To display MACsec configuration information, perform one of the following tasks:
|
Command
|
Purpose
|
|
show key chain
name
|
Displays the keychain configuration.
|
|
show macsec mka session [interface
type slot/port] [detail]
|
Displays information about the MACsec MKA session for a specific interface or for all interfaces.
|
|
show macsec mka session
details
|
Displays information about the MAC address and the ethernet type that is currently used by the interfaces for all EAPOL packets.
|
|
show macsec mka summary
|
Displays the MACsec MKA configuration.
|
|
show macsec policy [policy-name]
|
Displays the configuration for a specific MACsec policy or for all MACsec policies.
|
|
show running-config macsec
|
Displays the running configuration information for MACsec.
|
The following example displays information about the MACsec MKA session for all interfaces.
.
switch# show macsec mka session
Interface Local-TxSCI #Peers Status Key-Server Auth Mode
------------------ -------------------------------- ------------------ ----------------- ------------------ ------------------
Ethernet2/2 2c33.11b8.7d14/0001 1 Secured Yes PRIMARY-PSK
Ethernet2/3 2c33.11b8.7d18/0001 1 Secured Yes PRIMARY-PSK
------------------ -------------------------------- ------------------ ----------------- ------------------ ------------------
Total Number of Sessions : 2
Secured Sessions : 2
Pending Sessions : 0
The following example displays information about the MACsec MKA session for a specific interface. In addition to the common
elements of the table as described in the previous example, the following also identifies the authentication mode which defines
the current MACsec session type.
switch# show macsec mka session interface ethernet 1/1
Interface Local-TxSCI # Peers Status Key-Server Auth Mode
-------------- -------------------- --------- ------------- -------------- -------------
Ethernet1/1 70df.2fdc.baf4/0001 0 Pending Yes PRIMARY-PSK
Ethernet1/1 70df.2fdc.baf4/0001 1 Secured No FALLBACK-PSK
The following example displays detailed information about the MACsec MKA session for a specific Ethernet interface:
Interface Name : Ethernet2/2
Session Status : SECURED - Secured MKA Session with MACsec
Local Tx-SCI : 2c33.11b8.7d14/0001
Local Tx-SSCI : 2
MKA Port Identifier : 2
CAK Name (CKN) : 12
CA Authentication Mode : PRIMARY-PSK
Member Identifier (MI) : B54263EF7949A561E25CE617
Message Number (MN) : 523
MKA Policy Name : tests2
Key Server Priority : 16
Key Server : Yes
Include ICV : No
SAK Cipher Suite : GCM-AES-XPN-256
SAK Cipher Suite (Operational) : GCM-AES-XPN-256
Replay Window Size : 148809600
Confidentiality Offset : CONF-OFFSET-0
Confidentiality Offset (Operational): CONF-OFFSET-0
Latest SAK Status : Rx & TX
Latest SAK AN : 0
Latest SAK KI : B54263EF7949A561E25CE61700000001
Latest SAK KN : 1
Last SAK key time : 12:59:38 PST Tue Mar 19 2019
CA Peer Count : 1
Eapol dest mac : 0180.c200.0003
Ether-type : 0x888e
Peer Status:
Peer MI : 2C2C090E62A96F4D6E018210
RxSCI : 2c33.11b8.8b88/0001
Peer CAK : Match
Latest Rx MKPDU : 13:16:54 PST Tue Mar 19 2019
The following example displays the MACsec MKA configuration:
switch# show macsec mka summary
Interface MACSEC-policy Keychain
------------------ -------------------------------- ------------------------
Ethernet2/13 1 1/10000000000000000
Ethernet2/14 1 1/10000000000000000
The following example displays the configuration for all MACsec policies:
switch# show macsec policy
MACSec Policy Cipher Pri Window Offset Security SAK Rekey time ICV Indicator Include-SCI
------------------ ------------- --- -------- -------- -------- -------------- ------------- -------------
KC256-Po117b GCM-AES-256 16 148809600 0 should-secure pn-rollover FALSE True
pol1 GCM-AES-XPN-256 100 148809600 30 must-secure 60 FALSE True
pol256-FanO GCM-AES-XPN-256 16 148809600 0 must-secure 60 FALSE True
pol256-MCT GCM-AES-XPN-256 16 148809600 0 should-secure 60 FALSE FALSE
system-default-
macsec-policy GCM-AES-XPN-256 16 148809600 0 should-secure pn-rollover FALSE FALSE
test1 GCM-AES-XPN-256 16 148809600 0 should-secure pn-rollover FALSE True
The following example displays the configuration for all MACsec policies: switch# show macsec policy
MACSec Policy Cipher Pri Window Offset Security SAK Rekey time ICV Indicator Include-SCI
-------------------------------- ---------------- ---- ------------ -------- -------------- -------------- ------------- -------------
MP4 GCM-AES-128 90 1000 0 must-secure pn-rollover FALSE TRUE
p1 GCM-AES-XPN-128 99 148809600 0 must-secure pn-rollover FALSE TRUE
p2 GCM-AES-XPN-256 99 148809600 0 should-secure pn-rollover FALSE TRUE
p3 GCM-AES-XPN-128 99 148809600 0 should-secure pn-rollover FALSE TRUE
system-default-macsec-policy GCM-AES-XPN-256 16 148809600 0 should-secure pn-rollover FALSE TRUE
MACSec Policy Lldp-bypass Suspend Suspend on-request
-------------------------------- ------------- ------------- -------------------
MP4 FALSE TRUE TRUE
p1 FALSE TRUE TRUE
p2 FALSE TRUE TRUE
p3 FALSE TRUE TRUE
system-default-macsec-policy FALSE TRUE TRUE
MACSec Policy PPK Crypto-QKD-Profile Name
-------------------------------- --------------------------------
MP4 None
p1 None
p2 PPK1
p3 None
MACSec Policy Cipher-Suite Enforce-Peer
-------------------------------- -----------------------------------------------------
The following example displays the key octet string in the output of the show running-config and show startup-config commands when the key-chain macsec-psk no-show command is not configured:
key chain KC256-1 macsec
key 2000
key-octet-string 7 075e701e1c5a4a5143475e5a527d7c7c706a6c724306170103555a5c57510b051e47080
a05000101005e0e50510f005c4b5f5d0b5b070e234e4d0a1d0112175b5e cryptographic-algorithm AES_256_CMAC
The following example displays the key octet string in the output of the show running-config and show startup-config commands when the key-chain macsec-psk no-show command is configured:
key chain KC256-1 macsec
key 2000
key-octet-string 7 ****** cryptographic-algorithm AES_256_CMAC