Example: macsec over ethernet¶
r1
hostname r1
vrf def v1
rd 1:1
exit
crypto ipsec ips
group 02
cipher aes256cbc
hash sha1
key tester
exit
int eth1
vrf for v1
macsec ips
ipv4 addr 1.1.1.1 255.255.255.0
ipv6 addr 1234::1 ffff::
exit
r2
hostname r2
vrf def v1
rd 1:1
exit
crypto ipsec ips
group 02
cipher aes256cbc
hash sha1
key tester
exit
int eth1
vrf for v1
macsec ips
ipv4 addr 1.1.1.2 255.255.255.0
ipv6 addr 1234::2 ffff::
exit
r1 tping 100 30 1.1.1.2 vrf v1
r2 tping 100 30 1.1.1.1 vrf v1
r1 tping 100 30 1234::2 vrf v1
r2 tping 100 30 1234::1 vrf v1
r1 output show inter eth1 full
output ../binTmp/crypt-macsec.html
<html><body bgcolor="#000000" text="#FFFFFF" link="#00FFFF" vlink="#00FFFF" alink="#00FFFF">
here is the interface:
- Install ContainerLab as described here
- Fetch crypt-macsec01 file
- Launch ContainerLab
crypt-macsec01.yml
topology:
containerlab deploy --topo crypt-macsec01.yml
crypt-macsec01.yml
topology:
containerlab destroy --topo crypt-macsec01.yml