate Authority (CA) server configured for
your network.
• Generate a CA certificate.
• Ensure that you have configured Cisco Identity Services Engine (ISE)
Release 2.0. Refer to the Cisco Identity Services Engine Administrator
Guide, Release 2.3.
• Ensure that both the participating devices, the CA server, and Cisco
Identity Services Engine (ISE) are synchronized using Network Time
Protocol (NTP). If time is not synchronized on all your devices,
certificates will not be validated.
• Ensure that 802.1x authentication and AAA are configured on your
device.
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Restrictions for Certificate-based MACsec
Encryption
• MKA is not supported on port-channels.
• High Availability for MKA is not supported.
• Certificate-based MACsec encryption on sub-interfaces is not
supported.
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Call Flow for Certificate-based MACsec
Encryption using Remote Authentication
1. MACSec enabled routers will act
as both Supplicant and
Authenticator
2. Two EAP Sessions (with separate
EAP Session IDs) are initiated Red
and Blue
3. After mutual authentication, the
MSK of the flow corresponding to
the router with the higher MAC
address and role as authenticator is
picked to derive the CAK.
CAK = KDF(MSK[0-15], "IEEE8021 EAP CAK”, mac1 | mac2, CAKlength)
CKN = KDF(MSK[0-15], "IEEE8021 EAP CKN”, mac1 | mac2, CKNlength)
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Call Flow for Certificate-based MACsec
Encryption using Local Authentication
1. MACSec enabled routers will act
as both Supplicant and
Authenticator
2. Two EAP Sessions (with separate
EAP Session IDs) are initiated Red
and Blue
3. After mutual authentication, the
MSK of the flow corresponding to
the router with the higher MAC
address and role as authenticator is
picked to derive the CAK.
CAK = KDF(MSK[0-15], "IEEE8021 EAP CAK”, mac1 | mac2, CAKlength)
CKN = KDF(MSK[0-15], "IEEE8021 EAP CKN”, mac1 | mac2, CKNlength)
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Certificate Based MACSec Configuration .1X Config
aaa new-model eap profile EAPTLS-PROF-IOSCA
dot1x system-auth-control method tls
radius server ISE
pki-trustpoint IOS-CA
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Applying configuration to Interface
interface TenGigabitEthernet0/1
macsec network-link
authentication periodic authentication timer reauthenticate <reauthentication interval>
access-session host-mode multi-host
access-session closed
access-session port-control auto
dot1x pae both
dot1x credentials EAPTLSCRED-IOSCA
dot1x supplicant eap profile EAPTLS-PROF-IOSCA
service-policy type control subscriber DOT1X_POLICY_RADIUS
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Handing MACSEC Out-of-Sequence Frames
Replay-Protection-Window-Size Behavior
• Replay protection Window Size = Maximum out-of-sequence frames MACSEC
accepts and not discarded
• MACSEC Egress Decryption PE expects:
• All frames to be received in sequence as 1,2,3, etc … (ascending order)
• All out-or-order or out-of-sequence frames should not exceed “Replay Protection Window Size”
• If any frame with sequence number outside of window size arrives it will be discarded. Eg, window expects
1-64, but we get 100 then100 will be discarded.
Replay-Protection-Window-Size = 0 Replay-Protection-Window-Size = 64
Strict Discard Enforced Max 64 out of Sequence accepted
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
MACsec and IPsec Comparison
Category MACsec IPsec
Market Positioning 1. Aggregate Deployments such as Regional Hubs 1. Small Branches
2. Large Branches that require high throughput 2. High Scale deployments
3. Data Center Interconnects 3. Low throughput Branches
4. Beyond MetroE (International) Reach
Link Requires dedicated MetroE EVC circuits for L2 connectivity Easily Routable over many commonly available public
Requirement/Topolog between sites network
ies Point-to-Point, Point-to-MultiPoint Any Topology
Encryption Per PHY Link Speed (1G, 10G, 40G, 100G) Constrained by IPsec Crypto engine performance
Performance
Services Enablement No impact to encryption throughput Impacts encryption throughput
Layer 3 Visibility for No. Except Layer 2 headers (and optionally VLAN/MPLS Visible. L3 info can be used for monitoring & policy
Monitoring Labels) everything else is encrypted enforcement purposes
#CLUS
Kural Arangasamy BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
MACsec Deployment
Models and Use Cases
What is WAN MACsec?
What is “WAN MACsec?
