Wired Intelligent Edge

 View Only
  • 1.  MACSEC through intermediate switches

    Posted Jan 31, 2025 04:00 PM

    We are working through a POC to get MACSEC working in a hub and spoke fashion through intermediary switches. 
    The top switches are 6200M, the bottom switch is a 6300M (Farlouche). 

    The top 2 switches represent the head end switches at schools whereas the 6300M is the "core" or head office. 

    In this scenario, the Ruckus switch is a 7250 (which does not support macsec). 

    In production, the ruckus switch will be a large managed fiber network by a third party (containing Juniper, Cisco and other switches).
    The idea is the packets coming from the school would be encapsulated with MACSEC protecting them for the rest of that large fiber network. 

    Is something like this possible? Do we need to look at WAN MACSEC....

    The alternative here is a firewall at every school where it builds IPSEC tunnels back to the "head office core", which we are trying to avoid as that means Aruba loses the POC. 



    ------------------------------
    Aruba Partner Ambassador ACMP, ACDP, ACCP, ACEP
    ------------------------------


  • 2.  RE: MACSEC through intermediate switches

    Posted Feb 10, 2025 06:06 AM

    Yes, MACsec is a point-to-point technology, it's protecting the 'layer 2 link'. And with WAN MACsec, you can traverse switches that are not MACsec capable/aware.

    Check this video on WAN MACsec with AOS-CX.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 3.  RE: MACSEC through intermediate switches

    Posted Feb 10, 2025 01:20 PM

    What about the following. Seems to be supported on certain models of 6300M and 6400. 

    clear tag mode

    clear tag mode {dot1q | none}

    no clear tag mode {dot1q | none}

    Description

    Configures the part of the Ethernet payload in a MACsec protected frame that must precede the Security TAG (SecTAG) header in clear text.

    The dot1q mode allows the 802.1q tag of a MACsec protected frame to be sent in clear text and placed before the MACsec SecTAG header. This enables the establishment of a MACsec tunnel between two MACsec endpoints over a non-MACsec Layer 2 network.

    The no form of the command will configure the device to place the SecTAG header immediately after the destination and source MAC addresses.



    ------------------------------
    Aruba Partner Ambassador ACMP, ACDP, ACCP, ACEP
    ------------------------------



  • 4.  RE: MACSEC through intermediate switches

    Posted Feb 14, 2025 03:56 AM

    That is a new command for me, so I won't know if that covers your scenario. Any way you can test it?



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------