Skip to content

Example: macsec over framerelay

Alt text

r1

hostname r1
vrf def v1
 rd 1:1
 exit
crypto ipsec ips
 group 02
 cipher aes256cbc
 hash sha1
 key tester
 exit
int ser1
 enc framerelay
 framerelay mode dce
 framerelay dlci 123
 vrf for v1
 macsec ips
 ipv4 addr 1.1.1.1 255.255.255.0
 ipv6 addr 1234::1 ffff::
 exit

r2

hostname r2
vrf def v1
 rd 1:1
 exit
crypto ipsec ips
 group 02
 cipher aes256cbc
 hash sha1
 key tester
 exit
int ser1
 enc framerelay
 framerelay dlci 123
 vrf for v1
 macsec ips
 ipv4 addr 1.1.1.2 255.255.255.0
 ipv6 addr 1234::2 ffff::
 exit
r1 tping 100 30 1.1.1.2 vrf v1
r2 tping 100 30 1.1.1.1 vrf v1
r1 tping 100 30 1234::2 vrf v1
r2 tping 100 30 1234::1 vrf v1
  1. Install ContainerLab as described here
  2. Fetch crypt-macsec06 file
  3. Launch ContainerLab crypt-macsec06.yml topology:

   containerlab deploy --topo crypt-macsec06.yml  
4. Destroy ContainerLab crypt-macsec06.yml topology:

   containerlab destroy --topo crypt-macsec06.yml  
5. Copy-paste configuration for each node in the lab topology

  1. Fetch or compile freeRtr rtr.jar file.
    You can grab it here
  2. Fetch crypt-macsec06.tst file here
  3. Launch crypt-macsec06.tst test:

   java -jar ../../rtr.jar test tester crypt-macsec06 path ./ temp ./ wait
4. Destroy freeRtr crypt-macsec06.tst test:

   Ctrl-C (In freeRtr test window)