MACsec Intel FPGA System Design User Guide

ID 767516
Date 6/26/2023
Public

A newer version of this document is available. Customers should click here to go to the newest version.

Document Table of Contents

6.7.1. IP Tool

Figure 41. Configuration and Software Stack for IP Tool

IP tool: It can be used to statically configure the Tx/RX information and keys of the interface.

Linux MACsec: This driver triggers one of the macsec_ops() API depending on the input received via netlink interface.

MACsec IP Driver: It exposes macsec_ops() to linux MACsec driver and performs register read writes for the input provided.

HW FPGA: MACsec IP in FPGA and HW Crypto.

The examples below are commands used for configuration and testing:

Create a MACsec device on link eth0 (offload is disabled by default):

# sudo ip link add link eno0 MACsec0 type MACsec encrypt on

Configure a secure association on that device:

# ip MACsec add MACsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181

Configure a receive channel:

# ip MACsec add MACsec0 rx port 1234 address c6:19:52:8f:e6:a0

Configure a receive association:

# ip MACsec add MACsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282

Display MACsec configuration:

# ip MACsec show

Configure offloading on an interface:

# ip MACsec offload MACsec0 mac

Configure offloading upon MACsec device creation:

# ip link add link eno0 MACsec0 type MACsec port 11 encrypt on offload mac