Example: macsec over l2tp3¶
r1
hostname r1
vrf def v1
rd 1:1
exit
crypto ipsec ips
group 02
cipher aes256cbc
hash sha1
key tester
exit
int eth1
vrf for v1
ipv4 addr 9.9.9.1 255.255.255.252
ipv6 addr 9999::1 ffff::
exit
int tun1
tunnel vrf v1
tunnel key 1234
tunnel mode l2tp3
tunnel source ethernet1
tunnel destination 9999::2
vrf for v1
macsec ips
ipv4 addr 1.1.1.1 255.255.255.0
ipv6 addr 1234::1 ffff::
exit
r2
hostname r2
vrf def v1
rd 1:1
exit
crypto ipsec ips
group 02
cipher aes256cbc
hash sha1
key tester
exit
int eth1
vrf for v1
ipv4 addr 9.9.9.2 255.255.255.252
ipv6 addr 9999::2 ffff::
exit
int tun1
tunnel vrf v1
tunnel key 1234
tunnel mode l2tp3
tunnel source ethernet1
tunnel destination 9999::1
vrf for v1
macsec ips
ipv4 addr 1.1.1.2 255.255.255.0
ipv6 addr 1234::2 ffff::
exit
r1 tping 100 30 1.1.1.2 vrf v1
r2 tping 100 30 1.1.1.1 vrf v1
r1 tping 100 30 1234::2 vrf v1
r2 tping 100 30 1234::1 vrf v1
- Install ContainerLab as described here
- Fetch crypt-macsec55 file
- Launch ContainerLab
crypt-macsec55.yml
topology:
containerlab deploy --topo crypt-macsec55.yml
crypt-macsec55.yml
topology:
containerlab destroy --topo crypt-macsec55.yml