Overview
Configure MACsec encryption with EAP-TLS by establishing RADIUS authentication, managing digital certificates via a trustpoint, and defining the necessary EAP and 802.1X profiles. Once these components are configured, apply the profiles to your physical interfaces to enable secure, certificate-based mutual authentication and automated key management.
This task enables the router to authenticate 802.1X clients with EAP-TLS, providing mutual authentication and generating a Master Session Key (MSK) for secure communication.
Before you begin
-
Ensure a Certificate Authority (CA) server is configured for the network.
-
Verify the configured CA certificate is valid.
-
Confirm that Cisco Identity Services Engine (ISE) Release 2.2 or later, or Cisco Secure Access Control Server Release 5.6 or later, is configured as the external AAA server.
-
Ensure the remote AAA server is configured with the EAP-TLS method.
-
Synchronize the routers, CA server, and external AAA server using Network Time Protocol (NTP) to ensure certificate validation.
Follow these steps to configure MACsec encryption using EAP-TLS authentication:
Procedure
| 1. | Configure the RADIUS server pre-shared keys. Example:
|
|
| 2. | Configure the 802.1X authentication method using RADIUS as the protocol. Example:
|
|
| 3. | Generate an RSA key pair to sign and encrypt key management messages. Example:
|
|
| 4. | Configure a trustpoint to manage and track CAs and certificates. Example:
|
|
| 5. | Configure a domain name for certificate enrollment. Example:
|
|
| 6. | Authenticate the CA and enroll the device certificate. Example:
|
|
| 7. | Configure an EAP profile. Example:
|
|
| 8. | Configure an 802.1X profile on the device. Example:
|
|
| 9. | Apply the MACsec EAP profile and the 802.1X profile to an interface. Example:
|
MACsec encryption is successfully configured on the router using EAP-TLS authentication, enabling secure communication and mutual authentication for 802.1X clients.