Secure Ethernet Link(s) over Public Ethernet Transport
MKA Session
Service Provider
Owned Routers/Bridges
Data Data
Center Public Carrier Center
Ethernet
Service Central
Remote
Campus/DC Campus/DC
• Optimize MACsec + WAN features to accommodate running MACsec Secured Path / MKA
over public Ethernet transport Session
MACsec Capable Router
• Target “line-rate” encryption, regardless of packet size
MACsec Capable PHY
• Targets 100G, as well as 1/10/40G SP Owned Ethernet
Transport Device
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Router Peering Model View over E-LINE
Point to Point E-LINE Service
Physical View Logical View
CE2 CE2
CE1 CE1
CE4 CE3
CE4 CE3 Ethernet Sub-interface with
Ethernet Sub- 802.1q support Central
Central
interface with Site
802.1q support Site
Carrier Ethernet
Service Flat Ethernet
Bridge domain
E-LAN (multi-pt)
Single VLAN
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
WAN MACsec Use
Cases
Primary WAN MACsec Use Cases
• Point to Point
• Point to Multi Point / Multi-point to Multi-point
• Securing Private IP / MPLS / Segment Routing backbone
• Hybrid Encrypted WAN – WAN MACsec + IPSec
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Use Cases
Point to Point
Topologies
WAN MACsec Use Cases
High Speed Site to Site
MKA Session
Data Data
Center Carrier Ethernet Center
Service
Central Central
Site Site
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Use Cases
Point to MultiPoint
Topologies
WAN MACsec Use Cases
E-LINE Point to Multipoint Backhaul
MKA Session
Data
Carrier Ethernet Center
Service
Branch
Central
Site
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
802.1AE (MACsec) “Tag in Clear”
Encrypted
DMAC SMAC 802.1AE Header 802.1Q CMD ETYPE PAYLOAD ICV CRC
0x88e5
MACsec Ether Type TCI/AN SL Packet Number SCI (optional)
0x88e5
MACsec Ether Type TCI/AN SL Packet Number SCI (optional)
• 802.1Q tag offers significant network design options over the carrier network
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
WAN MACsec Use Case – 802.1Q Tag in the
Clear
• Leverage 802.1Q for logical connectivity to each site MACsec
PHY
10 Public
MACsec 20 Ethernet
PHY Transport
30
40
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
WAN MACsec – 802.1Q Tag in the Clear
Expose the 802.1Q tag “outside” the encrypted payload
• Example:
...
interface GigabitEthernet0/0/4
macsec dot1q-in-clear 1 Allows the ability to leverage
MACsec on a per sub-interface
Interface GigabitEthernet0/0/4.20 basis, exposing the “802.1Q
encapsulation dot1Q 20 tag” outside the encryption
ip address 10.3.2.1 255.255.255.0 header.
mka pre-shared-key key-chain k1
macsec
!
Interface GigabitEthernet0/0/4.30
encapsulation dot1Q 30
ip address 10.3.3.1 255.255.255.0
mka pre-shared-key key-chain k1 Note: “1” denotes
macsec one .1Q tag depth
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
WAN MACsec Use Cases
Point to Multi-point Topology (Hub/Spoke) with 802.1Q Tag in Clear
• Use Case - Requirement E-LINE - Point to Multipoint
• High Speed hub-and-spoke Topology Support
• Leverage low-cost/high-speed Metro E transport Branch n
• 802.1Q Tag in Clear allows simple site aggregation MACsec Secure Path / MKA Session
• Flexible to support MACsec and IPSec at Central Site MACsec enable Ethernet PHY
MACsec 802.1Q Ethernet PHY
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Use Cases
Point to MultiPoint /
Multipoint to Multipoint
(E-LAN Transport)
Router Peering Model View for E-LAN
Physical View Logical View
CE2 CE2
CE1 CE1
Routing Peers
(N – 1)
Carrier Ethernet
Service Flat Ethernet
Bridge domain
E-LAN (multi-pt)
Single VLAN
Data
Carrier Ethernet Center
Service
Branch
Central
Site
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
WAN MACsec Use Cases
High Speed Site to Site
Data Data
Center MKA Session Center
Carrier Ethernet Service
Ethernet Frame
Ethernet DA Ethernet SA E-Type EAPoL Data CRC
01:80:C2:00:00:03 0x888e
Version, packet type,
length, packet body
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
WAN MACsec Use Cases
High Speed Site to Site
Protocol Addr/ET Local Action
EAPoL MAC No Drop
Data Data
Center MKA Session Center
Carrier Ethernet Service
Ethernet Frame
Ethernet DA Ethernet SA E-Type EAPoL Data CRC
01:80:C2:00:00:03 0x888e
Version, packet type,
length, packet body
• Provider bridge, if EAPoL is NOT destined for use, will DROP the frame
mid-stream of the EAPoL session between two MACsec stations
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
EAPoL “Destination Address” Change Command
• The “eapol destination-address” command allows the operator to
change the destination MAC address of an EAPoL frame
• This ensures EAPoL frame is “unknown” to service provider bridge
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
EAPoL “Ether Type” Change Command
• The “macsec eth-type” command allows the operator to change
the destination Ether Type value of an EAPoL frame
• This ensures EAPoL ether-type is “unknown” to service provider
bridge
• Ability for router to adjust to providers Ethernet MACsec Secure Path / MKA Session
services MACsec enable Ethernet PHY
• 802.1Q Tag in Clear allows simple site MACsec 802.1Q Ethernet PHY
aggregation
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Use Cases
Securing Private IP /
MPLS / Segment
Routing Backbone
WAN MACsec for Secure MPLS Backbone
Per Link Encryption at 100Gb+ with MACsec End-to-End
•IP/MPLS
•Segment Routing
•IPv6 Data
Center
P4 PE2 Enterprise
Site
Data P1
Center
P3
PE 1 Co Lo Facility
Enterprise
Site P2
PE3 (CoLo)
MPLS Core
• Leverage MACsec encryption on Ethernet WAN links connecting PE Public Cloud Providers
and P routers in MPLS Core (up to 100GE, N x 100GE)
• Offers “per hop” encryption and telemetry at each PE / P router MACsec Secured Path / MKA
Operator
Data Data
Center Center
Key Mis-match
Challenges:
• Updating Pre Shared Keys (PSK) is a manual process
• Opens possibility of mistakes during process (mis-types, comm loss)
• MKA keepalive intervals are much longer than IGP or BFD timers
• Mis-configured MACsec keys, cause a black-holing affect on traffic
Assumption: Link cost = 1 on all links
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
MACsec Configuration Recommendation
Convergence Impacts Around MACsec Key Operations
• Pre-shared Key Templates
• CLI: SSH Push PSK Key info
MACsec MKA Session
BFD BFD
Operator
Data Data
Center Center
BFD
Assumption: Link cost = 1 on all links
Re-converged
Path
IGP/MKA Interval
Branch
Internet
Carrier Ethernet Service Branch
Enterprise
IPsec
Network Branch
Regional Branch
• IPSec: Branch/back-haul – Targets Lower BW, high number of sites, cloud (CSR)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Public 121
Adding Automation to
Security Operations
WAN MACsec Operations
Automating WAN MACsec Pre-Shared Key (PSK) Changes
YANG
Models YDK
MKA Session
Data Data
Center Carrier Ethernet Center
Service
Target those operations tasks that are repeatable, requires touching on all
security devices, and are often a burden to the Sec/NetOps teams
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Ansible for NetOps Host Inventory
Automating MACsec Key Chain Changes
Playbooks
• Ansible 2.2.1 (Linux VM)
• Cisco ASR 1001-X (XE 16.3.2) Ansible Host (Ubuntu 14.04 VM)
SSH
• Playbook:
- SSH credential
WAN
- key chain name: June-key
- Key number: 01
Herndon VA
- cryptographic-algorithm aes-128-cmac
- key-string: 1234567890..... 23456789011
- Lifetime: 00:00:00 Jun 1 2017 23:59:59 Jun 30 2017
ASR 1001-X ASR 1001-X
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
External Resources (GitHub)
https://github.com/netwrkr95
• Ansible – MACsec Keychain Examples
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Solution Roadmap
(Subject to change)
ASR 9xxx Series • Modular Line Cards • 1GE*, 10GE, 40GE, 100GE
NCS 55xx Series • Modular and Fixed (QSFP ports) • 100GE (QSFP only)
Nexus 9000 Series • Fixed and Modular solutions • 10GE, 40GE, 100GE
Optical NCS Series • NCS2k, NCS4k, Client ports • 10GE, 40GE, 100GE
#CLUS BRKRST-2309 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Continue
your Demos in
the Cisco
Walk-in
self-paced
Meet the
engineer
Related
sessions
education campus labs 1:1
meetings
#CLUS Presentation ID © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Thank you
#CLUS